Jonathan Weissman Headshot

Jonathan Weissman

Senior Lecturer

Department of Computing Security
Golisano College of Computing and Information Sciences

Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Jonathan Weissman

Senior Lecturer

Department of Computing Security
Golisano College of Computing and Information Sciences


BS, College of Staten Island; MA, Brooklyn College


Jonathan S. Weissman is a senior lecturer (Department of Computing Security) at Rochester Institute of Technology, where he was awarded the RIT Outstanding Teaching Award in 2014, the RIT GCCIS Outstanding Educator Award in 2018, and RIT Distinguished Teacher Recognition Program Honors in 2019. Weissman developed and teaches three courses for the edX RITx Cybersecurity MicroMasters program to more than 300,000 students worldwide.

All in all, Weissman is the recipient of 10 teaching honors and awards. Weissman began his teaching career in 2001, and has taught more than 50 graduate and undergraduate courses, which include networking, cybersecurity, systems administration, cryptography, ethical hacking/pentesting, digital forensics, malware reverse engineering, programming, scripting, web design, database design, computer organization and architecture, operating system design, and many more.

Weissman is the author of Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual, and is also the co-author of Mike Meyers’ CompTIA Network+ Guide to Managing & Troubleshooting Lab Manual, (Fifth and Sixth Editions) and Mike Meyers’ CompTIA Network+ Certification Passport, (Sixth and Seventh Editions). He serves as technical editor for many industry textbooks.

Furthermore, Weissman is a networking and cybersecurity consultant for local businesses and individuals. Weissman regularly appears on TV news and talk radio, and in articles, as a networking and cybersecurity expert. Additionally, he presents at conferences and in webinars, runs workshops, and appears in podcasts.

Weissman has a master’s degree in Computer Science from Brooklyn College and holds 44 industry certifications, including CCNP Enterprise, Cisco Certified Specialist - Enterprise Core, Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation, CCNA Security, CCNA, CompTIA Security+, CompTIA Network+, CompTIA A+, CompTIA Linux+, CompTIA Server+, EC Council Certified Ethical Hacker, EC-Council Computer Hacking Forensic Investigator, and IPv6 Forum Certified Network Engineer (Gold), among many others.

Follow him on LinkedIn at, Twitter at, and Instagram at Subscribe to his YouTube channel at

Areas of Expertise

Currently Teaching

3 Credits
This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis.
3 Credits
Computer malware is a computer program with malicious intent. In this course, students will study the history of computer malware, categorizations of malware such as computer viruses, worms, Trojan horses, spyware, etc. Other topics include, but are not limited to, basic structures and functions of malware, malware delivery mechanism, propagation models, anti-malware software, its methods and applications, reverse engineering techniques. Students will conduct research to understand the current state of the computer malware defense and offense.
1 - 3 Credits
A student works with a faculty member to devise a plan of study on a topic in various areas of computing security. Deliverables, evaluation methods, and number of credits need to be specified in a written proposal. A final report and presentation in the form of a poster session is expected and graded at the end of the term.
3 Credits
This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services.
3 Credits
This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies.
3 Credits
This is a graduate level introduction to the field of computing security. An extensive overview of various branches of computing security areas will be presented including concepts, issues, and tools that are critical in solving problems in computing security domain. Students will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.
3 Credits
An introduction to the fundamental issues, concepts and tools common to all areas of computing security. Topics include identifying attackers and their motivations. Essential techniques will be introduced covering the areas of anti-virus, monitoring, virtual machines, account control, and access rights management. Various security models will be investigated. Concept areas such as confidentiality, integrity, availability and privacy will be studied.
3 Credits
Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect. The students will be provided with an understanding of the principles and concepts of wired and wireless data network security. Students will perform a series of laboratory or homework experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. Students will engage in attack/defend scenarios to test their deployments against other teams. Students should be knowledgeable in networking technologies.
3 Credits
This course provides an overview of basic concepts, techniques, and tools of malware reverse engineering. Students will learn how to perform reverse engineering to discover hidden software functions and hidden network communication techniques and protocols. Students will also learn techniques to protect against software reverse engineering.

In the News

  • June 3, 2021

    person wearing a dark hoodie typing on a laptop with an overlay of cybersecurity-related words.

    A never-ending threat  

    The Rochester Beacon talks to Jonathan Weissman, senior lecturer in the Department of Computing Security, about cybersecurity threats.

  • May 11, 2021

    large fuel holding tank.

    The Pipeline Hack  

    The Earl David Reed, Megan and Pat radio show, on WAIO-FM (95.1), features Jonathan Weissman, senior lecturer in the Department of Computing Security, discussing a cyberattack on the Colonial Pipeline.