University Teaching

I am currently an adjunct professor in the School of Computer and Information Sciences at UC. I teach at the Graduate level. My students are Masters and Ph.D degree students. I also serve on dissertation committees for Ph.D candidates in this phase of their degree pursuits.

For coursework, my main teaching assignments largely fall into two courses:

Application Security



This course dives into Security Strategies specifically in Microsoft Windows Desktop and Server Platforms as well as Microsoft Applications. The course is designed to provide fully immersive mock IT infrastructures with live virtual machines and real software, where students learn and practice foundational information security skills they will need for career pursuits in IT security. Unlike simulations, the hands-on virtual labs reproduce real world challenges, without the need for on-premise server assets at the university. The cloud-based virtual Cybersecurity Labs are an essential tool for mastering concepts in this course through hands-on training.
The Labs:
Lab 1: Implementing Access Controls with Windows Active Directory
Lab 2: Using Access Control Lists to Modify File System Permissions on Windows Systems
Lab 3: Configuring Microsoft Encrypting File System and BitLocker Drive Encryption
Lab 4: Identifying and Removing Malware from Windows Systems
Lab 5: Managing Group Policy within the Microsoft Windows Environment
Lab 6: Auditing Windows Systems for Security Compliance 
Lab 7: Creating a Scheduled Backup and Replicating System Folders
Lab 8: Hardening Windows Systems for Security Compliance 
Lab 9: Securing Internet Client and Server Applications on Windows Systems 
Lab 10: Investigating Security Incidents within the Microsoft Windows Environment 

Managing Risk in Information Systems



This course explores the management of risk in Information Systems. It covers the fundamentals of risk and risk management and also includes in-depth details on more comprehensive risk management topics. It is divided into three major parts. 
Part 1. Risk Management Businesses Challenges. addresses many of the issues relevant to present-day businesses. It covers details of risks, threats, and vulnerabilities. Topics help students understand the importance of risk management in the organization. Including many of the techniques used to manage risks. Many of the current laws are presented with clear descriptions of how they are relevant in organizations. It also includes a chapter describing the contents of a risk management plan. 
Part 2. Mitigating Risk, focuses on risk assessments. Topics presented include different risk-assessment approaches, including the overall steps in performing a risk assessment. It covers the importance of identifying assets and then Identifying potential threats. vulnerabilities, and exploits against these assets. The text covers the different types of controls that are used to mitigate risk. The last two chapters in this part identify how to plan risk mitigation throughout the organization and convert the risk assessment into a risk management plan. 
Part 3. Risk Mitigation Plans. This section covers the many different elements of risk mitigation plans, such as a business Impact analysis and a business continuity plan. The last two chapters cover disaster recovery and computer Incident response team plans. 
The Labs: 
Lab 1: Identifying and Exploiting Vulnerabilities
Lab 2: Conducting a PCI DSS Compliance Review
Lab 3: Preparing a Risk Management Plan
Lab 4: Performing a Risk Assessment
Lab 5: Creating an IT Asset Inventory
Lab 6: Managing Technical Vulnerabilities
Lab 7: Developing a Risk Mitigation Plan
Lab 8: Implementing a Risk Mitigation Plan
Lab 9: Performing a Business Impact Analysis
Lab 10: Analyzing the Incident Response Process
Search