Links and Resources



Instructional laboratory #1 has 25+ desktop networked Lenovo ThinkCenter, Series M PCs running FDU standard Windows 7 and other academic software packages. Additional computer science / information technology packages are also included on these systems. The room has 2 laser printers for general student and faculty use. The computer lab does have PC/Laptop projection systems whereby lecture and lab sessions can be readily accommodated therein.

Instructional laboratory #2 houses 10+ Lenovo ThinkCenter computers running Windows 7, a printer, rack-mounted CISCO switches, routers, firewalls, etc. and also has a Windows server in a closet. Additional 10+ Lenovo ThinkCenter computers run VMware with Oracle 11g, VB-SQL-win-xp, OS-linux-FC6, Java-Internet, NET-win-xp, NET-win03-svr, and security operating systems like SEC-linux, SEC-win2k-svr, and SEC-win-xp.


The Cybercrime Training Laboratory is composed of two instructional classrooms with both traditional and stadium seating. Each room includes 20 student computers, 2 data projectors, 2 flat screen wall monitors, 2 large whiteboards with data capture options, and an instructor’s computer imbedded in a podium. Both rooms are connected to a projection system that allows for simultaneous display of information on the instructor PC, add-on laptop, DVD player, and cable TV (or a preferred combination thereof). One of the classrooms has the capacity for videoconferencing with 2 high quality cameras using an encrypted VPN between 2 distant parties, and also has the ability to record instructional sessions via the projection system.
The lab includes a forensic server with 30 licenses of Encase for use with the PCs in the lab, 1 Susteen Secure View, 4 OSForensics software packages running in a virtual sandbox on 4 PCs in the lab for digital forensics, one copy of X-Ways WinHex on a laptop for all digital forensics, 18 CDs with Sleuthkit for the PCs in the Lab, and CDs with JP Hide and Seek and WinMD5 which can be run and demonstrated to show steganography and digital signatures. The lab also has over 30 hard drives that can be used for simulated crime data installation for student examination and recovery.
These systems run Windows 7 operating system and have FDU standard educational and productivity software running on them. Additionally the systems have forensics software packages such as JP Hide & Seek and GetData Recover My Files loaded which will be used in delivering CSEOP at the Metropolitan campus. Some of the other forensics software packages such as Paraben’s Device Seizure will need to be updated for use in the ACCP and the Professional Development aspect of the project. There are also twenty PDAs available in the Cybercrime Laboratory that can be used for teaching mobile device usage and forensics.

Available in the lab are Cellebrite phone kits which can be used to teach students to transfer data from a cell phone to either a network or digital media. There are approximately two hundred cell phones from the last fourteen years that demonstrate what the public may be using. This is good for instructional use. LogicCube devices and IDE writeblockers are available for specialized classes to demonstrate forensic examination of legacy (outdated) systems that are sometimes encountered.

All lab PCs are normally networked, but have the ability to be completely isolated from outside electromagnetic and/or networking traffic. Disconnecting from the main FDU servers allows for a secure local network to be established for research and educational purposes, creating an unrestricted system without possibility of contamination to the University’s systems.
Computers: The lab has a total of 42 IBM ThinkCentre computers, M series, with Internet connectivity. Through networking design each computer can also be connected to a forensic server via switching functionality. A network version of Guidance Software’s Encase can be put on this server for distribution to PCs for digital forensics instruction. A number of legacy desktops are in lab 2270 for specialized training in teaching digital forensics on legacy systems that are occasionally encountered by law enforcement.

There are at least four working IBM Thinkpad laptops for practicing computer imaging and examination. 20 CDs with FTK Imager are available that can be used with either the laptops or the PCs. One Thinkpad has Susteen Secureview Forensic software installed and can be used to examine cell phones.


There are three computer laboratories with 20 Lenovo desktop networked PCs running FDU standard Windows 7 with the Microsoft Visual Studio for application development. Each room has laser printers for general student and faculty use. The computer lab does have PC/Laptop projection systems to accommodate lecture and lab sessions.

One instructional facility is a mobile lab of 20 Lenovo tablets that are currently being used for teaching computer science courses. The computers are connected to the Internet via wireless connectivity. All the computers are connected to the University System for protection in terms of systems security.

External Sites Related to Cybersecurity & Information Assurance

CyberWatch NSF
National CyberWatch Center
National Security Agency/Central Security Service (NSA/CSS)
State of New Jersey, New Jersey Info Secure
State of New York Office of Cyber Security
State of Connecticut/Cyber Safe
State of Pennsylvania/Cyber Security
Science History Museum and National Historic Landmark
InfoSec Institute
Institute of Electrical and Electronics Engineers (IEEE)
ASIS International – A ‘One-Stop-Shop’ for IA Information
Association for Computing Machinery (ACM)
Professional Certifications in Information Systems Security (e.g., CISSP, SSCP)
The Cybersecurity and American Cyber Competitiveness Act 2013


The National Cybersecurity and Communication Integration Center (NCCIC)  is announcing the start of a new information sharing initiative called the Cobalt Compartment.

About NCCIC: The Cobalt Compartment of the US-CERT Portal provides secure access to actionable cybersecurity information to the global communite of cybersecurity professionals. Through this compartment, the NCCIC will share threat indicators and advisory information with public, private, and international partners in the network defense community. An individual or organization can request access to the Cobalt Compartment by contacting:; Include you name, justification, and company or organization affiliation.

On December 2011, the White House Office of Science and Technology Policy (OSTP) released the ”Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program,” a framework for a set of coordinated Federal strategic priorities and objectives for cybersecurity research.
View Publication

National Science Foundation (NSF)

NSF Request for Comments (RFC)—Federal Cybersecurity Research and Development Strategic Plan– as published in the Federal Register of December 28, 2012  (Deadline January 11, 2013)

NSF Directorate for Computer & Information Science and Engineering (CISE)

NSF Office of Cyberinfrastructure Funding

Specific NSF Funding Opportunities:

Non-Government Opportunities:

Funding Priority:
Youth education, specifically in the areas of science, technology, engineering, mathematics, the environment, job training and literacy.

Some Universities/Institutions with CAE/IAE Designations

Stevens Institute CASSIA
Carnegie Mellon University CyLab
Rutgers Center for Information Assurance
Maryland University Cybersecurity Center
Mercy College Information Assurance Education Center
NYU Poly: Center for Interdisciplinary Studies in Security and Privacy
Utica College