main image
University of Isfahan CERT Center

Services

Software, Hardware, and Network Vulnerability Detection with Special Focus on IoT Products
Fixing vulnerabilities
Cyber-Attacks and Malware Analysis
Intrusion Detection and Forensics Analysis
Security Assessment Services
Security Consultation
Cyber Security Professional Training and Education

R&D

icon
Conducting Applied Researches on Cyber Security and IoT Security
image
icon
Interaction with Other National and International Research Centers
image
icon
Developing Cyber Security Products and Tools
image

Awareness and Training

Developing Cyber Security Contents for Web, Social Networks, and other Medias
Building Cyber Security Guidelines
Organizing Cyber Training and Education Courses
Running Cyber Security Contests
Participating in Cyber Security Conferences and workshops

Naghsh-e Majaaz Cyber Range

Cyber Range (CR) systems are effective tools for training various cyber security topics in a practical and skillful way. CR provides an operational environment for training people with different levels of cyber security knowledge and experience to make them ready for tackling emerging cyber threats in practice effectively.Nagshe-e Majaaz Cyber Range (NMCR) is the UI CERT cyber range platform developed based on KYPO CR. NMCR works based on a cyber-range as a service model. People and organizations who want to experiment with new cyber defense technologies can use NMCR services to deal with professional, effective, and cost-benefit practical training services.NMCR provides a safe place to solve complex cyber problems, to test new ideas, and to see how teams interact with emerging cybersecurity solutions.

Cyber Security News

27/12/2022  
: Release Date

An individual is offering to sell the data of more than 400 million Twitter users

27/12/2022  
: Release Date

On the third day of Pwn2Own, contestants hacked the Samsung Galaxy S22 a fourth time since the start of the competition, and this time they did it in just 55 seconds.

27/12/2022  
: Release Date

The August 2022 security breach of LastPass may have been more severe than previously disclosed by the company.

About Us

Given the University of Isfahan's background and scientific and technical expertise in information security, as well as the urgent need of the country and Isfahan province for research and technological activities to counter and mitigate threats in the Information Exchange Space (FATA), the APA (Awareness, Support, and FATA Relief) Specialized Center at the University of Isfahan began its activities in the field of cyberspace security in July 2022, following approval from the Information Technology Company and the University's Board of Trustees.

The APA Center at the University of Isfahan, while aiding in awareness, support, and relief in the Information Exchange Space nationwide, has defined its primary mission as providing research, technological, and educational services in the field of FATA. According to its statute, the center's overarching goals are as follows:

  • Assisting in identifying and addressing technical weaknesses in the country related to FATA vulnerabilities and security incidents
  • Organized research and technological activities to address vulnerabilities and develop FATA security solutions
  • Enhancing public and specialized awareness of FATA security issues through training courses and content dissemination across media platforms
  • Training experts in identifying vulnerabilities and responding to security incidents
  • Auditing and issuing FATA security certifications across various domains
  • Active collaboration with domestic and international scientific and research institutions, relevant security and regulatory bodies (e.g., FATA Strategic Management Center, Cyber Police, Judiciary, Maher Center, etc.), and foreign research centers within legal frameworks

Accordingly, the center's activities are structured around three key pillars:

  • Security Services
    • Studying and identifying vulnerabilities in software and hardware systems
    • Analyzing vulnerabilities in communication protocols and infrastructure
    • Researching remediation strategies and providing them to relevant entities/requesters
    • Analyzing cyberattacks and malware
    • Detecting new cyberattacks, documenting them, and sharing findings to prevent future incidents
    • Providing intrusion detection services
    • Conducting security assessments for computer systems of organizations, companies, and other entities nationwide
    • Offering advisory services in various FATA domains
    • Training specialized personnel
  • Research & Development
    • Conducting fundamental, applied, and developmental research in FATA to generate technical knowledge
    • Developing and updating indigenous tools and products for monitoring, evaluating, preventing, and countering FATA threats
    • Engaging in scientific collaboration with national and international research centers
  • Education
    • Preparing educational and promotional articles/documentation
    • Producing and publishing educational content via websites, social media, and other platforms
    • Developing security hardening guides, intrusion detection protocols, and system recovery guidelines
    • Organizing public and organizational training programs
    • Hosting national and international competitions focused on cyberattack detection and response
    • Preparing and publishing statistical reports
    • Participating in conferences and seminars