PHd Student, Plymouth University
Muhammad Ali is a Ph.D. student at School of Computing, Electronics and Mathematics Faculty of Science and Engineering in Plymouth where he also works as research Fellow and teaching assistant.
Research Fellow in Cyber Security H2020 Project, University of Plymouth 01-02-2019 till date.
Support the development of research objectives in conjunction with the academic research manager, Working on Malware analysis project activities include static analysis, dynamic analysis, reverse engineering, Exploit development etc., Plan and manage own research activity in conjunction with more senior colleagues and within the framework of the agreed programme, Worked on OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines, CIS and NIST standards, Contribute to the planning of the research project by undertaking data collection/fieldwork/modelling and other activities to achieve the stated projects objectives, Interpret the data collected using a variety of appropriate data analysis tools, Where appropriate identify and establish links with key stakeholders in the project, Use initiative to identify areas for development of the research and to create solutions by collecting, analysing, interpreting research data and reporting on data ,Undertake quantitative and/or qualitative analysis and write up own research work, Work collaboratively within the department to present research findings to e.g. internal steering groups (give example) and external bodies involved in the research, Network with a range of individuals and organizations internally and externally for effective data collection and to develop the potential for future collaboration, Assist in the supervision of student projects and provide guidance where required, Attend and contribute to relevant research meetings
Lab Demonstrator and Teacher for Module Secure Systems Architectures and Mechanisms based on Cryptographic, Plymouth UK 2019
Teaching and designing of labs for the subject secure system using Cryptographic techniques, following are the contents of this course
Classical Crypto, Principles of Block Ciphers and Symmetric Encryption, Asymmetric Encryption and its applications, Authentication and Biometrics, Vulnerability Management and Trusted Computing, Elliptic Curve, Homomorphic Encryption and Quantum Cryptography, Blockchain and the applications in Cybersecurity, Hash functions, Steganography and their applications, Secure Coding and System Hardening, Supervision of students in developing cryptographically secure systems, Supervision of student in number of projects for e.g. Cyber Threat Intelligence and Vulnerability Assessment, designing of Vulnerability scanner in Python, Vulnerability Scanner Enhancer, scanning and enumeration tools and exploits in a cloud architecture, Cloud Computing: Security Issues, Enumeration and Scanning Tools, secure Customer hire a bike application etc.
Lab Demonstrator and Teacher, Network Security and Penetration Testing Plymouth UK 2018
Teaching and designing of labs for the subject Network security and Pen testing, following are the contents of this course
Principles of ethical hacking, Footprinting and reconnaissance, Scanning networks, Enumeration, System hacking, Trojans, backdoors, viruses, worms, Sniffing, Social engineering, Denial of ServiceSession hijacking, Web servers and applications, SQL injection, Wireless & mobile, Email security, Involve in student presentations, checking of modules related to Cybersecurity, marking of exams numbers etc., Supervision of 70 undergraduate students in their projects in building a secure system using machine learning techniques, Perform infrastructure and application penetration tests, as well as physical security review and social engineering tests for our global clients, Perform application penetration tests across public and private networks, Perform assessments of security awareness training using social engineering, Develop testing scripts and procedures, Develop and leverage custom exploits, Work on improvements for provided security services, including the continuous enhancement of existing methodology material and supporting assets.