Academic profiles & research impact

Citations: 468 (297 since 2016)

h-Index: 9 (as of May 2021)

RG Score: 7.55 (as of May 2021)

Follow me


Doctor of Philosophy (Ph.D.), 2014 - 2019

Master of Science (MSc, CE), 2004 - 2005

Gazi Üniversitesi (Gazi University), Department of Computer Engineering

Information Security

Thesis Topic: Analysis, Design and Implementation of Computer Activity Monitoring and Countermeasures

Master of Science (MSc, IE), 1997 - 1998

Boğaziçi Üniversitesi (Bosphorus University), Department of Industrial Engineering

Course attendance, no graduation.

Bachelor's Degree (BSc, Control and Computer Eng.), 1992 - 1996

Undergraduate Degree (English), 1991 - 1992

Teaching activities

Parttime Lecturer, Akhmet Yassawi University, 2019 -

Distant Education Program, Cyber ​​Security Non-Thesis Master's Program

Course: Current Threats in Cyber ​​Security and Defensive Methods

  • Information security and its aspects: beyond C-I-A triad

  • Cyberspace and security

  • Information and cyber security principles

  • Cyber defense: pitfalls and dilemmas

  • Hack, hacking, and hackers: white, gray, and black hat

  • Cyber threats, threat actors

  • Cyber attacks: taxonomy and elements

  • Indicator of comprimise: pyramid of pain and TTP

  • Cyber threat intelligence

  • Emerging threats, cyber risks, risk mitigation

  • Cyber Kill Chain® by Lockheed Martin: offensive and defensive perspective

  • MITRE's ATT&CK Knowledge Base and Attack Navigator

  • Other kill chain and attack models

  • Risk, cyber risk and components, risk mitigation strategies and controls

  • History and global approaches in cyber defense

Course: Software / Malicious Software

  • Computer programs and software

  • Software life cycle and stakeholders: software supply chain attacks

  • (Normal) software vs. malicious software

  • Offensive and defensive view of software

  • Malicious software taxonomy

  • Malware propagation and infection

  • Risk factors for malware

  • Trust in software: Ken Thompson

  • Protection ring

  • Workforce in cyber security

  • Information: going up in the data-information-knowledge-wisdom (DIKW) ladder

  • Parkerian hexad

  • Information security classification and labeling

  • Critical threat in software security: fragmentation (desktop, mobil [Android/iOS] cases)

  • Insider threats in software development life cycle and defense

  • Payloads: from easter eggs to malicios ones

  • Turing machine and universal turing machine

  • Virus: biolagical vs cyber

  • Computer virus history, life cycle, infection, risks, and mitigation