Teaching

Teaching is the execution layer of applied research.

My teaching philosophy reflects the Fachhochschule model of applied education that I experienced at Reutlingen University. Courses emphasize learning by building: students design, implement, and evaluate security artifacts, linking theory directly to operational systems and industry practice.

This approach integrates Design Science Research Methodology (DSRM), emphasizing learning through the design, construction, and evaluation of artifacts. Students do not merely study security concepts—they build identity systems, implement controls, and test them under realistic threat scenarios.

By aligning coursework with research artifacts and industry practices, students graduate with skills that translate directly into operational environments, research programs, and critical infrastructure roles.

Courses

CIS 6358GraduateFeatured
Secure Software Design
Spring 2026Fall 2025
Principles and practices for designing secure software systems from the ground up. Covers threat modeling, secure architecture patterns, identity-first design, and Zero Trust principles applied to software development.

Learning Outcomes

  • Apply threat modeling methodologies to software systems
  • Design secure authentication and authorization architectures
  • Implement secure coding practices and defensive programming
  • Evaluate security trade-offs in system design decisions

Prerequisites

Software EngineeringBasic Security Concepts

Lab Focus

IAMThreat ModelingSecure SDLC
CIS 3351UndergraduateFeatured
Intrusion Detection and Incident Response
Spring 2026Fall 2025Spring 2025
Detection, analysis, and response to security incidents. Emphasizes identity-based detection, behavioral analytics, SIEM operations, and coordinated response procedures for enterprise environments.

Learning Outcomes

  • Configure and tune intrusion detection systems
  • Analyze security events and identify attack patterns
  • Develop and execute incident response plans
  • Conduct forensic analysis and evidence preservation

Prerequisites

Network SecurityOperating Systems

Lab Focus

IRForensicsSIEM
CIS 3337UndergraduateFeatured
Secure Application Design
Spring 2026Fall 2025Spring 2025
Fundamentals of building secure applications with emphasis on authentication, authorization, input validation, and secure coding practices. Students learn to identify and mitigate common vulnerabilities.

Learning Outcomes

  • Implement secure authentication and session management
  • Apply input validation and output encoding techniques
  • Identify and remediate OWASP Top 10 vulnerabilities
  • Design applications with defense-in-depth principles

Prerequisites

Programming FundamentalsWeb Development

Lab Focus

Secure CodingOWASPAppSec
CIS 2336Undergraduate
Web Application Development
Spring 2026Fall 2024
Comprehensive introduction to modern web application development. Covers front-end technologies, back-end frameworks, databases, and deployment with security considerations integrated throughout.

Learning Outcomes

  • Build full-stack web applications using modern frameworks
  • Implement RESTful APIs and database integrations
  • Apply security best practices in web development
  • Deploy and maintain web applications in cloud environments

Prerequisites

Programming Fundamentals

Lab Focus

Full-StackAPIsCloud Deployment
CIS 4374Undergraduate
Information Systems Project Management
Spring 2026Spring 2024
Project management principles applied to information systems and cybersecurity initiatives. Covers agile methodologies, risk management, stakeholder communication, and security project governance.

Learning Outcomes

  • Apply project management frameworks to IT initiatives
  • Manage project risks and security considerations
  • Lead cross-functional technical teams effectively
  • Communicate project status to diverse stakeholders

Prerequisites

Information Systems Fundamentals

Lab Focus

AgileRisk ManagementLeadership
TLIM 3330Undergraduate
Innovation Principles
Spring 2026Fall 2025Spring 2025
Leadership principles for technology professionals. Covers innovation management, design thinking, entrepreneurial mindset, and strategic thinking in technology contexts.

Learning Outcomes

  • Apply innovation frameworks to technology challenges
  • Lead cross-functional initiatives with diverse teams
  • Communicate technical value to executive stakeholders
  • Develop entrepreneurial approaches to problem-solving

Prerequisites

None

Lab Focus

LeadershipStrategyDesign Thinking

Teaching Philosophy

Lab-style learning with identity at the core

Identity-First Thinking

Every system design starts with identity: who (or what) is accessing, what are they authorized to do, and how do we verify it continuously.

Adversarial Mindset

Students learn to think like attackers to build better defenses. Threat modeling and red team exercises are core to every course.

Hands-On Labs

Theory is reinforced through practical labs. Students build, break, and fix real systems in controlled environments.

Real-World Relevance

Curriculum draws from industry practice and current research. Students work on problems that matter to practitioners.

Student Outcomes

Preparing the next generation of security professionals

200+

Students Trained

95%

Employment Rate

15

Research Assistants

8

PhD Students

Research Opportunities

Join My Research Group

I'm always looking for motivated PhD students and research assistants interested in identity-centric security, AI defense, and critical infrastructure resilience. If you're passionate about these areas, let's talk.