Center for Cybersecurity & Intelligence Studies
Center for Academic Excellence in Cyber Defense (CAE-CD)
The Center for Cyber Security & Intelligence Studies (CCSIS) contributes to the knowledge, skills and abilities of current and emerging cybersecurity professionals to guide their logic, critical thinking and ethics through affiliated graduate programs, an experiential lab and community outreach activities. The CCSIS is housed in University of Detroit Mercy's College of Humanities, Arts & Social Sciences.
Value to the Nation and Community
The Center for Cyber Security & Intelligence Studies celebrates almost two decades of evolving excellence through the embodiment of our teaching in graduates who have gone on to work for Federal security agencies, Fortune 500 companies and not-for-profit organizations. In addition, our leading-edge cybersecurity lab provides dual value by providing our students with the tools to help law enforcement recover and validate through digital forensics.
Validated Programs of Study
University of Detroit Mercy’s B.S. in Cybersecurity and our M.S. in Cybersecurity Management have been validated by the National Security Agency.
University of Detroit Mercy is designated by the National Security Agency as a Center of Academic Excellence in Cyber Defense (CAE-CD).

External News
Krebs On Security
- For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare's public ranking of the […]
- A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to steal tens of millions of dollars from U.S. businesses was arrested […]
- Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and […]
- Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and […]
- Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing messages that come from […]
- Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least three vulnerabilities that are already […]
Secure World
- The financial services sector, managing the world's most sensitive data, is facing an intensifying and often self-inflicted security crisis. The […]
- The cybersecurity community is reeling from a disturbing indictment that underscores a frightening new dimension of insider risk and supply […]
- For years, CISOs have been responding to incidents, pursuing alarms, and building defenses against assaults. The AI revolution, on the […]
- A hacker claims to have stolen data from the University of Pennsylvania containing information on roughly 1.2 million donors, alumni, […]
- Cross-Site Scripting (XSS) remains one of the most persistent and damaging web application vulnerabilities. XSS happens when an application fails […]
- The mobile security landscape is often defined by invisible threats—phishing links, data exfiltration, and root exploits. However, the cybersecurity community […]
Dark Reading
- A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses.
- The Japanese media giant said thousands of employee and business partners were impacted by an attack that compromised Slack account […]
- Despite increased awareness, manufacturers continue to face an onslaught of attacks.
- Attackers are already targeting a vulnerability in the Post SMTP plug-in that allows them to fully compromise an account and […]
- CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI […]
- Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences […]
Resources
- Detroit Mercy Cybersecurity Club – Open to all majors, the Detroit Mercy Cybersecurity Club, sponsored by the Detroit Chapter of ISACA, is an opportunity for students to delve deeper into computers and cybersecurity.
- NICCS – Cybersecurity CISA Resources and Tools, Cybersecurity Training Resources, Education Resources.
- TryHackMe – An interactive cybersecurity training platform offering guided labs and challenges to learn hacking and security concepts in a hands-on environment.
- Hack The Box – A penetration testing platform with virtual labs that challenge users to hack into simulated systems, enhancing offensive security skills and knowledge.
- NCAE Cyber Games – A competition platform for students participating in cyber games, supported by the National Centers of Academic Excellence in Cybersecurity, aimed at developing practical cybersecurity skills through competitive events.
- CyberSeek—To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data on supply and demand in the cybersecurity job market.
- CyberMission.tech – A Department of Defense (DoD) cyber initiative with high-tech, hands-on opportunities for military personnel, Veterans, and the public.
- CISA Cybersecurity Resources: Telework guidance and best practices, assessments, prevention, and response resources, cybersecurity awareness and best practices resources, misinformation, disinformation, and malinformation resources, mitigating cyber risks to the nation’s critical infrastructure.
Security Resources
Goals & Unique Features of the Center
Following the goals for the National Initiative for Cybersecurity Education, the Center provides education, advanced security research and service to:
- To advance the cybersecurity capabilities of the workforce within the Detroit Mercy service region as well as nationally.
- To increase the number of highly educated, digitally literate citizens within underrepresented people and veterans and to produce professional specialists in areas of critical need.
- To generate educational, outreach and research activities that will ensure the protection of the critical infrastructure of the United States as a whole.
Internal News
-
Affiliated Faculty
Cybersecurity & Information Systems and Criminal Justice Programs
- Gregory Laidlaw, DMIT, department chair and lecturer of Cybersecurity & Information Systems
- Dan Shoemaker, Ph,D., director of the Master of Science in the Information Assurance Program
- Erick Barnes, department chair, instructor of Criminal Justice and Director of the Master of Science in Intelligence Analysis Program
- Anne Kohnke, Ph.D., director of the Center for Cyber Security & Intelligence Studies and associate professor of Cybersecurity & Information Systems
- Charles Wilson, J.D., associate professor of Criminal Justice
-
Cybersecurity Center Advisory Board
- William Bowen '03, '05, U.S. Army, TACOM
- Edward Bobola III, senior master sergeant, 110 OG (USA)
- Mike Brennan, founder of Michigan News Network
- Shaun Cavanaugh, chief information security officer at the National Park Service
- Marrci Conner, faculty at Henry Ford College
- Kurt Gollinger, chief operating officer at Central Bureau of Investigation (CBI)
- Jason Grembi '02, author of Secure Software Development, certified information systems security professional and senior cybersecurity architect, Vehicle Services department at General Motors
- Michael Huguley '07, Infrastructure Manager / Infrastructure Architect
- Keith Jaroszewski, '09, '10, senior penetration Tester at Synchrony
- J.T. Jones '05, deputy cybersecurity program manager at the US Army in Europe G6
- Daniel Kennedy, principal consultant at Forensic Criminology Associates
- Kristin Judge, founder of Cyber Crime Support Network
- Dan Lohrmann, chief strategist and chief security officer at Security Mentor, Inc.
- Christopher Martella '15, attorney at Kemp Klein Law Firm
- Richard Marshall, chairman of the board at Cinturion
- Janell McLemore '09, access manager at the U.S. Department of Defense
- Sajay Rai, President, certified public accountant, certified information systems security professional and certified information security manager at Securely Yours
- James L. Rainey, Ph.D., III, '95, '97, information technology specialist at the U.S. Government
- Stephanie Scheurmann, cyber threat intelligence specialist at Ford Motor Company
- Bob Sherman, associate professor and chair of Computer Information Systems at Sinclair Community College
- Ken Sigler '98, faculty at Oakland Community College
- Christopher Sorensen, senior cybersecurity researcher at GE Digital
- Ryan Spangler, senior account executive cybersecurity practice at TEKSystems
- Mary Sparks, '05, WebFOCUS senior SDA, Ford Motor Company
- Caston Thomas, President at InterWorks, LLC
- Dave Trader, chief strategy officer at GalaxE Solutions
- Tabice Ward, director/computer and information science and engineering (CISE) at DTE Energy
- Jeff Weber, Department of Defense
- Brad Wilkerson, principal engineer at Walt Disney Imagineering
- Angela Williams, enterprise information security officer at Blue Cross Blue Shield of Michigan
