Lecturer (Assistant Professor), Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University, Egypt.
Division of Cyber Security, Abertay University, Dundee, Scotland, UK.
Assistant Lecturer, Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University, Egypt.
Teaching Assistant, Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University, Egypt.
This aim of this course is to give an overview of Computer Forensics. Students will learn how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. The course specifically covers topics of digital forensic processes, hardware forensics, digital forensic tools, forensic readiness, networks forensics, live forensics, professionalism and ethics.
Textbook:
Joakim Kävrestad. "Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications”, ISBN 978-3-030-38953-6. 2nd edition. 2020 https://doi.org/10.1007/978-3-030-38954-3
This course gives students a theoretical and practical grounding in Internet of Things (IoT), covering IoT systems architecture, hardware platforms, embedded programming and debugging, networking paradigms for IoT, IoT security, secure operation, cloud integration, and simple data analytics.
Textbook:
Chantzis F. et. al. (2021) Practical IoT Hacking. The Definitive Guide to Attacking the Internet of Things.
This course enables students to understand and implement common data structures and learn to manipulate those data structures using C++.
This course familarise students technical writing skills needed especially for computer science field. Studetns learn to write business letters, memos and emails. Moreover, they are introduced to reporting in software houses as well as practice different soft skills required for various jobs.
An undergraduate module, teaching the foundation of communication and computer networking, concepts and protocols.
An undergraduate module that introduces the core ideas of computer architecture for students studying the subject of computing.
In this course, students understand the basic concepts of computer security. Classical techniques are first presented (like Play Fair, Hill Cipher, ... etc.), then we move to Data Encryption Standard (DES) and Advanced Encryption Standard (AES).
Also, Public-Key cryptography and Key Exchange methodologies are explained. Students are asked to implement some of the presented algorithms.
I initiated having a unit test project to automate and auto-grade the delivery of the projects.
Programming Language used: C# and Python.
In this course, students understand the basic concepts of analysis using Big-Oh notations. Also, design paradigms are explained (Divide and Conquers, Dynamic programming and Greedy algorithms). At the end of the course, students are asked to implement a project to show how efficient algorithms can differ from naïve ones. For example, projects can be implementing RSA algorithm using Karatsuba Multiplication and Big Integers or Image quantization using K-Means and so on.
Programming Language used: C++, C# and Java.
In this course, Kernel mail modules are explained to students mai
nly CPU Scheduling, Memory Management and Shared Resources handling. Through the course students implement memory management module in a simple but real operating system.
Programming Language used: C.
In this course, Assembly language based on Intel386 processor
is explained to students to help them and guide them understand low level concepts.
Copyright © 2018 Hanan Hindy - All Rights Reserved.