Center for Cybersecurity & Intelligence Studies

Center for Academic Excellence in Cyber Defense (CAE-CD)
The Center for Cyber Security & Intelligence Studies (CCSIS) contributes to the knowledge, skills and abilities of current and emerging cybersecurity professionals to guide their logic, critical thinking and ethics through affiliated graduate programs, an experiential lab and community outreach activities. The CCSIS is housed in University of Detroit Mercy's College of Humanities, Arts & Social Sciences.
Value to the Nation and Community
The Center for Cyber Security & Intelligence Studies celebrates almost two decades of evolving excellence through the embodiment of our teaching in graduates who have gone on to work for Federal security agencies, Fortune 500 companies and not-for-profit organizations. In addition, our leading-edge cybersecurity lab provides dual value by providing our students with the tools to help law enforcement recover and validate through digital forensics.
Validated Programs of Study
University of Detroit Mercy’s B.S. in Cybersecurity and our M.S. in Cybersecurity Management have been validated by the National Security Agency.
University of Detroit Mercy is designated by the National Security Agency as a Center of Academic Excellence in Cyber Defense (CAE-CD).
External News
Krebs On Security
- A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE) siphoned gigabytes of […]
- A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk's Department of Government Efficiency (DOGE) transferred gigabytes of sensitive […]
- A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking […]
- President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA) who was fired by […]
- China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the […]
- Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that is already being […]
Secure World
- In its 17th edition, Verizon's 2025 Data Breach Investigations Report (DBIR) continues to deliver one of the most comprehensive analyses […]
- The United States Cybersecurity and Infrastructure Security Agency (CISA) is confronting a pivotal moment following the recent resignations of two […]
- The state of data security is in flux—and according to Rubrik's recent report, it's not trending in the right direction. […]
- A sophisticated cybercrime campaign, dubbed Elusive Comet, has been uncovered, in which North Korean threat actors are exploiting Zoom's remote […]
- You've built your cybersecurity business on years of solid technical expertise. Your team has a deep understanding of all the […]
- Think your vendors are secure just because they say so? That's where SOC 2 reports come in. SOC 2 (System […]
Dark Reading
- An analysis of more than a half-million mobile apps find encryption problems, privacy issues, and known vulnerabilities in third-party code. […]
- By focusing on prevention, education, and risk transfer through insurance, organizations — especially SMEs — can protect themselves from the […]
- Two kinds of attacks are in high gear: ransomware attacks against OEMs and compromised electric vehicle chargers, according to data […]
- Recently added artificial intelligence capabilities on the Chinese-language Darcula phishing-as-a-service platform make phishing attacks easy for even the least technical […]
- The creators of the toolkit are advertising it as an educational and ethical resource, but what it promises to provide […]
Resources
- Detroit Mercy Cybersecurity Club – Open to all majors, the Detroit Mercy Cybersecurity Club, sponsored by the Detroit Chapter of ISACA, is an opportunity for students to delve deeper into computers and cybersecurity.
- NICCS – Cybersecurity CISA Resources and Tools, Cybersecurity Training Resources, Education Resources.
- TryHackMe – An interactive cybersecurity training platform offering guided labs and challenges to learn hacking and security concepts in a hands-on environment.
- Hack The Box – A penetration testing platform with virtual labs that challenge users to hack into simulated systems, enhancing offensive security skills and knowledge.
- NCAE Cyber Games – A competition platform for students participating in cyber games, supported by the National Centers of Academic Excellence in Cybersecurity, aimed at developing practical cybersecurity skills through competitive events.
- CyberSeek—To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data on supply and demand in the cybersecurity job market.
- CyberMission.tech – A Department of Defense (DoD) cyber initiative with high-tech, hands-on opportunities for military personnel, Veterans, and the public.
- CISA Cybersecurity Resources: Telework guidance and best practices, assessments, prevention, and response resources, cybersecurity awareness and best practices resources, misinformation, disinformation, and malinformation resources, mitigating cyber risks to the nation’s critical infrastructure.
Security Resources
Goals & Unique Features of the Center
Following the goals for the National Initiative for Cybersecurity Education, the Center provides education, advanced security research and service to:
- To advance the cybersecurity capabilities of the workforce within the Detroit Mercy service region as well as nationally.
- To increase the number of highly educated, digitally literate citizens within underrepresented people and veterans and to produce professional specialists in areas of critical need.
- To generate educational, outreach and research activities that will ensure the protection of the critical infrastructure of the United States as a whole.
Internal News
-
Affiliated Faculty
Cybersecurity & Information Systems and Criminal Justice Programs
- Gregory Laidlaw, DMIT, department chair and lecturer of Cybersecurity & Information Systems
- Dan Shoemaker, Ph,D., director of the Master of Science in the Information Assurance Program
- Erick Barnes, department chair, instructor of Criminal Justice and Director of the Master of Science in Intelligence Analysis Program
- Anne Kohnke, Ph.D., director of the Center for Cyber Security & Intelligence Studies and associate professor of Cybersecurity & Information Systems
- Charles Wilson, J.D., associate professor of Criminal Justice
-
Cybersecurity Center Advisory Board
- William Bowen '03, '05, U.S. Army, TACOM
- Edward Bobola III, senior master sergeant, 110 OG (USA)
- Mike Brennan, founder of Michigan News Network
- Shaun Cavanaugh, chief information security officer at the National Park Service
- Marrci Conner, faculty at Henry Ford College
- Kurt Gollinger, chief operating officer at Central Bureau of Investigation (CBI)
- Jason Grembi '02, author of Secure Software Development, certified information systems security professional and senior cybersecurity architect, Vehicle Services department at General Motors
- Michael Huguley '07, Infrastructure Manager / Infrastructure Architect
- Keith Jaroszewski, '09, '10, senior penetration Tester at Synchrony
- J.T. Jones '05, deputy cybersecurity program manager at the US Army in Europe G6
- Daniel Kennedy, principal consultant at Forensic Criminology Associates
- Kristin Judge, founder of Cyber Crime Support Network
- Dan Lohrmann, chief strategist and chief security officer at Security Mentor, Inc.
- Christopher Martella '15, attorney at Kemp Klein Law Firm
- Richard Marshall, chairman of the board at Cinturion
- Janell McLemore '09, access manager at the U.S. Department of Defense
- Sajay Rai, President, certified public accountant, certified information systems security professional and certified information security manager at Securely Yours
- James L. Rainey, Ph.D., III, '95, '97, information technology specialist at the U.S. Government
- Stephanie Scheurmann, cyber threat intelligence specialist at Ford Motor Company
- Bob Sherman, associate professor and chair of Computer Information Systems at Sinclair Community College
- Ken Sigler '98, faculty at Oakland Community College
- Christopher Sorensen, senior cybersecurity researcher at GE Digital
- Ryan Spangler, senior account executive cybersecurity practice at TEKSystems
- Mary Sparks, '05, WebFOCUS senior SDA, Ford Motor Company
- Caston Thomas, President at InterWorks, LLC
- Dave Trader, chief strategy officer at GalaxE Solutions
- Tabice Ward, director/computer and information science and engineering (CISE) at DTE Energy
- Jeff Weber, Department of Defense
- Brad Wilkerson, principal engineer at Walt Disney Imagineering
- Angela Williams, enterprise information security officer at Blue Cross Blue Shield of Michigan