Jonathan Weissman Headshot

Jonathan Weissman

Senior Lecturer
Department of Computing Security
Golisano College of Computing and Information Sciences

Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Jonathan Weissman

Senior Lecturer
Department of Computing Security
Golisano College of Computing and Information Sciences


BS, College of Staten Island; MA, Brooklyn College


Jonathan S. Weissman is a senior lecturer in the Department of Computing Security at Rochester Institute of Technology, where he was awarded the RIT Outstanding Teaching Award in 2014, the RIT GCCIS Outstanding Educator Award in 2018, and the RIT Distinguished Teacher Recognition Program Honors in 2019. He was also awarded the RIT Disability Services Office Kudos in 2014 and the RIT GCCIS Parking Pass for March 2018. All in all, he's the recipient of 8 teaching honors and awards.

Weissman began his teaching career in 2001, and has taught more than 50 graduate and undergraduate courses, which include networking, cybersecurity, cryptography, ethical hacking/pentesting, digital forensics, malware reverse engineering, systems administration, programming, web design and scripting, database design, computer organization and architecture, operating system design, and many more. He developed three courses for the edX RITx Cybersecurity MicroMasters program, which he currently teaches to more than 200,000 students in over 200 countries. As a result of his work on CYBER501X Cybersecurity Fundamentals, he was a finalist for the 2018 edX Prize for Exceptional Contributions in Online Teaching and Learning.

He has co-authored (and updated) two industry leading textbooks on CompTIA Network+ certification, and serves as technical editor for many industry textbooks. In addition, he is a networking and cybersecurity consultant for local business and individuals.

Weissman has spoken on the news, multiple times, as a cybersecurity expert. He's been a guest on a radio program, as a cybersecurity expert. He's been featured in articles, multiple times, as a cybersecurity expert. He's written articles/blogs as a networking/cybersecurity expert. He's had speaking engagements in multiple states as a cybersecurity expert.

He has a master's degree in Computer Science from Brooklyn College and holds 40 industry certifications, including CCNP Routing and Switching, CCNA Security, CompTIA Security+, CompTIA Network+, CompTIA A+, CompTIA Linux+, CompTIA Server+, EC-Council Certified Ethical Hacker, EC-Council Computer Hacking Forensic Investigator, and IPv6 Forum Certified Network Engineer (Gold), among many others.

Follow Jonathan Weissman on LinkedIn at and Twitter at

Areas of Expertise

Currently Teaching

3 Credits
Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect. The students will be provided with an understanding of the principles and concepts of wired and wireless data network security. Students will perform a series of laboratory or homework experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. Students will engage in attack/defend scenarios to test their deployments against other teams. Students should be knowledgeable in networking technologies.
3 Credits
This course provides an overview of basic concepts, techniques, and tools of malware reverse engineering. Students will learn how to perform reverse engineering to discover hidden software functions and hidden network communication techniques and protocols. Students will also learn techniques to protect against software reverse engineering.
3 Credits
This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis.
3 Credits
This is a graduate level introduction to the field of computing security. An extensive overview of various branches of computing security areas will be presented including concepts, issues, and tools that are critical in solving problems in computing security domain. Students will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.
3 Credits
Computer malware is a computer program with malicious intent. In this course, students will study the history of computer malware, categorizations of malware such as computer viruses, worms, Trojan horses, spyware, etc. Other topics include, but are not limited to, basic structures and functions of malware, malware delivery mechanism, propagation models, anti-malware software, its methods and applications, reverse engineering techniques. Students will conduct research to understand the current state of the computer malware defense and offense.
1 - 3 Credits
A student works with a faculty member to devise a plan of study on a topic in various areas of computing security. Deliverables, evaluation methods, and number of credits need to be specified in a written proposal. A final report and presentation in the form of a poster session is expected and graded at the end of the term.
3 Credits
This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies.
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
3 Credits
This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services.

Latest News