Scientific Achievements

Cybersecurity Labs

# Developed lab and lab location Equipment Staff Development aspect Development implementation schedule
1 Cyber Security Lab Building – A11 IoT kits, Servers, ethical hacking tools and SW A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi Add modern equipment and software The technical specifications have been prepared. Implementation: the first half of 2023
2 Digital Investigation Laboratory – Building 650 Forensics tools, acquisition tools, forensics software A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi Add modern equipment and software The technical specifications have been prepared. Implementation: during the first half of 2023
3 Digital Investigation Laboratory – A11 Building Workstation (30) Forensics tools, acquisition tools, forensics software A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi Establishing a new laboratory The technical specifications have been prepared. Implementation: the first half of 2023
4 Cyber Security Lab Building – Building 650 Workstation (30) IoT kits, Servers, ethical hacking tools and SW A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi Establishing a new laboratory The technical specifications have been prepared. Implementation: during the first half of 2023
5 Virtual environment Servers, routers, switches, virtualization software A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi Online lab support Technical specifications have been completed. Implementation: during the last third of 2023
Looking for Something?

EC-Council | iLabs

We have adopted EC-Council | iLabs which provides a chance for CYS students to learn more or hone their skills in hacking, penetration testing, computer forensics, and secure coding. Students now can practice information security online through iLabs Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts.

Certified Ethical Hacker Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading IDS Firewalls and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography