Students in the Computing Security degree programs will use a variety of labs in the Golisano College during their academic years at RIT. Each academic unit has lab facilities that are specific to and support the aspect of the computing discipline they teach. The two security centric labs are:
- Security Lab (GOL-2410)
- Air Gap Lab (GOL-2130)
- Click here for the current open hour schedules.
Air Gap Lab
The Air Gap Lab includes 12 tables/benches with two tower workstations and multiple monitors running VMWare and a switch on each. It is also equipped with projection for purposes of instruction and demonstration. One of the most important features of this lab environment is that it is isolated with an “air-gap” (e.g. No PC or network equipment access to outside networks.) to protect the college and campus infrastructure from inadvertent attack traffic that is generated, diagnosed, and studied as part of the experimentation that is part of the courses taught in this lab.
The lab also houses eight equipment cabinets filled with network and systems security equipment. The cabinets provide the equipment used for system and network security exercises, the exploration of malware, and the practice of security auditing techniques. There is a complement of necessary equipment including PCs, switches, routers, firewall appliances, and some vendor specific software and hardware appliances.
The Security Lab includes 15 tables/benches with two workstations running VMWare, one Mac cluster for forensic examination, and a switch on each. It is also equipped with dual projectors to accommodate instruction and demonstration. This lab while Internet connected sits behind a firewall which provides some limited protection. The course experimentation that goes on in this lab does not include harmful traffic but the architected environment allows the class specific experimentation to stay on our internal network. The lab includes equipment racks that house wireless equipment used in in wireless security experimentation as well as other necessary network equipment. The software and hardware necessary to develop expertise in forensic techniques as well as mobile security are provided in this environment as needed.