Information Security Labs
Specialized Laboratory |
Description |
Photo |
Systems and Software Security Lab |
Concentrates on the design and development of secure real-world applications (design, development and deployment of enterprise information systems requiring state-of-the-art database, platform and Internet security).
|
|
Network Security lab |
Cyber defense, support in countering adversary information networks attacks and threat countermeasures. Assess the operating capabilities and vulnerabilities of threat equipment especially for military.
|
|
Hacking and Digital Forensics Lab |
Hands-on experience on various forensic investigation techniques, standard forensic tools, and biometric based systems necessary to successfully carryout a computer forensic investigation |
|
Cyber Security Lab |
Plan, configure, implement, and maintain operating systems and services for end users on different Operating Systems, e.g., Windows and Linux interoperability, scripting, group policy, server modifications/ enhancements and services.
|
|
Wireless and Mobile Computing Security Lab
|
The Wireless and Mobile Computing lab conducts education and training in many areas of wireless networks and mobile computing, with an emphasis on designing and evaluating secure mobile systems, protocols, and applications.
|
|
SCADA/ICS security lab
|
The lab combines state-of-the-art operational system testing facilities with research, development, and training to discover and address critical security vulnerabilities and threats to the critical infrastructures.
|
|
Data Recovery and Malware Analysis Lab
|
Provide security analysis education and training on the skills required to perform thorough investigations of various incidents and malware’s function analysis both static and dynamic (e.g. rootkit, botnet, keylogger, etc.)
|
|