Ahmed Hamza Headshot

Ahmed Hamza

Lecturer
Department of Computing Security
Golisano College of Computing and Information Sciences

585-475-4314
Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Ahmed Hamza

Lecturer
Department of Computing Security
Golisano College of Computing and Information Sciences

Education

MS in computer science, Georgetown University

Bio

Ahmed lectures in the Computer Science and Computing Security departments. His PhD research is on machine-intelligence optimizations to video encoding algorithms (H.265). In computing security, he is interested in OS security, memory-resident malware, persistent threats, and modern defense circumvention. Ahmed obtained his M.S. in Computer Science from Georgetown University in 2010, and a B.Sc in Computer Science, magna cum laude, from the AUC in 2007.

585-475-4314

Areas of Expertise

Currently Teaching

CSEC-490
3 Credits
This is a capstone course for students in the information security and forensics program. Students will apply knowledge and skills learned and work on real world projects in various areas of computing security. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications.
SWEN-123
4 Credits
A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments. This course is co-listed as SWEN-123, CSEC-123 and ISTE-123; therefore students may only receive credit for one of these courses.
CSEC-123
4 Credits
A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments. This course is co-listed as SWEN-123, CSEC-123 and ISTE-123; therefore students may only receive credit for one of these courses.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
CSEC-140
3 Credits
This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises.
CSEC-124
4 Credits
A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security. This course is co-listed as SWEN-124, CSEC-124 and ISTE-124; therefore students may only receive credit for one of these courses.
SWEN-124
4 Credits
A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security. This course is co-listed as SWEN-124, CSEC-124 and ISTE-124; therefore students may only receive credit for one of these courses.
CSEC-102
3 Credits
Computer-based information processing is a foundation of contemporary society. As such, the protection of digital information, and the protection of systems that process this information has become a strategic priority for both the public and private sectors. This course provides an overview of information assurance and security concepts, practices, and trends. Topics include computing and networking infrastructures, risk, threats and vulnerabilities, legal and industry requirements for protecting information, access control models, encryption, critical national infrastructure, industrial espionage, enterprise backup, recovery, and business continuity, personal system security, and current trends and futures.