Cybersecurity Labs
| # | Developed lab and lab location | Equipment | Staff | Development aspect | Development implementation schedule |
|---|---|---|---|---|---|
| 1 | Cyber Security Lab Building – A11 | IoT kits, Servers, ethical hacking tools and SW | A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi | Add modern equipment and software | The technical specifications have been prepared. Implementation: the first half of 2023 |
| 2 | Digital Investigation Laboratory – Building 650 | Forensics tools, acquisition tools, forensics software | A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi | Add modern equipment and software | The technical specifications have been prepared. Implementation: during the first half of 2023 |
| 3 | Digital Investigation Laboratory – A11 Building | Workstation (30) Forensics tools, acquisition tools, forensics software | A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi | Establishing a new laboratory | The technical specifications have been prepared. Implementation: the first half of 2023 |
| 4 | Cyber Security Lab Building – Building 650 | Workstation (30) IoT kits, Servers, ethical hacking tools and SW | A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi | Establishing a new laboratory | The technical specifications have been prepared. Implementation: during the first half of 2023 |
| 5 | Virtual environment | Servers, routers, switches, virtualization software | A unit under the supervision of Dr. Fahad al-Haidari and M. Omar al-Harbi | Online lab support | Technical specifications have been completed. Implementation: during the last third of 2023 |
Looking for Something?
Discover More
EC-Council | iLabs
We have adopted EC-Council | iLabs which provides a chance for CYS students to learn more or hone their skills in hacking, penetration testing, computer forensics, and secure coding. Students now can practice information security online through iLabs Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts.
Certified Ethical Hacker Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.
Lab exercises are included for:
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Cloud Computing
- Cryptography