Your Photo
Maher Salem

Associate Professor

Ph.D. Eng. | SFHEA

Cybersecurity Expert

Educational Expert Visionary

Cybersecurity Awareness Quiz - Press "Randomize" to start!

Summary

I am currently an Associate Professor at King's College London (Online Cybersecurity Module Lead | Deputy Chair Cybersecurity | Digital Learning Expert | Career and Employability Lead | SFHEA). Highly accomplished cybersecurity expert with over two decades of experience in both industry and academia, bridging the gap between cutting-edge research and education. With a strong background in computer science and engineering, I am dedicated to advancing cybersecurity knowledge and fostering the next generation of professionals. As a specialist in active learning and innovative methodologies, my goal is to make significant contributions to cybersecurity research, laying a solid foundation for the future of this critical field. Additionally, I leverage my expertise as an active reviewer for top-tier journals, such as Elsevier Computer Security, and as a project proposal assessor for large-scale international government projects, further solidifying my commitment to shaping the cybersecurity landscape.

Languages

  • Arabic - Mother tongue
  • English - Proficient
  • German - Advanced
  • Tools for IDS and More

    AI-VSFTPD-Exploit

    A tool to automate the exploit of VSFTPD backdoor vulnerability AI-driven approach

    Available on :GitHub

    MalwareXplorer

    Your gateway to malware classification and MITRE ATT&CK insights

    Available on :GitHub

    IDSify

    This tool can help process your dataset that include mixture of numerical and nominal features. The tool will help converting all nominal features into numeric ones

    Available on :GitHub

    ConfusionCalc IDS

    This is a GUI tool help calculates the confusion matrix of intrusion detection system if you have already : True Negative, True Positive, False Negative, False Positive.

    Available on : GitHub

    DictHunter

    This tool is to demonstrate a dictionary attack on the Damn Vulnerable Web Application (DVWA).

    Available on : GitHub

    Supervised Theses with Results

    Academic Awards and Professional Affiliations

    Academic Honors and Awards

    • King’s Education Award (Nominated) – King's College London . 2024
    • SFHEA - Senior Fellow Higher Education Academy Certificate – Advance HE . 2024
    • Recognition Award for Contribution at King’s – King's College London . 2022 & 2023

    Membership of Professional Bodies

    • Member of King's Computing Education Research Centre (CERC) . September 2024 - Present
    • Member of the Society for Research into Higher Education (SRHE) . January 2024 - Present
    • Member of CSE Connect King's College London . Cyber Security Education Network (UK) . January 2024 - Present
    • Member of the Association for Learning Development in Higher Education (ALDinHE) . December 2023 - Present
    • Member at King’s Academy of Education and Innovation . January 2022 - Present
    • Cybersecurity Speaker . Al Arabiya news television channel in the UK . January 2022 - Present
    • Member at King's College . Cybersecurity Group – Enterprise and Engagement Group . Sep 2021 - Present
    • Member of Campus Council . Higher Colleges of Technology . September 2019 - July 2021

    Positions

    Education

    Projects (Selected)

    King’s Undergraduate Research Fellowship

    • King's College London. July 2023 & July 2024
    • Lead and supervise UG and PG students in summer research projects.
    • Coordinate multiple projects for UG in cybersecurity research.
    • Budget = £10000

    Measuring the Effectiveness of Online Cybersecurity Postgraduate Programs from Career Perspectives

    • King's College London. May 2023 - February 2024
    • Design and investigate the feasibility of using cybersecurity in higher education.
    • Contribute to the building of a successful cybersecurity training for professionals.
    • Linking academia with industry from a cybersecurity perspective.
    • Budget = £5000

    Challenges of Integrating Robots with Embodied Intelligence (CIREI) in the Homes of Older People Living with Frailty: Towards a Smart Middleware Architecture

    • UKRI – EMERGENCE - King’s College London. 2023 - 2024
    • The CIREI project is doing the basic engineering that will make it easier to securely connect different devices in and around our homes.
    • Multi-disciplinary projects to improve health systems flexibility and security.
    • Budget = £80,000

    Cybersecurity Training Qatar Central Bank

    • King's College London - Qatar Central Bank. 2023 - October 2023
    • Design, develop and deliver a full cybersecurity training program about advanced topics.
    • Demonstrate real-life scenarios of advanced threats.
    • Budget = ££££

    Determinants and Implications of the Blockchain Technology in the UAE Financial Markets: Towards a New Clearing and Settlement Platform

    • Higher Colleges of Technology. September 2020 - August 2022
    • Investigate the feasibility of blockchain deployment in the financial sector in the UAE.
    • Design a business process model for the securities transactions.
    • Budget = 200,000 AED

    (UAE-STUB): UAE - Securing Transportation Using Blockchain

    • Higher Colleges of Technology. October 2019 - July 2020
    • Design and develop blockchain-based technology to identify malicious vehicles.
    • Design and develop a secure monitoring system for transportation.
    • Budget = 5000 AED

    Application of Blockchain in Trading, Clearing and Settlement System of Abu Dhabi Securities Exchange

    • Higher Colleges of Technology. January 2019 - December 2019
    • Research Grant Fund from Zayed Excellence Center to investigate the use of Blockchain in UAE.
    • Budget = 200,000 AED

    IntErA - Intelligent Detection of Cyber-Attacks on IT-Infrastructures

    • Kassel University. Sep 2014 - Dec 2017
    • Write a full proposal and secure the funding of 400K Euros.
    • Design and draft the use of advanced and adaptive intrusion detection.
    • Propose the idea of an adaptive database to automatically build malware patterns.
    • Budget = 370,000 Euros

    SecMonet - Research Project in Network Security

    • Kassel University. January 2011 - May 2014
    • Lead and supervise the project.
    • Design and build an advanced feature selection method.
    • Design and develop an adaptive intrusion detection system using Machine Learning.
    • Organize and coordinate multiple national and international events and workshops.
    • Budget = 370,000 Euros

    Academic-Industrial experiences

    Associate Professor at King's College London

    September 2021 - Present, London

    • Design and development of advanced postgraduate-level cybersecurity modules aiming to equip students with practical knowledge.
    • Secured multiple research funding projects with industrial bodies to enhance research profile.
    • Teaching, supervising, and tutoring undergraduate and postgraduate students in the informatics department, emphasizing hands-on experience in cybersecurity practices
    • Recipient of the King’s Recognition Award (2021/2022) and nominated for the King’s Teaching Excellence Award (2022/2023), reflecting a commitment to excellence in cybersecurity education
    • Deputy Chair of the online cybersecurity assessment sub-board committee, contributing to the enhancement of assessment methodologies, especially those related to cybersecurity skills.
    • Active public speaker, panellist, workshop facilitator, media presenter, and advocate for cybersecurity awareness, promoting the importance of education in cybersecurity
    • IT consultant and advisor for national and international SMEs, providing insights into cybersecurity education strategies

    Assistant Professor at Higher Colleges of Technology

    September 2015 - July 2022, United Arab Emirates

    • Spearheading the design and delivery of undergraduate courses in Computer Science/cybersecurity education.
    • Serving as Deputy Division Chair of Computer Information Science.
    • Teaching, supervising, and tutoring undergraduate students in the CIS department
    • Recognized with an Appreciation Award for excellence in Cybersecurity Teaching and engagement.
    • Contributing to the Program Academic Committee (PAC) to enhance the cybersecurity track.
    • Leading graduate projects, focusing on machine learning, security operations, and cybercrime.
    • Secured multiple research funding projects with industrial bodies to enhance research profile.
    • IT consultant and advisor for national and international SMEs, providing insights into cybersecurity education strategies

    Automotive Cybersecurity Specialist - AUDI

    October 2014 - August 2015, Germany

    • Innovated cybersecurity solutions for Car2X and in-vehicle networking.
    • Led a machine learning-based in-vehicle Intrusion Detection system project.
    • Design, integrated security elements, and conducted penetration testing for automotive insights.

    Cybersecurity Project Lead - Kassel University

    January 2011 - May 2014, Germany

    • Led SecMonet project, implementing adaptive machine learning based IDS/IPS for severe cyber-attacks.
    • Supervising undergraduate and postgraduate graduation projects.
    • Served as Principal Support Investigator for IntErA, driving advancements in cybersecurity research.
    • Directed real-time data analysis using data mining, offering insights for practical cybersecurity education scenarios.
    • Coordinated and supervised students, fostering hands-on skills.
    • Instructor for the Network Security UG course and the cybersecurity lab.

    IT Engineer - 118000-innovations GmbH

    January 2010 - December 2010, Germany

    • Oversaw planning, management, and monitoring of a robust, secure network infrastructure for cybersecurity.
    • Developed advanced scripts for secure data synchronization and replication, emphasizing practical applications in cybersecurity scenarios.
    • Maintained 24/7 IT support, ensuring a resilient and responsive IT environment and implementing security measures to enhance cybersecurity practices.

    Network and System Security Engineer - Nokia, E-Plus, Philips, JoVision

    March 2004 - January 2010, Germany

    • Serve as a cybersecurity consultant, specializing in securing client resources and implementing robust cybersecurity measures.
    • Led multiple projects in cybersecurity threat detection and prevention.

    Teaching experiences

    Summary of Courses Taught

    • Computer Forensics and Cybercrime
    • Systems Analysis and Design
    • Security Engineering
    • Information Systems Security
    • Statistics for Data Science
    • Security Testing (Pentest and Ethical Hacking)
    • Cybersecurity Analysis and Reporting
    • Ethical Hacking and Intrusion Detection
    • Incident Response Planning
    • Risk Management
    • Network Security and IDS/IPS
    • Capstone Projects
    • Security Intelligence

    Participation in Academic Accreditation

    • Artificial Intelligence Undergraduate Program, Academic Career Lead, King’s College London, British Computer Society, 06/2023 – 06/2026
    • Online Cybersecurity Post-Graduate Program, Module Lead, King’s College London, National Cybersecurity Centre (NCSC), 03/2024 - 03/2017
    • Computer Information System Undergraduate Program, Course Contribution, Higher Colleges of Technology, Canada’s Association of IT Professionals (CIPS), 05/2018 – 05/2021

    Research Students Supervised/Trained

    • 2024/2025 Critical Software Vulnerability Discovery using AI – PhD: open
    • 2024/2025 Combating Social Network Fake Accounts Using Threat Intelligence - BSc
    • 2023/2024 Building a self-contained inclusive Virtual Machine for Security Testing for the online cybersecurity programs - BSc
    • 2023/2023 Investigating the use of AI in Protecting Senior Citizens from Cybercriminals – MSc
    • 2022/2023 A project-based learning approach for Cybersecurity online programmes – BSc
    • 2021/2022: Adaptive Malware Pattern Generation Using Machine Learning (Best Project Award) – MSc
    • 2021/2022: Evaluation of Machine Learning Techniques for Detecting Malware in WhatsApp Messages – BSc
    • 2021/2022: Investigating Malware Detection Techniques Using Growing Hierarchical Self-Organizing Map – MSc
    • 2022/2023: Analyzing Student Feedback of an Online Cybersecurity Program Using ML – BSc
    • 2015 – 2020: Supervised 50 BSc Graduation Projects in the Cybersecurity Domains.
    • 2011 – 2014: Supervised Two MSc Projects in IPv6 Security and Four BSc Projects in the Intrusion Detection Area.

    Academic Training

    • Module Design, King’s Academy, United Kingdom, 09/2021
    • Tutorship Training Program, King’s Academy, United Kingdom, 09/2021
    • PhD Supervision Training, King’s Academy, United Kingdom, 04/2022
    • Diversity Matter and Active Bystander, King’s Academy, United Kingdom, 2022/2023
    • Creating Interactive Learning Resources, King’s Academy, United Kingdom
    • Personalising the Learning Experience, King’s Academy, United Kingdom
    • Becker Management Services, Becker Professional Academy, USA, 07/2020
    • Designing Exemplary Online Learning Spaces, Higher Colleges of Technology, 2019-2020
    • Analysing Technology Integration in Your Classes, Higher Colleges of Technology, 2019-2020
    • Classroom Observation Standards & the UKPSF, Higher Colleges of Technology, 2019-2020
    • Adding Interactivity in Your Online Class, Higher Colleges of Technology, 2019-2020
    • Technology Integration: Collaborating Online with Office 365, Teams, and OneNote for Content Sharing, and Creating Interactive Lessons with Nearpod, Higher Colleges of Technology, 2019-2020
    • Blackboard Essential Certificates, Higher Colleges of Technology, 2019-2020
    • Blackboard Teacher Certificate, Higher Colleges of Technology, 2019-2020

    Professional Experience (Selected)

    Committee member

    Sep 2017 - Present

    • External Examiner Cyber Security for a leading university in the UK . November 2024 - Present
    • Organizing Committee Member at CONF-MPCS 2025 . Oxford - UK
    • External Academic Panel Member at a prestigious academic institution in the UK . November 2024 - Present
    • Evaluator and Assessor of Funding Projects at a prestigious academic institution in Saudi Arabia . August 2024 - October 2024
    • Technical Member at 2022 International Conference on Innovations in Computing Research (ICR’22)
    • Technical Member at IEEE - HCT Information Technology Trends (ITT) Conference
    • Public Chair at ISICS 2020 conference

    Lead Cybersecurity Educator – Harbour Education(Beijing)

    Jan 2022 - Jul 2023

    • Design and develop three main cybersecurity module for professionals and elite students in China.
    • Deliver hybrid sessions and webinars of advance topics in cybersecurity.

    Reviewer at Elsevier top tier (Q1) Journals

    Jan 2020 - Present

    • Journal Computers & Security
    • Journal of Information Security and Applications.

    Service and Talks to Professional / Public / Industry

    Jan 2015 - Present

    • Keynote Speaker at CONF-MPCS 2025
    • King’s College London Representative for CTF Competitions for London University
    • Panel Member of King’s Professional Recognition in Teaching and Learning programme
    • Professional Development Participator for Cybersecurity Education
    • Lead Career and employability
    • Panel member for the KCL Tech Summit. October 7th, 2023.
    • Conference committee member. International Conference on Innovations in Computing Research (ICR’22).
    • Co-organizing Tech Start-ups event at King’s College London. October 13, 2022
    • Secure industrial partnerships with TryTerra and Sahaj to employ graduate students. Accordingly, they become members of the Industrial Advisory Board. 2022 and 2023.
    • Co-organizing Cybersecurity Workshop Day at King’s College London. May 2023.
    • Lead a workshop of Cybersecurity employability and Career pathway. May 2023
    • Lead a workshop of Collaboration with Microsoft Digital Skills. June 20, 2003.
    • Lead a workshop of collaboration with Apple Secure Programming. October 30, 2024.
    • Interview Panel member for cybersecurity hiring at King’s College London. April 23, 2024.
    • Invited Speaker for Lighting Lunch about Cybersecurity EDI at King’s College London. October 2nd, 2024.
    • Invited Speaker for lunch with lecturer about Cybersecurity Education and AI at King’s College London. November 30, 2022.
    • Invited panel member at Women Of MENA In Technology about Cybersecurity Defense and Offense using AI. June 27, 2024.
    • Invited speaker at Al-Arabiya net about Cybercriminal threats. November 2023.
    • Lead and deliver as a cybersecurity trainer about advanced topics in cybersecurity in Qatar Central Bank. October 2023.
    • Campus Council Member at the Higher College of Technology, Al Ain. Sep 2019 – Oct 2020.

    Publications (Selected)

    Acaademic-Industrial experiences

    Technical Skills

    • OSINT: Proficient in gathering and analyzing publicly available data to support cybersecurity efforts and threat assessments. Skilled in using OSINT tools and techniques to inform decision-making and enhance security posture, with a focus on teaching students the importance of leveraging open source data in their security practices.
    • Endpoint Security: Expertise in securing end-user devices through antivirus solutions, encryption, patch management, and endpoint detection and response (EDR), emphasizing practical applications for students.
    • Application Security: Proficient in secure coding practices and conducting vulnerability testing (SAST/DAST), aimed at integrating these principles into the curriculum for future developers.
    • Incident Response: Strong skills in identifying, responding to, and mitigating cyber incidents, including forensic analysis and root cause investigation, with a focus on developing case studies for educational purposes.
    • Threat Intelligence and Analysis: Ability to gather and analyze threat intelligence data to stay ahead of emerging threats, integrating real-world scenarios into teaching.
    • Penetration Testing & Ethical Hacking: Proficient in penetration testing techniques, vulnerability assessment, and the use of tools such as Metasploit, Burp Suite, and Wireshark.
    • Compliance and Risk Management: Familiarity with industry standards and regulations (e.g., GDPR, ISO 27001), guiding students in understanding compliance frameworks within the context of information systems.
    • Security Operations: Familiarity with Security Information and Event Management (SIEM) systems, log analysis, and continuous monitoring.
    • Malware Analysis and Reverse Engineering: Skills in identifying and analyzing malware behavior to develop defense strategies, providing students with hands-on learning opportunities.

    Instructional Skills

    • Curriculum Development: Expertise in designing and implementing comprehensive curricula that align with industry standards and best practices in information systems and cybersecurity, ensuring students acquire relevant skills for their future careers.
    • Active Learning Strategies: Proficient in employing active learning techniques to engage students, including case studies, group projects, and problem-based learning, fostering critical thinking and practical application of concepts.
    • Technical Instruction: Ability to teach complex technical topics clearly and effectively, utilizing a variety of instructional methods, such as lectures, hands-on labs, and online resources, to accommodate diverse learning styles.
    • Assessment and Evaluation: Skilled in developing and implementing assessment strategies that accurately measure student learning outcomes, providing constructive feedback to enhance student performance and understanding.
    • Mentorship and Student Engagement: Committed to mentoring students through academic projects, research opportunities, and career guidance, creating an inclusive and supportive learning environment that promotes student success.
    • Interdisciplinary Collaboration: Experience in collaborating with faculty across disciplines to enhance learning experiences, integrating insights from various fields, including computer science, business, and data science.
    • Use of Technology in Education: Proficient in utilizing educational technologies and learning management systems to enhance teaching effectiveness and facilitate online and hybrid learning environments.
    • Research Integration in Teaching: Ability to incorporate current research and trends in information systems and cybersecurity into the classroom, ensuring that students are exposed to the latest developments in the field.
    • Diversity and Inclusion in Teaching: Strong commitment to fostering an inclusive classroom environment that respects diverse perspectives and backgrounds, enabling all students to thrive academically and personally.

    Soft Skills

    • Communication: Strong verbal and written communication skills, enabling clear and effective interaction with students, colleagues, and industry professionals.
    • Empathy: Ability to understand and respond to the diverse needs and challenges of students, fostering a supportive and inclusive classroom environment.
    • Adaptability: Flexibility in adapting teaching methods and materials to meet the evolving needs of students and the rapidly changing landscape of information systems and cybersecurity.
    • Collaboration: Skilled in working collaboratively with faculty, staff, and industry partners to enhance educational programs and create interdisciplinary learning opportunities.
    • Mentorship: Passion for guiding and supporting students in their academic and professional journeys, helping them navigate challenges and achieve their goals.
    • Critical Thinking: Analytical skills to assess cybersecurity risks and devise effective teaching strategies to address them.
    • Problem-Solving: Strong analytical and critical thinking skills, enabling the identification of challenges and the development of effective solutions in both academic and collaborative settings.
    • Time Management: Effective in balancing multiple responsibilities, including teaching, research, and administrative duties, while ensuring timely completion of tasks and projects.
    • Cultural Competence: Awareness and appreciation of diverse cultural perspectives, enhancing the learning experience for a broad range of students in a multicultural environment.
    • Continuous Learning: Commitment to personal and professional development, staying current with trends in information systems and education to enhance teaching practices.

    Industry Knowledge & Research

    • Industry Trends Awareness: Deep understanding of current trends and developments in information systems and cybersecurity, enabling the integration of real-world applications into the curriculum.
    • Research Methodology: Proficient in qualitative and quantitative research methods, equipping students with the skills to conduct their own research and engage in critical analysis of data.
    • Applied Research Experience: Demonstrated experience in conducting applied research that addresses practical challenges in the field, contributing to the advancement of knowledge and best practices.
    • Partnership Development: Ability to establish and maintain collaborative relationships with industry partners, enhancing opportunities for student internships, projects, and guest lectures.
    • Grant Writing and Funding Acquisition: Experience in writing successful grant proposals and securing funding for research initiatives, providing insights into the research funding landscape.
    • Publication Record: A strong track record of publishing research in reputable journals and conferences, showcasing expertise and contributing to the academic community.
    • Curriculum Integration of Research: Skill in integrating research findings into course content, ensuring that students are exposed to the latest developments and methodologies in the field.
    • Interdisciplinary Research Collaboration: Ability to collaborate on interdisciplinary research projects that combine insights from information systems, data science, and related fields.
    • Consultative Expertise: Experience providing consulting services to organizations, allowing for the practical application of research findings and theories in real-world scenarios.
    • Community Engagement: Commitment to engaging with the local and global community through research initiatives, workshops, and outreach programs that promote knowledge-sharing and collaboration.

    Educational Technologies

    • Learning Management Systems (LMS): Proficient in using LMS platforms (e.g., Moodle, Blackboard) for course management, communication, and assessment, enhancing the online learning experience for students.
    • Online and Hybrid Teaching Tools: Skilled in employing various online teaching tools (e.g., Zoom, Microsoft Teams, Google Classroom) to facilitate engaging and interactive learning environments for both in-person and remote learners.
    • Multimedia Content Creation: Ability to create and integrate multimedia resources (videos, podcasts, interactive simulations) into course materials, catering to diverse learning styles and enhancing student engagement.
    • Assessment Technologies: Familiarity with digital assessment tools (e.g., Turnitin, Quizlet, Kahoot) for creating formative and summative assessments that provide timely feedback to students.
    • Data Analytics in Education: Knowledge of using data analytics tools to track student performance and engagement, enabling data-driven decision-making to improve teaching strategies and student outcomes.
    • Gamification: Experience in incorporating gamification techniques within the curriculum to motivate and engage students, making learning more interactive and enjoyable.
    • Adaptive Learning Technologies: Understanding of adaptive learning platforms that personalize the learning experience based on individual student needs and progress.
    • E-Portfolio Systems: Familiarity with e-portfolio platforms that allow students to showcase their work and reflect on their learning experiences, promoting self-assessment and career readiness.
    • Virtual and Augmented Reality: Awareness of the potential applications of VR and AR in education, exploring innovative ways to enhance learning experiences in information systems and cybersecurity.
    • Technical Support and Training: Ability to provide technical support and training for students and faculty on the effective use of educational technologies, ensuring smooth integration into the learning process.

    Ethical and Legal Knowledge

    • Ethical Hacking Standards: Knowledge of ethical hacking laws and guidelines, ensuring ethical conduct in penetration testing and vulnerability assessments.
    • Data Privacy and Compliance: Awareness of data protection laws such as GDPR.
    • Professional Ethics: Upholding and teaching the principles of cybersecurity ethics, including the responsible use of information, tools, and access to sensitive data.

    Certifications (Selected)

    CISSP (Certified Information Systems Security Professional)

    ISC2 2024

    • (Note) : in the process of obtaining this certificate
    • CISSP is a globally recognized certification in information security. It validates your knowledge and expertise in a wide range of security domains

    Data Protection and Information Security

    King's College London . 2021

    • The Data Protection and Information Security (Information Compliance) certificate is typically awarded to individuals who have completed training or education in the areas of data protection, information security, and regulatory compliance. This certification usually covers key topics:
      • Data Protection Regulations
      • Information Security
      • Information Compliance
      • Risk Management
      • Confidentiality and Integrity

    Personal Tutor Training certificate

    King's College London . 2021

    • Completing a full training course of personal tutor.

    Ethical Hacking: Exploit and The Complete Malware Analysis Process

    Coursera . 2020

    • Advances in Malware analysis and the use of top ethical hacking tools and scripts

    IBM Blockchain Developer Training and Certification

    IBM . 2020

    • This certificate provides individuals with the skills and knowledge needed to develop and deploy blockchain applications on the Hyperledger Fabric platform. Through comprehensive training programs, participants gain hands-on experience with blockchain concepts, architecture, and development tools. The certification validates their expertise and opens up opportunities for careers in blockchain technology.

    Management Services (CPE)

    Becker Professional Education . 2020

    • Becker Professional Education offers a variety of Management Services (CPE) courses designed to help professionals maintain their continuing professional education requirements. These courses cover a wide range of topics, including leadership, management, business strategy, and ethics.

    certificate of Appreciation

    HCT Academic Succes Center . 2020

    • In recognition of my dedication and valuable contribution as a Faculty Tutor at Academic Success Center in the HCT

    IBM Security Intelligence - IBM Q Radar

    IBM - Higher Colleges of Technology . 2019

    • IBM QRadar is a comprehensive security information and event management (SIEM) platform that helps organizations detect and respond to cyber threats. It collects and analyzes data from various sources, including network devices, servers, and applications, to identify suspicious activity and potential security breaches. QRadar provides real-time threat detection, incident response capabilities, and compliance reporting, enabling organizations to protect their valuable assets and maintain a strong security posture.

    CCNA Security Certificate

    CISCO Academy . 2019

    • Cover all important network security fundamentals

    Hikvision Certified Security Associate (HCSA) Certificate

    HikVision . 2019

    • The Hikvision Certified Security Associate (HCSA) certificate is a valuable credential for individuals working in the security industry. It demonstrates a solid understanding of Hikvision security products and solutions, including video surveillance systems, access control, and intrusion detection. By obtaining the HCSA certification, individuals can enhance their career prospects, increase their earning potential, and gain a competitive edge in the job market.

    AccessData (FTK) Certified Examiner

    Exterro (Former is AccessData) . 2018

    • Very well certificate covering advances in digital forensics

    Emirates Technology Innovation Competition (Cybersecurity)

    Emirates Technology Innovation Competition (Cybersecurity) . 2017

    • My Team won the Gold Award ( 1st Rank) in Cybersecurity Competition nation wide

    Elsevier Certificate of reviewing

    November, 2017

    • Recognition of the review contributed to the journal of King Saud University - Computer and Information Sciences