Skip to Main Content

It’s one thing to read about cyberattacks, quite another to actually infiltrate other computer systems, while simultaneously protecting your own.

Our Cyber Lab gives you a chance to put classroom theories to work and perfect your skills. You’ll work in groups to:

  • Simulate hacker attacks 
  • Secure operating systems from malicious activity 
  • Identify vulnerabilities and devise ways to remove them
  • Detect attacks and prevent or limit the resulting damage
  • Write code to detect anomalies and malware

This type of intense, hands-on experience is the only way to truly develop your cybersecurity expertise.

Our Cyber Lab is used by our students, plus outside members of the community, such as:

  • Current and potential members of the Fort Meade workforce use this realistic environment for specialized cybersecurity training programs and certification preparation classes.
  • High school and middle school students attend cyber security demonstrations and career awareness outreach programs.

The Cyber Lab’s Advisory Board includes members from:

  • The Johns Hopkins University Applied Physics Laboratory
  • Lockheed Martin
  • Maryland MESA
  • Prince George's Community College
  • Prince George's County Public Schools
  • SAIC
  • UMBC

Cyber Team Competitions

The Capitol Technology University cyber teams and students from the Cyber Lab compete in numerous cybersecurity challenges and competitions, including:

  • Ghost in the ShellCode 2012
  • Collegiate Cyber Defense Competition
  • PlaidCTF
  • US Cyber Challenge
  • DC3 Forensic Challenge
  • Defcon CTF Qualifiers
  • US Cyber Challenge Training Camp at Virginia Tech
  • HackLu CTF
  • MDC3
  • PoliCTF
  • National Cyber League Championship
  • NYU Poly CSAW (Computer Security Awareness Week) Capture-the-Flag
  • Stripe Capture-the-Flag
  • Mitre STEM Capture-the-Flag
  • ThreatSpace Capture-the-Flag

Cybersecurity explained in five functions

The National Institute of Standards and Technology (NIST) defines “Five Functions of Cybersecurity” that organizations should use to manage cyber risks. 

Read More