Atoms/Iconography/360-white@2xion-briefcase - Ionicons Copy@2xAtoms/Iconography/calendar-dark@2xAtoms/Iconography/calendar-pinkAtoms/Iconography/calendar-pinkAtoms/Iconography/calendar-dark Copy@2x3B13F687-6EB2-452A-B918-16B02FF86090@2xchevron-right - FontAwesome@2x81A2B1C2-3C1E-48C0-8EAB-2BB76C1052E1@2xchevron-right - FontAwesome@2xchevron-right - FontAwesome@2xchevron-right - FontAwesome Copy@2x18D48E51-758C-47E9-949E-1E58FC9454A3@2xAtoms/Iconography/close-red@2xAtoms/Iconography/close-white@2xion-android-cloud-circle - Ionicons@2xAtoms/Brand/connected-uni-logo-white@2xAtoms/Iconography-download-icon-white@2xdropdown-chevron-black@2xAtoms/Iconography/dropdown-form-chevron-white@2xAtoms/Iconography/email-icon-light@1xF93E1E4C-136C-41CA-8FC9-02353765C1C0@2xA14CB21F-CD96-450C-BBD7-6647B25B0D0D@1xatoms/Iconography/facebook-icon@2xAtoms/Iconography/facebook-iconAtoms/Iconography/google-plus-icon@2xion-ios-information-outline - IoniconsAtoms/Iconography/instagram-iconGroup@2xAtoms/Iconography/linkedin-icon@2xion-android-menu - Ionicons@2x934F565B-4D4A-4BBE-B4EA-29E0D367BC7F@2xAtoms/Iconography/minus-icon@2xAEC8A5E2-9638-45F8-9E94-3C320D2410A9@2xAtoms/Iconography/nav-icon-white Copy@2xAtoms/Iconography/pause-icon-white@2xion-android-person - Ionicons@2xAtoms/Iconography/phone-icon-white@2x5131105A-B2E1-443D-A44D-E6DCCBBF53DD@2xAtoms/iconography/pintrest-icon@2xAtoms/Iconography/play-button-white@2xAtoms/Iconography-play-button-white-2@2xAtoms/Iconography/plus-icon-black@2xAtoms/Iconography/print-icon-light@2x34CD08DE-22EB-4484-B0B4-48190645DEBC@2xsearch - FontAwesome@2xAtoms/Iconography/search-white@2xAtoms/Iconography/snapchat-icon@2xAtoms/Iconography/tick-green@2xAtoms/Iconography/twitter-icon@2xAtoms/Iconography/twitter-iconAtoms/Iconography/youtube-icon@2xAtoms/Iconography/youtube-icon@2x Skip to content Skip to search
  •  

Networks & Cyber Security

Dedicated specialist facilities where students have access to commercial grade networking hardware and software, virtual computing environments, forensic tools and more.

Networks & Cyber Security has a home in four specialist teaching areas within the Mellor building, two dedicated network labs and two forensic labs which can also operate as one large teaching space. These areas are supported by two server/equipment rooms.

As well as access to the corporate network, the machines in these rooms all have access to an internal isolated network which allows the building and configuration of test network topologies, investigation and troubleshooting of networks, simulated cyber attacks and access to virtual images used as attack targets.

Machines in these labs all host specialist Virtual Machines, Microsoft and Linux, configured with specialist software and applications such as Packet Tracer, Wireshark, EnCase and XRY.

Other virtual machines installed;

  • Kali Linux virtual machine which provides information security training and penetration testing.
  • CyberOps virtual machine which simulates an environment to implement and analyse security threats.
  • Security Onion virtual machine for threat hunting, enterprise security monitoring and log management.
  • Metasploitable virtual machine to provide a vulnerable target for attack simulation.

The Network labs are connected by a CAB room which contains 400+ industry standard network devices, mostly Cisco and Cisco Meraki switches, routers, firewalls, wireless LAN controllers and network traffic generators. These are housed in racks and constantly available for use by students. They can be wired to create a desired topology and configured from any machine in the lab.

The Cyber labs also host similar virtual machines hosting specialist software with access to powerful forensic tools used in the recovery of data and criminal investigations. There are also hardware kits to support the software which enables the recovery of data from a wide range of devices such as PCs, phones, mobile devices, watches and Sat Nav units.

Students can build virtual computing environments to suit research and project work on our dedicated server provision. This is housed within our own data centre which also hosts our internal network. We have an array of Dell and HP servers and also two Passware distributed password recovery devices.

Equipment

  • CODED – Chip on data extraction device.
  • XRY Mobile Forensics Extraction Kit. × 5
  • Cellebrite Mobile Forensics Extraction Kit. × 5
  • Cisco Switches (multiple)
  • Cisco Routers (multiple)
  • Cisco ASA Firewalls × 14
  • Cisco Wireless LAN Controllers × 6
  • East Coast Traffic Generator

Staff

Photo of Networks & Cyber Security