Teaching
Teaching is the execution layer of applied research.
My teaching philosophy reflects the Fachhochschule model of applied education that I experienced at Reutlingen University. Courses emphasize learning by building: students design, implement, and evaluate security artifacts, linking theory directly to operational systems and industry practice.
This approach integrates Design Science Research Methodology (DSRM), emphasizing learning through the design, construction, and evaluation of artifacts. Students do not merely study security concepts—they build identity systems, implement controls, and test them under realistic threat scenarios.
By aligning coursework with research artifacts and industry practices, students graduate with skills that translate directly into operational environments, research programs, and critical infrastructure roles.
Courses
Learning Outcomes
- Apply threat modeling methodologies to software systems
- Design secure authentication and authorization architectures
- Implement secure coding practices and defensive programming
- Evaluate security trade-offs in system design decisions
Prerequisites
Lab Focus
Learning Outcomes
- Configure and tune intrusion detection systems
- Analyze security events and identify attack patterns
- Develop and execute incident response plans
- Conduct forensic analysis and evidence preservation
Prerequisites
Lab Focus
Learning Outcomes
- Implement secure authentication and session management
- Apply input validation and output encoding techniques
- Identify and remediate OWASP Top 10 vulnerabilities
- Design applications with defense-in-depth principles
Prerequisites
Lab Focus
Learning Outcomes
- Build full-stack web applications using modern frameworks
- Implement RESTful APIs and database integrations
- Apply security best practices in web development
- Deploy and maintain web applications in cloud environments
Prerequisites
Lab Focus
Learning Outcomes
- Apply project management frameworks to IT initiatives
- Manage project risks and security considerations
- Lead cross-functional technical teams effectively
- Communicate project status to diverse stakeholders
Prerequisites
Lab Focus
Learning Outcomes
- Apply innovation frameworks to technology challenges
- Lead cross-functional initiatives with diverse teams
- Communicate technical value to executive stakeholders
- Develop entrepreneurial approaches to problem-solving
Prerequisites
Lab Focus
Teaching Philosophy
Lab-style learning with identity at the core
Identity-First Thinking
Every system design starts with identity: who (or what) is accessing, what are they authorized to do, and how do we verify it continuously.
Adversarial Mindset
Students learn to think like attackers to build better defenses. Threat modeling and red team exercises are core to every course.
Hands-On Labs
Theory is reinforced through practical labs. Students build, break, and fix real systems in controlled environments.
Real-World Relevance
Curriculum draws from industry practice and current research. Students work on problems that matter to practitioners.
Student Outcomes
Preparing the next generation of security professionals
200+
Students Trained
95%
Employment Rate
15
Research Assistants
8
PhD Students
Join My Research Group
I'm always looking for motivated PhD students and research assistants interested in identity-centric security, AI defense, and critical infrastructure resilience. If you're passionate about these areas, let's talk.

