One of the goals of the Cyber Defense Team is to introduce students to industry IT professionals. The objective is to allow the students to not only demonstrate what they are learning in the Computer Science program but also allow them to converse with industry personnel in a casual setting. It is hoped that this interaction will provide the students with valuable input which will help them in their future endeavors.


AccessData provides software solutions to perform digital forensics, litigation support, and cyber security tasks. The Department of Defense, along with corporations, use AccessData's products for investigations on a daily basis. At Texas A&M University Corpus Christi, we use AccessData's Forensic Toolkit (FTK) and the AccessData Registry Viewer in the Incident Response class to perform mock investigations that will give students the knowledge and skills they need beyond the classroom.

Check Point

Check Point Software Technologies Ltd. provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

Our students get exposure to the Check Point FireWall in our Firewall and IDS course. Students will be able to complete hands-on exercises using the Check Point FireWall software. On completion of the Firewall and IDS course, students will recieve a voucher from Check Point to take a certification exam.


Cisco designs, manufactures, and sells Internet Protocol (IP) based networking and other products related to the communications and information technology (IT) industry and provide services associated with these products and their use. Cisco provides a broad line of products for transporting data, voice, and video within buildings, across campuses, and around the world. Cisco's products are designed to transform how people connect, communicate, and collaborate. These products are installed at enterprise businesses, public institutions, telecommunications companies and other service providers, commercial businesses, and personal residences. They deliver networking products and solutions designed to simplify and secure network infrastructures. Their products and technologies are grouped into the following categories: Switching, Next-Generation Network (NGN) Routing, Collaboration, Service Provider Video, Wireless, Security, Data Center, and Other Products.

Our students use a tool from Cisco called Packet Tracer. It allows each student in the Network Administration I and Network Administration II courses to simulate a company's network infrastructure. Students get full exposure to configuring the Cisco Internetwork Operating System (IOS) on switches and routers through the Packet Tracer software, which they can can download and use free of charge. This experience aids our students in acquiring their Cisco certifications, such as the CCENT and the CCNA.


Microsoft has created a variety of products to serve the needs of homes and businesses. We use Microsoft's Windows Server and Windows Client operating systems to train the System Administration II and Cyber Defense II classes how to configure and secure Windows systems. Through the Microsoft Developers Network - Academic Alliance (MSDNAA), our students are given the capability to download and use Microsoft software free of charge for educational purposes.

Red Hat

Red Hat is a provider of open source solutions, using a community-powered approach to provide reliable and high-performing cloud, virtualization, storage, Linux, and middleware technologies. They provide an enterprise operating system and related systems management services based on open source technology for the information technology infrastructure requirements of large enterprises. Red Hat creates, maintains, and contributes to many free software projects, such as Fedora and CentOS.

The students that take System Administration I and Cyber Defense I gain experience on configuring and securing computers running the Fedora operating system. Through completion of the System Administration I class, the students should be prepared to take the Linux+ certification exam, giving them a leg up when looking for a job in a related field.


VMware, the global leader in virtualization and cloud infrastructure, delivers solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. Their broad and proven suite of virtualization technologies addresses a range of complex IT problems that include cost and operational inefficiencies, facilitating access to cloud computing capacity, business continuity, and corporate end-user computing device management.

VMWare's solution to running multiple operating systems simultaneously on the same machine allows us to simulate a real-world environment. Each student in the System Administration I, System Administration II, Cyber Defense I and Cyber Defense II courses are able to gain hands-on experience through the use of VMWare Workstation. Through our alliance with VMWare, students can download and use VMWare Workstation on their personal computers free of charge.

City of Corpus Christi IT Department

Recently several members of the City's IT Department met with team members and toured the Cyber Defense lab. The goal is to establish a knowledge sharing and work relationship with the City that is both beneficial to the City and team members. Details of the arrangement are expected to be worked out over the next several weeks.


Last Spring, CCAD’s Chief Information Officer, Director of Engineering Services and Publicist visited the team. During their visit the Chief Information Officer talked with our members about employment opportunities and emphasized the importance of obtaining industry certifications.

Labatt Company

The Cyber Defense Team was recently visited by Labatt’s Layla Grona (Hiring Coordinator), Juli Selzer (Programming Manager) and Jason Roesler (Server Manager). Both Juli and Jason are former graduates of TAMUCC. They took time to interact one on one with our team members, giving them an opportunity to demonstrate their past and present projects. Next, Labatt provided us with a look into their application development process and supporting infrastructure.

Labatt is a privately owned food distribution company based in San Antonio, Texas. Labatt has distribution centers in Dallas, Lubbock, Houston, and San Antonio and distributes products to customers in Oklahoma, New Mexico and Texas. The company’s product strategy is to deliver products of consistent quality.

Denim Group

Prior to Labatt, Chad Lorch of the Denim Group met with the Team. Chad is a former United States Air Force Intelligence Analyst. He is currently working as a Security Consultant for the Denim Group. During his visit members were afforded an opportunity to learn first hand about security consulting as well as network with a practicing specialist. The Denim Group offers site security reviews, penetration tests, and custom application development security assessments. Their security experts are practicing developers and thus they are able to offer in-depth software vulnerability evaluation.