From single computers to large networks, the global need for cybersecurity expertise has never been greater. Through experiential and applied learning, students prepare for careers in computer analytics, cybersecurity, data analysis, game development and social media applications.
Footprint Finder is a product that allows clients to have their digital footprint scanned and scored. This score is then put into a report for the client to review along with the Footprint Finder team.
Dragon-WiFli is a discreet Wi-Fi auditing device built into a 3D-printed coffee mug using a Raspberry Pi Zero 2 W. Designed for offensive security teams, it passively captures wireless traffic to help businesses identify vulnerabilities in their networks. Running Kali Linux with penetration testing tools, it offers stealth, portability, and real-world usability, making it ideal for internal red team assessments and wireless security testing.
In an era where cyber threats are advancing rapidly, USB devices remain a deceptively simple yet potent means of attack. A single careless action by an employee鈥攕uch as plugging in an unknown USB鈥攃an lead to serious data breaches, financial loss, and organizational disruption. PortSentry addresses this vulnerability by transforming a common threat into a proactive training and assessment tool. Our system uses custom Raspberry Pi Pico-based USB devices to emulate real-world attack scenarios and collect key behavioral and system metrics, including timestamps, OS versions, USB serial numbers, and user interaction data. These data points are then analyzed and visualized through the Elasticsearch, Logstash and Kibana (ELK Stack) to assess security awareness and identify risky behaviors. PortSentry helps organizations identify risky behaviors, monitor security awareness trends, and implement targeted cybersecurity training. Further testing will be conducted in a controlled environment to evaluate the device鈥檚 functionality, reliability, and data collection accuracy. Simulated interactions allows us to confirm successful HID emulation, consistent data capture, and real-time ingestion into the ELK pipeline. Though not yet deployed organization-wide, these preliminary tests demonstrate PortSentry鈥檚 viability as a low-cost, scalable solution for USB security awareness training. It bridges the gap between passive cybersecurity training and hands-on user interaction by providing actionable data in a controlled, risk-free environment. By simulating an attack on a business and analyzing user responses, PortSentry empowers organizations to proactively address USB security risks in a way that educates employees on a tangible level and thus prepares for real-world cyber threats.