At the center of the cybersecurity conversation.

The National Cybersecurity Institute at Excelsior University is an academic and research center dedicated to assisting government, industry, military, and academic sectors meet the challenges in cybersecurity policy, technology, and education.

The NCI is shaping a coordinated effort to build the cybersecurity workforce and influence an informed leadership base that implements cutting-edge cybersecurity policy. We target the development of effective cybersecurity practice in specific sectors, including health care, finance, utilities/energy, telecommunications, and education/training.

National Center OF Academic Excellence

NSA and Homeland Security seals

The National Security Agency (NSA) and the Department of Homeland Security designated Excelsior as a National Center of Academic Excellence in Cyber Defense Education for its Bachelor of Science in Cybersecurity program.

Leadership

Prof. Mohammed Mahmoud, Ph.D., Faculty Program Director of Cybersecurity and NCI Director, School of Undergraduate Studies

National Cybersecurity Institute Fellows

Weylin Brad Leavitt

Weylin Brad Leavitt is a cybersecurity leader and technical subject matter expert. He works for the Defense Intelligence Agency, where he is assigned to the chief information officer for the U.S. Indo-Pacific Command. Leavitt is responsible for providing access and customer support to seven worldwide networks across the Indo-Pacific Command theater.

Leavitt is a 2008 graduate of Embry-Riddle Aeronautical University, where he studied computer engineering. In 2010, he became an active-duty Air Force officer and quickly became well- known among the cadre of cyber operators. He was first assigned to the Air Force Enterprise Service Desk for three years, creating policies and leading quality assurance efforts, before being deployed with the U.S. Army to Bagram Air Field, Afghanistan. There he fulfilled the role of system operations officer-in-charge at the Regional Network Operations Service Center-Afghanistan. After returning from deployment, he was assigned to the Air Force Computer Emergency Response Team, becoming mission-qualified and eventually commanding one of the six Air Force Cyber Weapon Systems. He was responsible for conducting various cyber defensive operations against all activities, from daily phishing attempts to large-scale network attacks.

National Cybersecurity Institute Faculty

The fully online Bachelor of Science in Cybersecurity program provides students with the ability to enhance technical knowledge and skills in cybersecurity. Our courses are taught by a collection of highly qualified and dedicated instructional faculty

  • Arend Clayborn
  • April Harris
  • Mahesh Harvu
  • Jose Herrera
  • Tyrone Howard
  • Jason Ianacone
  • Patrick Kral
  • Weylin Leavitt
  • Jane LeClair
  • George Mikulski
  • Stephen Miller
  • Darrel Nerove
  • Denise Pheils
  • Syed Raza
  • Maureen Reynolds
  • Laurel Schneider
  • Jianhong Sun
  • Steven Tharp
  • Pee Vululleh

Contact Us

Director of NCI

Media Requests
Erin Coufal
518-608-8498
PR@excelsior.edu

Excelsior University Cybersecurity Programs

Continue the Conversation

Excelsior University National Cybersecurity Student Association Chapter

The National Cybersecurity Student Association (NCSA) encourages the educational and professional development of cybersecurity students through activities, networking, and collaboration. NCSA strives to inspire career awareness and promote creative efforts by cultivating a national community that supports students in their cybersecurity endeavors.

National Cyber League

As part of the National Cybersecurity Student Association, students have the opportunity to participate in the National Cyber League. This biannual cybersecurity competition for high school and college students consists of a series of challenges that allow students to demonstrate their ability to identify hackers from forensic data, break into vulnerable websites, recover from ransomware attacks, and more.

Excelsior University has participated in the National Cyber League since 2017 and has consistently ranked on the Top 100 Leaderboard from 2018-2021. In the fall 2019 season, Excelsior University ranked No. 34 overall and teams placed No. 55 and No. 99 on the Leaderboard. Excelsior took first place in the team competition and overall in the spring 2021 season. In spring 2022, Excelsior had two participants ranked in the Top 100.

“I think the exposure and skills [gained] are the biggest takeaways. You learn things you would never learn in the classroom. This provides you a way to practice everything you learned, too.”
– Melissa Burger, MS in Cybersecurity, 2020

Excelsior University National Cybersecurity Student Association Chapter

NCI Blog

View more articles from NCI

Events and Webinars

Upcoming Events

This event is open to U.S. based academic institutions. Here is the 2022 scenario: A US company has been crippled by a ransomware attack, and NSA is standing by to provide technical assistance to FBI agents responding. Your mission is to: investigate the attack and discover the tools and techniques used; unravel and expose a ransomware-as-a-service ring; and recover the victim’s files and save the day.

Register at: nsa-codebreaker.org


Join Vermont’s U.S. Senator Patrick Leahy; Dr. Mark Anarumo, President, Norwich University; LTG Maria Barrett, USA; distinguished experts and special guests for a day-long discussion on the latest innovations in cybersecurity and the importance of cyber education and workforce development in Vermont.

This event is free. Registration is required at: NULeahyCyber.eventbrite.com


The Fall 2022 NCL Season will begin with the Gymnasium on August 22, 2022 and wrap up with the Team Game November 4-5, 2022

NCL hosts two Seasons every year, once in the Spring and once in the Fall, aligning to US academic calendars. All participants play the games simultaneously during Practice Game, Individual Game, and Team Game.

NCL allows players of all levels to play. Between easy, medium and hard challenges, students have multiple opportunities to really shine in areas as they excel.

Learn more about the competition.


The National Cybersecurity Training and Education (NCyTE) Center and the Centers of Academic Excellence (CAE) in Cybersecurity Community are hosting the sixth annual National Cybersecurity Virtual Career Fair (VCF), on September 16, 2022, from 9:00 am-1:00 pm PT. This event is open to students and alumni from over 380 institutions designated as Centers of Academic Excellence in Research (CAE-R), Cyber Defense (CAE-CD), and Cyber Operations (CAE-CO), and institutions in the Candidate’s Program (pending approval).

As the CAE in Cybersecurity program continues to designate new CAEs, the number of students participating in the VCF grows each year. Last year, over 1100 students and alumni participated in the virtual career fair. Many students find careers through the VCF, and many of the same employers return each year to participate.

The Fair is for CAE designated institutions students and alumni, including Excelsior

Link for information: https://www.caecommunity.org/news/2022-national-cybersecurity-virtual-career-fair-registration-now-open

Registration link: https://caecommunity.6connex.com/event/virtual/vcf2022students/login

Past 2022 Events

The US Cyber Open CTF is for all skill levels. Beginner, Intermediate, and Advanced challenges will test your knowledge and skills in Cryptography, Forensics, Reverse Engineering/Binary Exploitation, Networking, Web, and Reconnaissance. And if you’re looking to win a spot on the next US Cyber Team, make sure to request an invitation to the US Cyber Combine.

Apply to play


The NICE Conference is the annual convening of community members and thought leaders from education, government, industry, and non-profits to explore ways of developing a skilled cybersecurity workforce ready to meet the challenges of the future. This event provides an opportunity to share best practices from around the world and across sectors in order to build the workforce we need to confront cybersecurity risks today and in years to come.
This event is hosted by Florida International University and New America, supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.S. Department of Commerce.

Learn more and register


Volatility is an open-source memory forensics framework for incident response and malware analysis. The presentation is of practical nature and will involve a hands-on analysis of a memory image. The presentation will extract network information, process information, event logs, and hive registers. We will recover event logs and show how they would like at the time of the actual acquisition. Ban accounts will be recovered. We will also include hybrid malware analysis of our processes and determine which process caused the malware infection.

Join Event Log in as “Guest” and enter your name. No password required.


Will discuss how Ransomware has become our biggest threats on the Cyber landscape and how organizations are using the Zero-Trust framework to help mitigate those threats. How can both the public and private sectors be working together to help mitigate these risks against Ransomware? Also, how are organizations using current Zero-Trust security best practices?

Join Event Log in as “Guest” and enter your name. No password required.


The summit is designed to educate, elevate, and empower women of color technologists and techpreneurs across the nation. The global summit will take place virtually as a kick-off event for Philly Tech Week.

In keeping with our “No More Hidden Figures” mantra and in celebrating 5 years, the 2022 summit welcomes women from around the world. This years’ tracks include topics pertaining to Connectivity, Education, and Health.
Learn more and register

Manufacturing is not only the backbone of U.S. military technical advantage, but also a major contributor to the U.S. economy. A healthy, innovative, and vibrant manufacturing sector is essential to the economic strength and national security of the United States. The Industrial IoT, coupled with 5G, security in IIoT, machine learning and artificial intelligence, is impacting the future and growth of manufacturing. In this tech talk, we will discuss and live-demo how we use zero trust model, machine learning, and 5G to design and implement a secure smart manufacturing testbed in a lab environment. Further discussion also includes how we collaborate with the manufacturing outreach center to engage local manufacturers and show business use cases that smart factory can drive value.

Click to Access Just log in as “Guest” and enter your name. No password required.

A recording of the live presentation will be available following the presentation at: https://www.caecommunity.org/resources/cae-forum-resources

In today’s environment, private sector and government executives face the constant challenge of managing the emergence of these new cyber threats. Our goal is to provide a framework for understanding the capabilities of threat actors in a future where cyber arms are the norm. Hosted by solarwinds and FCW.
Learn more and register
As cloud computing and data outsourcing become increasingly prevalent, the need for data privacy is critical. Homomorphic encryption allows for algorithms and analytics to be computed on outsourced encrypted data without leaking any information about the underlying plaintexts, while zero-knowledge proofs allow for data verification without revealing secret data to the other party. In this talk, the presenters will briefly introduce these two technologies and discuss state-of-the-art applications utilizing HE and ZKP. Homomorphic encryption techniques can be used to conduct private machine learning inferences on the cloud without revealing any information about user inputs. For instance, a user could encrypt a picture of a patch of skin, upload it to a cloud server, and receive an inference result indicating whether or not he has skin cancer without ever exposing the picture itself. In terms of ZKP, a user could prove that she casted her vote correctly without revealing who she voted for. This enables building secure and trustworthy electronic voting.

Click to Access Just log in as “Guest” and enter your name. No password required.
Cyber competitions and capture-the-flag (CTF) events are a valuable tool for motivating and engaging students and professionals in cybersecurity and cyber operations beyond traditional education and training. Reverse engineering and binary exploitation challenges are common components of online CTFs, but the tools, techniques and procedures for performing reverse engineering and binary exploitation have a steep learning curve and are not taught in many computer science, IT, and cybersecurity degree programs. Angr is a Python framework for analyzing binaries across a number of platforms and architectures, originally developed as part of a DARPA Cyber Grand Challenge. It combines both static and dynamic, concrete and symbolic (or “concolic”) analysis to enable users to easily analyze how different inputs change the path of a program’s execution. For CTF exercises, angr allows competitors to quickly determine the correct input(s) that would satisfy a program’s constraints leading to a successful solution, thereby capturing the flag. This introductory presentation will demonstrate how angr can be used to solve CTF challenges (or find real-world vulnerabilities) in a fraction of the time required by debuggers, disassemblers, and decompilers alone.

Click to Access Just log in as “Guest” and enter your name. No password required.

Event Archive

  • May 7, 2021 – HUE Tech Summit
  • May 4 2021 – Military Spouses in Cybersecurity
  • March 25, 2021 – Webinar: Data Privacy

  • December 10, 2020 – Webinar: Veterans Apprenticeship Program Webinar
  • November 19-20, 2020 – CAE in Cybersecurity Symposium
  • November 18, 2020 – Webinar:Fraud, Forensics and Cybersecurity
  • November 12, 2020 – Webinar: Seeking Careers in Cybersecurity

  • American Society for Public Administration (ASPA) Annual Conference
  • Webinar: The Difference Between an IT Degree and a Cyber Degree
  • NICE Conference and Expo
  • CAE in Cybersecurity Symposium

Resources

The key to staying ahead in the field of cybersecurity is to watch for and analyze trends. It’s a challenge to stay one step ahead of the criminals. As a cybersecurity professional, you will want to stay on top of new findings and current cyber events.

Here are some resources that will help you stay up-to-date:

Vulnerability Alerts and Information

Regulations

Frameworks

Studies and Research

Publications

Security News & Threat Intelligence Blogs

News Feeds

Videos and Podcasts

Other Sources

National Cybersecurity Institute Journal

The National Cybersecurity Institute Journal, a peer-reviewed journal, covers topics that appeal to a broad readership within the cybersecurity discipline, with a particular focus on education, training, and workforce development.

View past issues of the journal