1.  Ph.D.

·       Location: Malaysia

·       Name of University: University Utara Malaysia (Accredited by Ministry of Saudi Higher Education)

·       Type: Full Time

·       Duration of Course: 2013 - 2016 (one year of deferment)

·       Thesis Title: CHID: Conditional Hybrid Intrusion Detection System for Reducing False Positives and Resource Consumption on Malicious Dataset

·       Experimental Research: network packets data were collected and analysed at Alfaisal University, Jeddah.

·       Medium of Instruction: English


Hands-on skill involved in the Ph.D. research:

·       Create and analyze SQL database and WEKA machine learning for dataset analyst

·       Install and configure Tcpreplay for replaying and analyzing network packet

·       Configure Bro IDS in Linux system for malicious network packet analysis

·       Perform Netcat and Wireshark for network analysis




      2. Master

·       Location: Malaysia

·       Name of University: University Putra Malaysia (UPM), (Accredited by Ministry of Saudi Higher Education)

·       Type: Full Time

·       Duration of Course: 2005 – 2007

·       Thesis Title: Enhancing Secure Sockets Layer Bulk Data Transfer Phase Performance with Parallel Crypto Algorithm

·       Medium of Instruction: English

·       Scored/grade: 3.58 out of 4 scale


3. Bachelor in Computer Engineering

·       Location: Jordan

·       Name of University: Jordan University of Science and Technology (Accredited by Ministry of Saudi Higher Education)

·       Type: Full Time

·       Subject Specialization: Computer Engineering

·       Duration of Course: 1997 - 2003

·       Medium of Instruction: English





·       ISO 27001 Information Security - Lead Auditor, Global Success System, Dubai, 5 days, 2019

·       Control Objectives for Information and Related Technology (COBIT 2019), Global Success System, Dubai, 2 days, 2019

·       Certified Information System Audit (CISA), CRCA institute, Dubai, 5 days, 2019

·       Google Apps, Alfaisal University, Jeddah, 5 days, 2013

·       Certified Ethical Hacking (CEH), Koenig –solutions, Dubai, 5 days, 2012 (Certified)

·       Comptia Security+, CBT Nuggets Online, 1 day, 2012 (Certified)

·       Microsoft Certified System Engineering (MCSE) course, Asia Pacific Institute Information Technology (APIIT), Malaysia, 5 days, 2004


B.    Conferences and Seminar


·       Participant:Readiness for Big data in the sectors of Makkah region”, Dec 2019

·       Presenter: “Secure Your Information: As a User”, Jeddah, 2016, Effat University. 

·       Participant: “Secure the Kingdom”, Riyadh, 2015, demonstrate the latest information security systems including Firewall, IDS, IPS

·       Participant: “GIST”, Dubai, 2013, exhibit the latest technologies in network security including IPS, IDS, UTM Firewalls Fortigate - Cyberoam- (medium of Cisco ASA) PaloAlto, Anti spam , Anti virus MacAfee Suite Installation & configuration

·       Presenter: “1st Taibah University International Conference on Computing and Information Technology (ICCIT12)”, Madinah, 2012

·       Presenter: “12th International Arab Conference on Information Technology (ACIT12)”, Riyadh, 2011

·       Participant: “Workshop on Service Oriented Computing (SOC) and E-Government”, Riyadh, 2008

·       Presenter: “14th International Conference on Telecommunications, 8th IEEE Malaysian International Conference on Communication (ICT-MICC)”, Malaysia, 2007

·       Presenter: “The 2nd National Conference on Cryptology 2006 (NCC06)”, Malaysia, 28-29 November 2006

·       Participant: “Workshop on Message Passing Interface (MPI) and Parallel Computer Programming”, University Putra Malaysia, 9-11 Aug 2006




·         ISACA – 2019- present

·         Big Data Analytics in HIV/AIDS Research- book reviewer - 2018

·         IEEE, 2014 – Present

·         Internet Society ISOC, 2012 – Present

·         SANS Security, 2012 – Present

·         Science alert publisher, reviewer, 2017 – present