Cybersecurity Innovation and Research Center

  • Description


    The Cybersecurity Innovation and Research Center is an advanced facility for cybersecurity education, professional training, promoting malware research, and supporting industry partnerships. The facility was built at the cost of $1.35 million and will be jointly operated by the Department of Computer Science and the Department of Information Systems & Business Analytics (ISBAN). The lab is designed to prepare students for cybersecurity careers and support them in attaining professional placements to meet the growing demand for a qualified workforce throughout the industry.

    The facility consists of a 36 seat 'war room' and mini datacenter with the following hardware:

    • 36 x workstations
    • 5 x wall-mount LCD displays
    • IoT devices, including VR headsets and Smart Speakers
    • 11 x servers
    • 17 x routers/switches
    • 2 x 200TB of High Performance NAS storage
    • 5KW UPS
  • Courses


    CSC 015S: Fundamentals of Cybersecurity

    This course introduces fundamental concepts of cybersecurity, basic secure design principles, and related policies and laws. The lab component covers basic Linux administration skills such as OS installation, user account management, vim editor, basic UNIX commands interface, access controls, file system backup/restoration, and deployments of intrusion detection systems.

    CSC 115/215: Ethical Hacking

    This course covers the fundamental aspects of system security. It emphasizes hands-on practice with ethical hacking on computer and information systems for the purpose of finding and fixing vulnerabilities and determining appropriate counter-approaches to attacks. Topics include but are not limited to: access control, OS memory organization and various overflow attacks, web application security, viruses and worms, intrusion-detection systems, botnet, honeynet, and malware analysis.

    CSC 007, 143V/291E: Cybersecurity for Everyone

    Cybersecurity for Everyone provides a hands-on introduction to cybersecurity threats and mitigation approaches, in a way that is accessible to students without computing backgrounds. Topics include background knowledge of Internet and web applications, packet sniffer, user authentication, prevalent attacks such as SQL injection, cross site scripting attacks and case studies of recent cybersecurity incidents. The course has an intensive hands-on lab component and a capture-the-flag contest.

    CSC 175/284: Networking & Distributed Processing

    Networking & Distributed Processing provides a technical introduction to data communication. Topics include the OSI Reference Model, layer services, protocols, LANs, packet switching and X.25, ISDN, File transfer, virtual terminals, system management and distributed processing.

    CSC 188/288: Network Security

    Network Security concerns current issues, techniques, software, hardware, and architectures from a security perspective. The course examines protocols used for internet services, their vulnerabilities, and how they can be secured. Other topics include: Analysis of firewall design, cryptographic techniques, intrusion detection, anti-virus techniques, port scanning, viruses, worms, Trojan horses, and Denial of Service (DOS) attacks. Basic principles of secure networking and application design are studied and discussed.

  • Faculty


    Xiang Fu
    Professor of Computer Science
    (516) 463-4787
    Adams Hall 103A
    Research Areas: Software Engineering, Formal Verification, Model Checking, Information Security, Web Services
    E-mail | WWW | Bio

    Hak Kim
    Associate Professor of Information Systems and Business Analytics
    (516) 463-4529
    Business School Building 331
    Research Areas: Big Data Analytics in Social Media, Mobile Location-based Service, Cyber Security in Mobile Networks, Digital Forensics
    Email | Bio

    Angeliki Zavou
    Assistant Professor of Computer Science
    (516) 463-4571
    Adams Hall 115
    PhD, Columbia University
    Research Areas: Privacy, Network and Systems Security, Data Flow Tracking in the Cloud, Information Security
    Email | Bio