Your Photo
Maher Salem

Associate Professor

Ph.D. Eng. | SFHEA

Cybersecurity Expert

Educational Expert Visionary

Cybersecurity Awareness Quiz - Press "Randomize" to start!

Animated Attacks from the Web

Explore these interactive attack simulations to learn how web vulnerabilities work in action!

credit to SecPro

Summary

I am currently an Associate Professor at King's College London (Online Cybersecurity Module Lead | Deputy Chair Cybersecurity | Digital Learning Expert | Career and Employability Lead | SFHEA). Highly accomplished cybersecurity expert with over two decades of experience in both industry and academia, bridging the gap between cutting-edge research and education. With a strong background in computer science and engineering, I am dedicated to advancing cybersecurity knowledge and fostering the next generation of professionals. As a specialist in active learning and innovative methodologies, my goal is to make significant contributions to cybersecurity research, laying a solid foundation for the future of this critical field. Additionally, I leverage my expertise as an active reviewer for top-tier journals, such as Elsevier Computer Security, and as a project proposal assessor for large-scale international government projects, further solidifying my commitment to shaping the cybersecurity landscape.

Languages

  • Arabic - Mother tongue
  • English - Proficient
  • German - Advanced
  • Tools for IDS and More

    AI-VSFTPD-Exploit

    A tool to automate the exploit of VSFTPD backdoor vulnerability AI-driven approach

    Available on :GitHub

    MalwareXplorer

    Your gateway to malware classification and MITRE ATT&CK insights

    Available on :GitHub

    IDSify

    This tool can help process your dataset that include mixture of numerical and nominal features. The tool will help converting all nominal features into numeric ones

    Available on :GitHub

    ConfusionCalc IDS

    This is a GUI tool help calculates the confusion matrix of intrusion detection system if you have already : True Negative, True Positive, False Negative, False Positive.

    Available on : GitHub

    DictHunter

    This tool is to demonstrate a dictionary attack on the Damn Vulnerable Web Application (DVWA).

    Available on : GitHub

    Supervised Theses with Results

    🏅 Academic Awards & 🎓 Professional Affiliations

    🎖️ Academic Honors & Recognitions

    📚 Memberships in Professional & Academic Communities

    🧭 Leadership Roles & Academic Governance

    🎓 Education

    🔬 Selected Research Projects

    King’s Undergraduate Research Fellowship

    Institution: King’s College London

    Period: July 2023 & July 2024

    Role: Principal Investigator


    Evaluating the Effectiveness of Online Cybersecurity Programs

    Institution: King’s College London

    Period: May 2023 – Feb 2024

    Role: Principal Investigator


    CIREI – Smart Middleware for Assistive Robots in Frail Elderly Homes

    Funding: UKRI EMERGENCE | King’s College London

    Period: 2023 – 2024

    Role: Co-Investigator


    Cybersecurity Training Program – Qatar Central Bank

    Institution: King’s College London & Qatar Central Bank

    Period: 2023

    Role: Lead Instructor & Program Designer


    Blockchain for Financial Market Infrastructure – UAE

    Institution: Higher Colleges of Technology

    Period: 2020 – 2022

    Role: Principal Investigator


    UAE-STUB – Securing Transportation Using Blockchain

    Institution: Higher Colleges of Technology

    Period: 2019 – 2020

    Role: Principal Investigator


    Blockchain in Trading & Clearing – Abu Dhabi Securities Exchange

    Institution: Higher Colleges of Technology

    Period: 2019

    Role: Co-Investigator


    IntErA – Intelligent Detection of Cyber-Attacks on IT Infrastructures

    Institution: Kassel University (Germany)

    Period: 2014 – 2017

    Role: Principal Investigator


    SecMonet – Research Project in Network Security

    Institution: Kassel University (Germany)

    Period: 2011 – 2014

    Role: Principal Researcher

    Academic & Industrial Experience

    Bridging cutting-edge research, education, and industry innovation in cybersecurity

    Associate Professor

    King's College London

    Sep 2021 - Present

    London, UK

    • Curriculum Leadership: Designed advanced postgraduate cybersecurity modules integrating advanced Cybersecurity activities.
    • Research Excellence: Secured funded projects and publish in top tier venues.
    • Award-Winning Educator: Recipient of King’s Recognition Award (2022 & 2023) and nominee for Teaching Excellence Award (2024 & 2025).
    • Governance: Deputy Chair of Cybersecurity Assessment Board, reforming competency-based evaluation frameworks.
    • Thought Leadership: Keynote speaker at 12+ international conferences/Exhibitions/Events/News on Cybersecurity.

    Assistant Professor

    Higher Colleges of Technology

    Sep 2015 - Jul 2022

    UAE

    • Program Development: Design and develop undergraduate courses in Cybersecurity.
    • Operational Leadership:Deputy CIS Chair, Campus council member, and Member of campus strategic planning .
    • Industry Collaboration: Partnered with DarkMatter and UAE CERT on penetration testing capstone projects.
    • Research Impact: Led team developing cybersecurity innovative solutions for UAE financial institutions.

    Automotive Cybersecurity Specialist

    AUDI AG

    Oct 2014 - Aug 2015

    Ingolstadt, Germany

    • V2X Security:Architected security solutions such as TPM and HSM, for in-vehicle ECUs.
    • Innovation: Led an in-vehicle Intrusion Detection System project.
    • Testing: Conducted penetration testing for automotive ECU security .

    Cybersecurity Project Lead

    University of Kassel

    Jan 2011 - May 2014

    Kassel, Germany

    • Research Leadership: Directed €370K BMBF-funded SecMonet project on adaptive IDS/IPS systems.
    • Teaching Innovation: Teaching and administration Cybersecurity courses and labs.

    Industry Leadership

    IT Security Engineer

    Nokia • E-Plus • Philips

    2004-2010 | Germany

    • Designed hardened network architectures for 3G/4G core networks
    • IT Administrator for installing, Configuring, and Monitoring Networks

    📘 Teaching Experience & Academic Training

    Courses Delivered

    Postgraduate & Undergraduate Curriculum:

    Participation in Academic Accreditation

    Research Student Supervision

    Academic Training & Certifications

    Professional Experience (Selected)

    Committee member

    Sep 2017 - Present

    • External Examiner Cyber Security for a leading university in the UK . November 2024 - Present
    • Organizing Committee Member at CONF-MPCS 2025 . Oxford - UK
    • External Academic Panel Member at a prestigious academic institution in the UK . November 2024 - Present
    • Evaluator and Assessor of Funding Projects at a prestigious academic institution in Saudi Arabia . August 2024 - October 2024
    • Technical Member at 2022 International Conference on Innovations in Computing Research (ICR’22)
    • Technical Member at IEEE - HCT Information Technology Trends (ITT) Conference
    • Public Chair at ISICS 2020 conference

    Lead Cybersecurity Educator – Harbour Education(Beijing)

    Jan 2022 - Jul 2023

    • Design and develop three main cybersecurity module for professionals and elite students in China.
    • Deliver hybrid sessions and webinars of advance topics in cybersecurity.

    Reviewer at Elsevier top tier (Q1) Journals

    Jan 2020 - Present

    • Journal Computers & Security
    • Journal of Information Security and Applications.

    Service and Talks to Professional / Public / Industry

    Jan 2015 - Present

    • Invited Keynote Speaker at Huawei Cloud Executive Boardroom session during GISEC 2025
    • Invited Keynote Speaker at CONF-MPCS 2025
    • King’s College London Representative for CTF Competitions for London University
    • Panel Member of King’s Professional Recognition in Teaching and Learning programme
    • Professional Development Participator for Cybersecurity Education
    • Lead Career and employability
    • Panel member for the KCL Tech Summit. October 7th, 2023.
    • Conference committee member. International Conference on Innovations in Computing Research (ICR’22).
    • Co-organizing Tech Start-ups event at King’s College London. October 13, 2022
    • Secure industrial partnerships with TryTerra and Sahaj to employ graduate students. Accordingly, they become members of the Industrial Advisory Board. 2022 and 2023.
    • Co-organizing Cybersecurity Workshop Day at King’s College London. May 2023.
    • Lead a workshop of Cybersecurity employability and Career pathway. May 2023
    • Lead a workshop of Collaboration with Microsoft Digital Skills. June 20, 2003.
    • Lead a workshop of collaboration with Apple Secure Programming. October 30, 2024.
    • Interview Panel member for cybersecurity hiring at King’s College London. April 23, 2024.
    • Invited Speaker for Lighting Lunch about Cybersecurity EDI at King’s College London. October 2nd, 2024.
    • Invited Speaker for lunch with lecturer about Cybersecurity Education and AI at King’s College London. November 30, 2022.
    • Invited panel member at Women Of MENA In Technology about Cybersecurity Defense and Offense using AI. June 27, 2024.
    • Invited speaker at Al-Arabiya net about Cybercriminal threats. November 2023.
    • Lead and deliver as a cybersecurity trainer about advanced topics in cybersecurity in Qatar Central Bank. October 2023.
    • Campus Council Member at the Higher College of Technology, Al Ain. Sep 2019 – Oct 2020.

    Publications (Selected)

    Acaademic-Industrial experiences

    Technical Skills

    • OSINT: Proficient in gathering and analyzing publicly available data to support cybersecurity efforts and threat assessments. Skilled in using OSINT tools and techniques to inform decision-making and enhance security posture, with a focus on teaching students the importance of leveraging open source data in their security practices.
    • Endpoint Security: Expertise in securing end-user devices through antivirus solutions, encryption, patch management, and endpoint detection and response (EDR), emphasizing practical applications for students.
    • Application Security: Proficient in secure coding practices and conducting vulnerability testing (SAST/DAST), aimed at integrating these principles into the curriculum for future developers.
    • Incident Response: Strong skills in identifying, responding to, and mitigating cyber incidents, including forensic analysis and root cause investigation, with a focus on developing case studies for educational purposes.
    • Threat Intelligence and Analysis: Ability to gather and analyze threat intelligence data to stay ahead of emerging threats, integrating real-world scenarios into teaching.
    • Penetration Testing & Ethical Hacking: Proficient in penetration testing techniques, vulnerability assessment, and the use of tools such as Metasploit, Burp Suite, and Wireshark.
    • Compliance and Risk Management: Familiarity with industry standards and regulations (e.g., GDPR, ISO 27001), guiding students in understanding compliance frameworks within the context of information systems.
    • Security Operations: Familiarity with Security Information and Event Management (SIEM) systems, log analysis, and continuous monitoring.
    • Malware Analysis and Reverse Engineering: Skills in identifying and analyzing malware behavior to develop defense strategies, providing students with hands-on learning opportunities.

    Instructional Skills

    • Curriculum Development: Expertise in designing and implementing comprehensive curricula that align with industry standards and best practices in information systems and cybersecurity, ensuring students acquire relevant skills for their future careers.
    • Active Learning Strategies: Proficient in employing active learning techniques to engage students, including case studies, group projects, and problem-based learning, fostering critical thinking and practical application of concepts.
    • Technical Instruction: Ability to teach complex technical topics clearly and effectively, utilizing a variety of instructional methods, such as lectures, hands-on labs, and online resources, to accommodate diverse learning styles.
    • Assessment and Evaluation: Skilled in developing and implementing assessment strategies that accurately measure student learning outcomes, providing constructive feedback to enhance student performance and understanding.
    • Mentorship and Student Engagement: Committed to mentoring students through academic projects, research opportunities, and career guidance, creating an inclusive and supportive learning environment that promotes student success.
    • Interdisciplinary Collaboration: Experience in collaborating with faculty across disciplines to enhance learning experiences, integrating insights from various fields, including computer science, business, and data science.
    • Use of Technology in Education: Proficient in utilizing educational technologies and learning management systems to enhance teaching effectiveness and facilitate online and hybrid learning environments.
    • Research Integration in Teaching: Ability to incorporate current research and trends in information systems and cybersecurity into the classroom, ensuring that students are exposed to the latest developments in the field.
    • Diversity and Inclusion in Teaching: Strong commitment to fostering an inclusive classroom environment that respects diverse perspectives and backgrounds, enabling all students to thrive academically and personally.

    Soft Skills

    • Communication: Strong verbal and written communication skills, enabling clear and effective interaction with students, colleagues, and industry professionals.
    • Empathy: Ability to understand and respond to the diverse needs and challenges of students, fostering a supportive and inclusive classroom environment.
    • Adaptability: Flexibility in adapting teaching methods and materials to meet the evolving needs of students and the rapidly changing landscape of information systems and cybersecurity.
    • Collaboration: Skilled in working collaboratively with faculty, staff, and industry partners to enhance educational programs and create interdisciplinary learning opportunities.
    • Mentorship: Passion for guiding and supporting students in their academic and professional journeys, helping them navigate challenges and achieve their goals.
    • Critical Thinking: Analytical skills to assess cybersecurity risks and devise effective teaching strategies to address them.
    • Problem-Solving: Strong analytical and critical thinking skills, enabling the identification of challenges and the development of effective solutions in both academic and collaborative settings.
    • Time Management: Effective in balancing multiple responsibilities, including teaching, research, and administrative duties, while ensuring timely completion of tasks and projects.
    • Cultural Competence: Awareness and appreciation of diverse cultural perspectives, enhancing the learning experience for a broad range of students in a multicultural environment.
    • Continuous Learning: Commitment to personal and professional development, staying current with trends in information systems and education to enhance teaching practices.

    Industry Knowledge & Research

    • Industry Trends Awareness: Deep understanding of current trends and developments in information systems and cybersecurity, enabling the integration of real-world applications into the curriculum.
    • Research Methodology: Proficient in qualitative and quantitative research methods, equipping students with the skills to conduct their own research and engage in critical analysis of data.
    • Applied Research Experience: Demonstrated experience in conducting applied research that addresses practical challenges in the field, contributing to the advancement of knowledge and best practices.
    • Partnership Development: Ability to establish and maintain collaborative relationships with industry partners, enhancing opportunities for student internships, projects, and guest lectures.
    • Grant Writing and Funding Acquisition: Experience in writing successful grant proposals and securing funding for research initiatives, providing insights into the research funding landscape.
    • Publication Record: A strong track record of publishing research in reputable journals and conferences, showcasing expertise and contributing to the academic community.
    • Curriculum Integration of Research: Skill in integrating research findings into course content, ensuring that students are exposed to the latest developments and methodologies in the field.
    • Interdisciplinary Research Collaboration: Ability to collaborate on interdisciplinary research projects that combine insights from information systems, data science, and related fields.
    • Consultative Expertise: Experience providing consulting services to organizations, allowing for the practical application of research findings and theories in real-world scenarios.
    • Community Engagement: Commitment to engaging with the local and global community through research initiatives, workshops, and outreach programs that promote knowledge-sharing and collaboration.

    Educational Technologies

    • Learning Management Systems (LMS): Proficient in using LMS platforms (e.g., Moodle, Blackboard) for course management, communication, and assessment, enhancing the online learning experience for students.
    • Online and Hybrid Teaching Tools: Skilled in employing various online teaching tools (e.g., Zoom, Microsoft Teams, Google Classroom) to facilitate engaging and interactive learning environments for both in-person and remote learners.
    • Multimedia Content Creation: Ability to create and integrate multimedia resources (videos, podcasts, interactive simulations) into course materials, catering to diverse learning styles and enhancing student engagement.
    • Assessment Technologies: Familiarity with digital assessment tools (e.g., Turnitin, Quizlet, Kahoot) for creating formative and summative assessments that provide timely feedback to students.
    • Data Analytics in Education: Knowledge of using data analytics tools to track student performance and engagement, enabling data-driven decision-making to improve teaching strategies and student outcomes.
    • Gamification: Experience in incorporating gamification techniques within the curriculum to motivate and engage students, making learning more interactive and enjoyable.
    • Adaptive Learning Technologies: Understanding of adaptive learning platforms that personalize the learning experience based on individual student needs and progress.
    • E-Portfolio Systems: Familiarity with e-portfolio platforms that allow students to showcase their work and reflect on their learning experiences, promoting self-assessment and career readiness.
    • Virtual and Augmented Reality: Awareness of the potential applications of VR and AR in education, exploring innovative ways to enhance learning experiences in information systems and cybersecurity.
    • Technical Support and Training: Ability to provide technical support and training for students and faculty on the effective use of educational technologies, ensuring smooth integration into the learning process.

    Ethical and Legal Knowledge

    • Ethical Hacking Standards: Knowledge of ethical hacking laws and guidelines, ensuring ethical conduct in penetration testing and vulnerability assessments.
    • Data Privacy and Compliance: Awareness of data protection laws such as GDPR.
    • Professional Ethics: Upholding and teaching the principles of cybersecurity ethics, including the responsible use of information, tools, and access to sensitive data.

    Certifications (Selected)

    CISSP (Certified Information Systems Security Professional)

    ISC2 2024

    • (Note) : in the process of obtaining this certificate
    • CISSP is a globally recognized certification in information security. It validates your knowledge and expertise in a wide range of security domains

    Data Protection and Information Security

    King's College London . 2021

    • The Data Protection and Information Security (Information Compliance) certificate is typically awarded to individuals who have completed training or education in the areas of data protection, information security, and regulatory compliance. This certification usually covers key topics:
      • Data Protection Regulations
      • Information Security
      • Information Compliance
      • Risk Management
      • Confidentiality and Integrity

    Personal Tutor Training certificate

    King's College London . 2021

    • Completing a full training course of personal tutor.

    Ethical Hacking: Exploit and The Complete Malware Analysis Process

    Coursera . 2020

    • Advances in Malware analysis and the use of top ethical hacking tools and scripts

    IBM Blockchain Developer Training and Certification

    IBM . 2020

    • This certificate provides individuals with the skills and knowledge needed to develop and deploy blockchain applications on the Hyperledger Fabric platform. Through comprehensive training programs, participants gain hands-on experience with blockchain concepts, architecture, and development tools. The certification validates their expertise and opens up opportunities for careers in blockchain technology.

    Management Services (CPE)

    Becker Professional Education . 2020

    • Becker Professional Education offers a variety of Management Services (CPE) courses designed to help professionals maintain their continuing professional education requirements. These courses cover a wide range of topics, including leadership, management, business strategy, and ethics.

    certificate of Appreciation

    HCT Academic Succes Center . 2020

    • In recognition of my dedication and valuable contribution as a Faculty Tutor at Academic Success Center in the HCT

    IBM Security Intelligence - IBM Q Radar

    IBM - Higher Colleges of Technology . 2019

    • IBM QRadar is a comprehensive security information and event management (SIEM) platform that helps organizations detect and respond to cyber threats. It collects and analyzes data from various sources, including network devices, servers, and applications, to identify suspicious activity and potential security breaches. QRadar provides real-time threat detection, incident response capabilities, and compliance reporting, enabling organizations to protect their valuable assets and maintain a strong security posture.

    CCNA Security Certificate

    CISCO Academy . 2019

    • Cover all important network security fundamentals

    Hikvision Certified Security Associate (HCSA) Certificate

    HikVision . 2019

    • The Hikvision Certified Security Associate (HCSA) certificate is a valuable credential for individuals working in the security industry. It demonstrates a solid understanding of Hikvision security products and solutions, including video surveillance systems, access control, and intrusion detection. By obtaining the HCSA certification, individuals can enhance their career prospects, increase their earning potential, and gain a competitive edge in the job market.

    AccessData (FTK) Certified Examiner

    Exterro (Former is AccessData) . 2018

    • Very well certificate covering advances in digital forensics

    Emirates Technology Innovation Competition (Cybersecurity)

    Emirates Technology Innovation Competition (Cybersecurity) . 2017

    • My Team won the Gold Award ( 1st Rank) in Cybersecurity Competition nation wide

    Elsevier Certificate of reviewing

    November, 2017

    • Recognition of the review contributed to the journal of King Saud University - Computer and Information Sciences