Samir Ahmed Elsagheer Mohamed

Associate Professor
samir.elsagheer@ejust.edu.eg

Personal Info

Building 7 Second Floor F2-12

CSE

Samir Ahmed Elsagheer Mohamed was born in Sohag, Egypt in 1972. He received the B.Sc. degree in computer and control systems, from the Faculty of Engineering at the University of Assuit, Egypt, in May 1994. He received the M.Sc. and Ph.D. degrees in Computer Science and Engineering from the University of Rennes I, France, in 1998 and 2003, respectively. He worked as R&D Expert Engineer in INRA/IRISA, France after graduation. Then he joined the Faculty of Engineering, Aswan University as Assistant Professor. After that, he joined the College of Computer, Qassim University as Assistant Professor from 2006 to 2013. He was promoted to Associate professor and continue working with Qassim University till Aug. 2019. Finally, he joined the Egypt-Japan University for Science and Technology in Sept. 2019. He is in charge of the IT center and the Data Center as well as teaching and research. His research interests are in Network Security, Cyber Security, Security in Internet of Vehicles (IoV) and connected vehicles, Smart Electric Vehicles, Traffic violation detection and reporting using IoV for Smart Cities, Smart Traffic Management for Smart Cities, Automated Toll Collection for the IoV and Smart Electric Vehicles, Secure and accurate localization services for IoV, Traffic safety and optimization, Street Lights optimization and control, Vehicular Ad hoc Networks (VANET), Accident Avoidance Technique for Smart Cities, Intelligent Transportation Systems, Indoors and outdoors localization, Anti-phishing techniques. He has got 13 grants for research projects in different areas and from different grantors.



Impacted Journal

  1. Muhamed Albadawi, Yasser Abuouf, Samir Elsagheer, Shinichi Ookawara, and Mahmoud Ahmed, "Predicting the onset of consequent stenotic regions in carotid arteries using computational fluid dynamics", Physics of Fluids 33, 123106 (2021) https://doi.org/10.1063/5.0068998
  2. Samir A. Elsagheer Mohamed, Khaled A. AlShalfan, "Intelligent Traffic Management System Based on the Internet of Vehicles (IoV)", Journal of Advanced Transportation, vol. 2021 . https://doi.org/10.1155/2021/4037533
  3. Samir A. Elsagheer Mohamed, et al., "Autonomous Real-Time Speed-Limit Violation Detection and Reporting Systems Based on the Internet of Vehicles (IoV)", Journal of Advanced Transportation, vol. 2021, 2021. https://doi.org/10.1155/2021/9888789

  4. Samir A. Elsagheer Mohamed, Mohammed T. Parvez, et al. “Tailgating Violation Detection and Reporting Based on Internet of Vehicle (IoV)”, under submission.
  5. Samir A. E. Mohamed, Allam Shehata, and Mohamed T. Ben Othman. (2014) Virtual Learning System (Miqra’ah) for Quran Recitations for Sighted and Blind Students. Journal of Software Engineering and Applications, Vol. 7, No. 4, pp. 195-205. doi:10.4236/jsea.2014.74021.
  6. Samir A. E. Mohamed, Allam Shehata, and Mohamed T. Ben Othman (2014) Educational System for the Holy Quran and Its Sciences for Blind and Handicapped People Based on Google Speech API. Journal of Software Engineering and Applications, Vol. 7, No. 3, 150-161. doi: 10.4236/jsea.2014.73017.
  7. Samir A. Elsagheer Mohamed. "Secure Position Verification Approach for Wireless Ad-hoc Networks", International Journal of Network Security (IJNS), Vol. 15, No. 1, 2013, pp. 248-255. Impact Factor: 1.3921 (2012).
  8. Samir A. Elsagheer Mohamed. "Efficient Spam Filtering System based on Smart Cooperative Subjective and Objective Methods". International Journal of Communications, Network and System Sciences,  pp. 88-99, 2013. doi: 10.4236/ijcns.2013.62011
  9. Samir A. Elsagheer Mohamed. Smart Street Lighting Control and Monitoring System for Electrical Power Saving by Using VANET. International Journal of Communications,  Network and System Sciences, vol. 6, no. 8, 2013 doi: 10.4236/ijcns.2013.68038
  10. Nasr and S. Mohamed, "Accurate Distance Estimation for VANET Using Nanointegrated Devices," Optics and Photonics Journal, Vol. 2 No. 2, 2012, pp. 113-118. doi: 10.4236/opj.2012.22015.
  11. Samir A. Elsagheer Mohamed, "A Solution for Fighting Spammer's Resources and Minimizing the Impact of Spam," Int'l J. of Communications, Network and System Sciences, Vol. 5 No. 7, 2012, pp. 416-422. doi: 10.4236/ijcns.2012.57051.
  12. Samir A. Elsagheer Mohamed, A. Naser, G.A. Ansari. Precise Positioning Systems for Vehicular Ad-hoc Networks. International Journal of Wireless & Mobile Networks (IJWMN), Vol 4, No 2,  2012; doi: 10.5121/ijwmn.2012.4217
  13. Samir A. Elsagheer Mohamed. Why the Accuracy of the Received Signal Strengths as a Positioning Technique was not accurate? In the International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 3. June 2011, pp. 69-82.   doi: 10.5121/ijwmn.2011.3306
  14. Gufran A. Ansari, Samir A. Elasgheer Mohamed and M.P.Syed. Modeling of a Component-Based Software Through UML Using Object-Oriented Approach. The IUP Journal of Systems Management, Vol.9, No. 3, August 2011, pp. 42-53
  15. Sebastian Basterrech; Samir Mohammed; Gerardo Rubino; Mostafa Soliman. Levenberg--Marquardt Training Algorithms for Random Neural Network. In the Oxford Computer Journal 2009; 54 (1): 125-135 doi: 10.1093/comjnl/bxp101, ISI impact factor: 1.394.
  16. Mostafa I. Soliman,   Samir A. Mohamed, “A highly efficient implementation of a backpropagation learning algorithm using matrix ISA”. In the Journal of Parallel and Distributed Computing, Vol. 68, no. 7,  pp. 949-961 , Elsevier, 2008. doi: 10.1016/j.jpdc.2007.12.004, ISI impact factor: 1.116
  17. S. Mohamed, G. Rubino, and M. Varela. Performance evaluation of real-time speech through a packet network: a random neural networks-based approach. Performance Evaluation Journal, vol. 57, no. 2, pp. 141-161, June 2004. Elsevier, doi: 10.1016/j.peva.2003.10.007, ISI impact factor: 1.093.
  18. S. Mohamed and G. Rubino. A study of real-time packet video quality using random neural networks. IEEE Transactions on Circuits and Systems for Video Technology, vol. 12, no. 12, December 2002 10.1109/TCSVT.2002.806808. ISI impact factor: 1.819
  19. S. Mohamed, F. Cervantes and H. Afifi. Real-Time Audio Quality Assessment in Packet Networks. Network and Information Systems Journal, vol. 3, no. 3-4, 2000, pp. 595-609.


International Conference

Abeer Mostafa, Samir A. Elsagheer and Walid Gomaa. BioDeep: A deep learning system for IMU-Based Human Biometrics Recognition. In Proc. of ICINCO 2021

Samir A. E. Mohamed, M. Tanvir Parvez, S. Awaida. Study of New Auto-Activation Barriers to Enqueue Pilgrimages Embracing the Black Stone. In Proc. of IEEE ITCE' 19 Conference, 2019, Egypt.

Samir A. E. Mohamed. Automatic traffic violation recording system to limit traffic accidents, In Proc. of IEEE ITCE' 19 Conference, 2019, Egypt.

Samir A. E. Mohamed, Allam Shehata, and Mohamed T. Ben Othman. ‘‘Learning System for the Holy Quran and Its Sciences for Blind, Illiterate and Manual-Disabled People’’. IEEE International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, Al Madinah, Saudi Arabia, 22-25 Dec 2013

Samir A. E. Mohamed, Allam Shehata, and Mohamed T. Ben Othman. ‘‘Virtual learning system (Miqra'ah) for Quran recitations targeting blind, illiterate and manual-disabled students’’. IEEE International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, Al Madinah, Saudi Arabia, 22-25 Dec 2013

S. Mohamed, G. Rubino, M. Soliman, and F. Chammas. ‘‘Levenberg-Marquardt Training Algorithm for Random Neural Networks’’. In Proc. of the 2nd International Computer Engineering Conference Engineering the Information Society (ICENCO), December 2006, Cario, Egypt

S. Mohamed, G. Rubino and M. Soliman. ‘‘A New Approach for Traffic Prediction Exploiting Short-term and Longterm Dependencies’’. In Proc. of the 2nd International Computer Engineering Conference Engineering the Information Society (ICENCO), December 2006, Cario, Egypt

S. Mohamed, W. Ata, N. Darwish, "A New Technique for Automatic Text Categorization for Arabic Documents”. In Proc. of 5th International Conference on Internet and Information Technology in Modern Organizations (IBIMA), Dec. 2005, Cario, Egypt.

S. Mohamed and G. Rubino. ``Evaluation of Packet Video Quality in Real-time using RNN''. In Random Neural Networks workshop, 2002, Madrid, Spain.

S. Mohamed, G. Rubino and F. Cervantes, H. Afifi. ``Real-Time Video Quality Assessment in Packet Networks: A Neural Network Model''. In Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'2001), June, 2001, Las Vegas, Nevada, USA.

S. Mohamed, F. Cervantes and H. Afifi. ``Integrating Networks Measurements and Speech Quality Subjective Scores for Control Purposes''. In Proceedings of the IEEE INFOCOM'01, April 22 - 26, 2001, Alaska, USA (SJR 4.39).

S. Mohamed, F. Cervantes and H. Afifi. ``Audio Quality Assessment in Packet Networks: an Inter-Subjective Neural Network Model''. In Proceedings of the 15th International Conference on Information Networking (ICOIN-15), Japan, 2001 


Funded Research Grants

1- Dr. Samir A. Elsagheer Mohamed and Dr. Khaled Alshalfan, Research grant from King Abdulaziz City for Science and Technology. Project title “Traffic Violation Recording and Reporting”. Project started in Jan. 2019 (Budget 1,300,000 SAR).

2- Dr. Samir A. Elsagheer Mohamed, Dr. M. Othman, Dr. M. Alhajry. “Development of a self-learning system for blind students to study the school subject”, Research grant from Scientific Research Deanship (SRD), Qassim University. Project started in Jan. Jan 2016, finalized June 2017 (Budget 57,000 SAR).

3- Dr. Samir A. Elsagheer Mohamed, Dr. Mohamed Taher Othaman, Allam Shehata. “Development of a web application for the services of the Holy Quran and Its related sciences targeting blind, handicapped, and illiterate categories of people”, Research grant from IT Research Center for the Holy Quran (NOOR), Taybah University. Project started in June 2012, Finalized in Jan 2014 (Budget 252,000 SAR).

4- Dr. Samir A. Elsagheer Mohamed, Dr. m. Tanvir Parvez, Dr. S. Awadah, "Study of new auto-activation barriers to organize people seeking kissing the Black Stone in a queue", Research grant from Scientific Research Deanship (SRD), Qassim University. March 2013, Finalized in Jun 2014 (Budget 58,000 SAR)

5- Dr. Samir A. Elsagheer Mohamed and Dr. Miled Mohamed Tezeghdanti, Research grant from King Abdulaziz City for Science and Technology. Project title “Spam detection and categorization for Arabic messages”. Project started in Jan. 2010, Finalized in June 2012 (Budget 810,000 SAR).

6- Dr. Samir A. Elsagheer Mohamed. “Developing an Intelligent Traffic Management system for better traffic flow and solving the traffic problems using the advanced technology”, Research grant from Scientific Research Deanship (SRD), Qassim University. Project started in Jan. May 2012, finalized May 2013 (Budget 52,000 SAR).

7- Dr. Ashraf Nasr and Dr. Samir A. Elsagheer Mohamed. “Study the relationship between integrated nanotechnology devices used for super speed networks”, Research grant from Scientific Research Deanship (SRD), Qassim University. Project Started in May 2012 (Budget 69,000 SAR).

8- Dr. Ashraf Nasr and Dr. Samir A. Elsagheer Mohamed. “Study of nanotechnology optoelectronic devices and its application on computer networks”, Research grant from Scientific Research Deanship (SRD), Qassim University. Project achieved in May 2012.

9- Dr. Samir A. Elsagheer Mohamed. Project title “Precise Positioning System for Vehicular Ad-hoc Networks”. Research grant from Scientific Research Deanship (SRD), Qassim University. Project achieved in June 2009 (Budget 60,000 SAR).

10- Dr. Samir A. Elsagheer Mohamed. “Smart Street Lighting Control and Monitoring System for Electrical Power Saving by Using VANET”. Research grant from Scientific Research Deanship (SRD), Qassim University. Project achieved in Jan. 2012 (Budget 67,000 SAR)

11- Dr. Samir A. Elsagheer Mohamed and Dr. Mostafa Makkey. Studying the Security attacks of the device position in the wireless ad-hoc networks. Research grant from Scientific Research Deanship (SRD), Qassim University. Achieved May 2011 (Budget 40,000 SAR)

12- Dr. Mostafa Makkey and Dr. Samir A. Elsagheer Mohamed. Digital Watermarking of Images Using Direct Sequence Spread Spectrum Techniques With Chaotic Signal Research grant from Scientific Research Deanship (SRD), Qassim University. Achieved May 2010 (Budget 45,000 SAR)

13- Dr. Mostafa Makkey and Dr. Samir A. Elsagheer Mohamed. SECURE COMMUNICATION SYSTEM ALGORITHEM FOR MULTIMEDIA BASED ON CHAOS SYNCHRONIZATION. Research grant CV of Associate Prof. Samir A. Mohamed. Page 3 of 10 from Scientific Research Deanship (SRD), Qassim University. April 2010 April 2011 (Budget 50,000 SAR)

14- Dr. Mostafa Makkey and Dr. Samir A. Elsagheer Mohamed. Face Recognition in Color Images Research grant from Scientific Research Deanship (SRD), Qassim University. (Budget 40,000 SAR)

15- Scholarship from the Egyptian government for the M.Sc. and the Ph.D.


Non Impacted Journal

Samir A. E. Mohamed, Allam Shehata, and Mohamed T. Ben Othman. (2014) Virtual Learning System (Miqra’ah) for Quran Recitations for Sighted and Blind Students. Journal of Software Engineering and Applications, Vol. 7, No. 4, pp. 195-205. doi:10.4236/jsea.2014.74021.

Samir A. E. Mohamed, Allam Shehata, and Mohamed T. Ben Othman (2014) Educational System for the Holy Quran and Its Sciences for Blind and Handicapped People Based on Google Speech API. Journal of Software Engineering and Applications, Vol. 7, No. 3, 150-161. doi: 10.4236/jsea.2014.73017.

Samir A. Elsagheer Mohamed. "Efficient Spam Filtering System based on Smart Cooperative Subjective and Objective Methods". International Journal of Communications, Network and System Sciences, pp. 88-99, 2013. doi: 10.4236/ijcns.2013.62011 

Samir A. Elsagheer Mohamed. Smart Street Lighting Control and Monitoring System for Electrical Power Saving by Using VANET. International Journal of Communications, Network and System Sciences, vol. 6, no. 8, 2013 7. A. Nasr and S. Mohamed, "Accurate Distance Estimation for VANET Using Nanointegrated Devices," Optics and Photonics Journal, Vol. 2 No. 2, 2012, pp. 113-118. doi: 10.4236/opj.2012.22015.

Samir A. Elsagheer Mohamed, "A Solution for Fighting Spammer's Resources and Minimizing the Impact of Spam," Int'l J. of Communications, Network and System Sciences, Vol. 5 No. 7, 2012, pp. 416-422. doi: 10.4236/ijcns.2012.57051.

Samir A. Elsagheer Mohamed, A. Naser, G.A. Ansari. Precise Positioning Systems for Vehicular Ad-hoc Networks. International Journal of Wireless & Mobile Networks (IJWMN), Vol 4, No 2, 2012; doi: 10.5121/ijwmn.2012.4217

Samir A. Elsagheer Mohamed. Why the Accuracy of the Received Signal Strengths as a Positioning Technique was not accurate? In the International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 3. June 2011, pp. 69- 82. doi: 10.5121/ijwmn.2011.3306

Gufran A. Ansari, Samir A. Elasgheer Mohamed and M.P.Syed. Modeling of a Component-Based Software Through UML Using Object-Oriented Approach. The IUP Journal of Systems Management, Vol.9, No. 3, August 2011, pp. 42-53


Courses Teaching

Courses I am teaching this current Semester (Spring 2025)

  • Cloud Computing
  • Cloud Security
  • CSIT Computer Programming (CSIT Students)
  • Project Based Learning
  • Data structures and algorithms (CSIT Students)
  • Introduction to Computers (Pharm D Students)
  • CSE Computer Programming (FoE)
  • CSE Computer Network Security (FoE, Postgraduate)

Graduate Level Courses I taught

  • AI and Cybersecurity
  • Cybersecurity Fundamentals
  • Intiligent Transportation Systems
  • Advanced Programming
  • Penetration Testing and Ethical Hacking
  • Computer Network Security
  • Computer Networks
  • Project Based Learning
  • Advanced Computer Networks
  • Wireless Network Security
  • Operating Systems and Cloud Computing Security
  • Neural Networks
  • C# (C Sharp)

Undergraduate-level courses I taught

  • Cloud Computing
  • Cloud Security
  • Computer Programming
  • Data Structure and Algorithms
  • Computer Networks
  • Advanced Computer Networks
  • Computer and Network Security
  • Wireless Networks And Mobile Computing
  • Cryptography and Network Security
  • Unix Operating System
  • Linux Operating System
  • Operating Systems
  • Web Programming (ASP .NET)
  • Human Computer Interaction
  • Computer Architecture
  • Assembly Language
  • Digital System Design
  • Interfacing with Computer
  • Advanced Mathematics
  • Algorithms and Programming in C Language
  • Introduction to Computer Science
  • Software Engineering
  • Computer Graphics

Course Title: Cloud Computing/Spring 2025

Course Instructor: Samir Elsagheer

Course Description: This course provides an in-depth exploration of cloud computing, covering essential concepts, core principles, and industry-standard practices. The focus is on equipping students with hands-on skills on popular cloud platforms, particularly AWS and Google Cloud, to prepare them for real-world applications in cloud environments. The curriculum progresses from fundamental cloud concepts to intermediate topics, enabling students to deploy, manage, and scale cloud-based solutions.

Course Objectives:

  1. Introduce the principles of cloud computing, including deployment models, service models, and architecture.
  2. Provide hands-on experience with AWS and Google Cloud, focusing on key services such as compute, storage, databases, networking, and security.
  3. Enable students to deploy, manage, and monitor applications and services in the cloud.
  4. Develop proficiency in implementing cloud security best practices and compliance.
  5. Explore advanced cloud topics, including autoscaling, load balancing, and disaster recovery.

Learning Outcomes (LOs): Upon successful completion of the course, students will be able to:

  1. Understand and explain cloud computing concepts, deployment models, and service models.
  2. Identify and utilize core AWS and Google Cloud services for compute, storage, and networking.
  3. Deploy and configure virtual machines, storage buckets, and databases on AWS and Google Cloud.
  4. Implement security measures, including identity and access management (IAM), encryption, and network security, in cloud environments.
  5. Manage cloud resources effectively, using monitoring tools and cost management strategies.
  6. Design scalable and fault-tolerant applications with load balancing, autoscaling, and disaster recovery.
  7. Course Topics:

  8. Introduction to Cloud Computing

    • Cloud concepts, advantages, and challenges
    • Cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid)
    • Overview of cloud providers: AWS, Google Cloud, Azure
  9. Compute Services

    • AWS EC2 and Google Compute Engine
    • Virtual machines, instance types, and configurations
    • Autoscaling and load balancing
  10. Storage and Databases

    • AWS S3 and Google Cloud Storage
    • Cloud databases: AWS RDS, Google Cloud SQL
    • Data lifecycle, replication, and security
  11. Networking

    • Virtual private clouds (VPCs), subnets, firewalls
    • Load balancing and routing
    • AWS Route 53 and Google Cloud DNS
  12. Identity and Access Management (IAM)

    • AWS IAM and Google Cloud IAM
    • Role-based access control and policy management
    • Implementing multi-factor authentication (MFA) and security best practices
  13. Monitoring and Cost Management

    • AWS CloudWatch and Google Cloud Monitoring
    • Billing, budgets, and cost optimization
    • Resource tagging and reporting
  14. Serverless Computing

    • AWS Lambda and Google Cloud Functions
    • Event-driven architectures
    • Use cases for serverless computing
  15. Security and Compliance

    • Encryption and key management (AWS KMS, Google Cloud KMS)
    • Compliance standards (e.g., GDPR, HIPAA)
    • Auditing and logging with AWS CloudTrail and Google Cloud Logging

Lab Topics:

  1. Setting Up Cloud Accounts and Resources

    • Create and configure AWS and Google Cloud accounts
    • Introduction to management consoles and CLI tools
  2. Virtual Machine Deployment

    • Launch and configure instances on AWS EC2 and Google Compute Engine
    • Set up SSH access, configure network settings
  3. Cloud Storage

    • Create and manage storage buckets on AWS S3 and Google Cloud Storage
    • Implement bucket policies and access controls
  4. Database Deployment

    • Set up and configure databases on AWS RDS and Google Cloud SQL
    • Explore backup, restore, and scaling options
  5. Networking and VPCs

    • Create and configure VPCs, subnets, and security groups
    • Implement load balancing and routing
  6. IAM and Security

    • Create and assign IAM roles and policies
    • Configure multi-factor authentication and audit access logs
  7. Monitoring and Cost Management

    • Set up monitoring dashboards with CloudWatch and Google Cloud Monitoring
    • Implement cost management best practices
  8. Serverless Applications

    • Develop and deploy a simple serverless application using AWS Lambda and Google Cloud Functions
    • Trigger functions with cloud events
    •  

Course Title: Cloud Security - Fall 2024

Course Description: The Cloud Security course provides an in-depth understanding of cloud security principles, practices, and technologies. With a focus on hands-on learning, students will explore key security services and configurations within AWS and Google Cloud platforms. Covering both foundational and intermediate security topics, the course prepares students to assess, design, and implement secure cloud environments.

Course Objectives:

  1. Introduce fundamental cloud security concepts and architecture.
  2. Develop skills in securing cloud infrastructure and managing identity and access.
  3. Equip students to implement network security, data protection, and compliance in cloud environments.
  4. Provide hands-on experience with AWS and Google Cloud security services.
  5. Prepare students to assess security risks and apply best practices for cloud security management.

Learning Outcomes (LOs): Upon successful completion of the course, students will be able to:

  1. Understand and describe core cloud security principles and cloud security architectures.
  2. Configure and manage identity and access management (IAM) on AWS and Google Cloud.
  3. Implement network security controls, including firewalls, virtual private clouds, and secure connections.
  4. Apply data protection techniques, such as encryption, key management, and access control.
  5. Perform cloud security monitoring, logging, and auditing.
  6. Design compliant cloud architectures that meet industry standards (e.g., GDPR, HIPAA).
  7. Develop incident response plans and apply security best practices for cloud environments.

Course Topics:

  1. Introduction to Cloud Security

    • Cloud security fundamentals and shared responsibility model
    • Security risks and challenges in the cloud
    • Cloud security frameworks and industry standards
  2. Identity and Access Management (IAM)

    • IAM fundamentals: users, groups, roles, and policies
    • AWS IAM and Google Cloud IAM configuration
    • Implementing least privilege and multi-factor authentication
  3. Network Security in the Cloud

    • Virtual Private Cloud (VPC) security on AWS and Google Cloud
    • Firewalls, security groups, and VPNs
    • Configuring secure access and network segmentation
  4. Data Protection and Encryption

    • Encryption mechanisms and key management (AWS KMS, Google Cloud KMS)
    • Data lifecycle management and access controls
    • Secure data storage and data masking techniques
  5. Application Security in the Cloud

    • Securing APIs and application endpoints
    • Web Application Firewalls (AWS WAF, Google Cloud Armor)
    • Integrating application security testing
  6. Monitoring, Logging, and Threat Detection

    • AWS CloudWatch, CloudTrail, and GuardDuty
    • Google Cloud Monitoring, Cloud Logging, and Security Command Center
    • Configuring alerting, threat detection, and anomaly detection
  7. Compliance and Risk Management

    • Cloud compliance frameworks (GDPR, HIPAA, PCI DSS)
    • Risk management and vulnerability assessments
    • Automating compliance checks and reporting
  8. Incident Response and Forensics

    • Cloud incident response planning and strategies
    • Conducting forensic investigations on cloud platforms
    • AWS and Google Cloud incident response tools
  9. Disaster Recovery and Business Continuity

    • Backup and recovery strategies in cloud environments
    • Implementing high availability and failover
    • Developing and testing disaster recovery plans
  10. Security Automation and DevSecOps

    • Infrastructure as code with AWS CloudFormation and Terraform
    • Automating security tasks with AWS Config and Google Cloud Config Connector
    • Integrating security into CI/CD pipelines

Lab Topics:

  1. Configuring IAM

    • Set up and manage IAM users, groups, roles, and policies on AWS and Google Cloud
    • Implement role-based access control and MFA
  2. Network Security Setup

    • Create and configure VPCs, security groups, and firewalls
    • Set up VPNs and secure connections between cloud and on-premises
  3. Data Encryption and Key Management

    • Encrypt data using AWS KMS and Google Cloud KMS
    • Implement access controls for encrypted data storage
  4. Application Security with WAF

    • Configure and test AWS WAF and Google Cloud Armor
    • Protect APIs and web applications from common attacks
  5. Monitoring and Threat Detection

    • Set up logging and monitoring with AWS CloudWatch, CloudTrail, and Google Cloud Logging
    • Configure threat detection alerts and analyze findings
  6. Compliance and Security Audits

    • Perform compliance checks using AWS Config and Google Security Command Center
    • Generate audit reports and interpret compliance findings
  7. Incident Response Drill

    • Simulate a security incident on AWS and Google Cloud
    • Execute incident response steps, analyze logs, and document findings
  8. Disaster Recovery Simulation

    • Configure backups, snapshots, and recovery plans
    • Test a disaster recovery failover scenario
  9. Automating Security Tasks

    • Write scripts for automated security monitoring and response
    • Integrate security checks into a CI/CD pipeline
  10. Vulnerability Assessment and Remediation

    • Use AWS Inspector and Google Cloud Security Scanner
    • Assess cloud environments for vulnerabilities and apply remediation steps

CSC 111 Computer Programming

 

Course offered to

Computer Science and Information Technology Programs UG students

Course Code

CSC111

Course Title

Computer Programming

Credit Hours

3

Instructor’s Name

Dr. Samir A. Elsagheer

Textbook

1. C++ How to Program, P. Deitel and H. Deitel, Pearson.

 

2. Introduction to Computer Science Using Python: A Computational Problem-Solving Focus, Charles Dierbach

3. Understanding Computers today and tomorrow,  Deborah Morley, Charles S. Parker

*: Additional resources such as Datacamp.com, Kaggle.com, hackerrank

 

 

I. Course Description.

Introduction to basic programming concepts with focus on Python and/or C++ programming Languages. Topics covered include Computer Hardware, Program development life cycle, writing a computer program, variables, functions, recursive functions, I/O functions, Expressions, Data type, Various control structures: sequential, conditional, and iterative, Pointers, data structures such as lists, arrays, sets, vectors, Files, exceptions and error handling, testing and debugging, and introduction to Object oriented Programming. In addition, the course covers the related hands-on labs. In addition to the contents provided in the lectures and the labs, students may have to complete

 

II.                 Course Objectives

a.     Introduces students with no or little programming background to the basic programming concepts.

b.     Enables students to use computer programming to solve computational problems from different fields.

c.      Help student acquire basic programming skillset including familiarity with concepts such as data types, controls and loops, functions and debugging and testing

 

III.                Student Outcomes

  1. Students demonstrate basic programming language skills including familiarity with data types, variables, conditional statements, loops, and file handling.
  2. Students demonstrate ability to use C++ or python to solve different computational problems.
  3. Students demonstrate basic understanding to modular design and object-oriented programming.

Instructor: Dr. Samir A. Elsagheer