Academic
Academic profiles & research impact
Citations: 768 (443 since 2016)
h-Index: 12 (as of January 2023)
Research Interest Score: 273 (as of January 2023)
Degrees
Doctor of Philosophy (Ph.D.), 2014 - 2019
Orta Doğu Teknik Üniversitesi (Middle East Technical University), Informatics Institute
Information Systems, Artificial Intelligence
Thesis: Multi-Perspective Analysis and Systematic Benchmarking for Binary-Classification Performance Evaluation Instruments (Full Text) (Abstract, Visual Abstract)
Master of Science (MSc, CE), 2004 - 2005
Gazi Üniversitesi (Gazi University), Department of Computer Engineering
Information Security
Thesis Topic: Analysis, Design and Implementation of Computer Activity Monitoring and Countermeasures
Master of Science (MSc, IE), 1997 - 1998
Boğaziçi Üniversitesi (Bosphorus University), Department of Industrial Engineering
Course attendance, no graduation.
Bachelor's Degree (BSc, Control and Computer Eng.), 1992 - 1996
İstanbul Teknik Üniversitesi (Istanbul Technical University), English Preparatory Program
İstanbul Teknik Üniversitesi (Istanbul Technical University) , Double Major: Control and Computer Engineering
Thesis: Multi-Perspective Analysis and Systematic Benchmarking for Binary-Classification Performance Evaluation Instruments (Full Text) (Abstract, Visual Abstract)
Undergraduate Degree (English), 1991 - 1992
İstanbul Teknik Üniversitesi (Istanbul Technical University), English Preparatory Program
Teaching activities
Distant Education Program, Cyber Security Non-Thesis Master's Program
Course: Current Threats in Cyber Security and Defensive Methods
Information security and its aspects: beyond C-I-A triad
Cyberspace and security
Information and cyber security principles
Cyber defense: pitfalls and dilemmas
Hack, hacking, and hackers: white, gray, and black hat
Cyber threats, threat actors
Cyber attacks: taxonomy and elements
Indicator of comprimise: pyramid of pain and TTP
Cyber threat intelligence
Emerging threats, cyber risks, risk mitigation
Cyber Kill Chain® by Lockheed Martin: offensive and defensive perspective
MITRE's ATT&CK Knowledge Base and Attack Navigator
Other kill chain and attack models
Risk, cyber risk and components, risk mitigation strategies and controls
History and global approaches in cyber defense
Course: Software / Malicious Software
Computer programs and software
Software life cycle and stakeholders: software supply chain attacks
(Normal) software vs. malicious software
Offensive and defensive view of software
Malicious software taxonomy
Malware propagation and infection
Risk factors for malware
Trust in software: Ken Thompson
Protection ring
Workforce in cyber security
Information: going up in the data-information-knowledge-wisdom (DIKW) ladder
Parkerian hexad
Information security classification and labeling
Critical threat in software security: fragmentation (desktop, mobil [Android/iOS] cases)
Insider threats in software development life cycle and defense
Payloads: from easter eggs to malicios ones
Turing machine and universal turing machine
Virus: biolagical vs cyber
Computer virus history, life cycle, infection, risks, and mitigation
A course series for information and computer security
Course Series: Information and Cyber Security from Foundations to Advanced Level
Over 50 hours of courses:
A-The Foundations (14 hours, 46 lessons)
B-The Middle Level (16 hours, 57 lessons)
C-The Advanced Level (12 hours, 44 lessons)
E-Introduction to Malware (11 hours, 50 lessons)