Dr. Shaher Daoud’s Resume

About

PO BOX 440125
0017205153117

General Information

Education

2016
Colorado Technical University Doctor of Computer Science

Doctor of Computer Science in Enterprise Information Systems
GPA 4.0/4.0


2010/2012
Colorado Technical University Master of Science

Master of Science in Enterprise Information Systems
GPA 3.97/4.0


Work Experience

2021/2022
Colorado State University Global Adjunct Faculty

o  rnAs a Subject Matter Expert (SME) ofrnthe Computer Science Fundamentals course, I was assigned by the department headrnto work with the Instructional Design team to recommend and make major changesrnto the Computer Science Fundamentals course.

rnrn

o  rnTeaches the following undergraduaterncourse in the Bachelor of Computer Science (BCS) program:

rnrn

§  ComputerrnScience Fundamentals: This course focuses on:

rnrn

ü  Explainingrnalgorithm strategies and analysis techniques.

rnrn

ü  Applyingrnfundamental data structures, and computational theories and complexities.

rnrn

ü  Identifyrncomputer systems’ functional components.

rnrn

ü  Applyingrnprogramming concepts related to algorithm construction and design.

rnrn

ü  Explainingrnfoundational concepts of information security as they relate to balancing keyrnsecurity properties: confidentiality, integrity, and availability.

rnrn

ü  Describingrnhow information is captured, stored, transformed, and represented so humans canrngain access and make decisions with that data and information.

rnrn

 

rnrn

§  OperatingrnSystems and Architecture: This course focuses on:

rnrn

ü  Discussingrnthe factors of computer architecture that affect system performance.

rnrn

ü  Identifyingrntechniques to improve operating system efficiency.

rnrn

ü  Describingrnthe differences between the kernel and user mode in developing key approachesrnto operating system design and implementation.

rnrn

ü  Implementingrnmethods that can be used to improve the operating system environment.

rnrn

ü  Usingrnsystem commands to manage I/O systems and file systems in an operating systemrnenvironment

rnrn

 

rnrn

§  Introductionrnto Algorithms: This course focuses on:

rnrn

ü  Designrnalgorithms for solving a specific problem.

rnrn

ü  Implementrndata structures for solving a specific problem.

rnrn

ü  Identifyrndata structures that can be used for solving a specific problem.

rnrn

ü  Discussrnthe factors that influence the efficiency of an algorithm.

rnrn

ü  Implementrnan algorithm that can be used to solve a specific business problem.

rnrn

 

rnrn

§  SoftwarernEngineering: This course focuses on:

rnrn

ü  Discussrnprescriptive and agile software process models.

rnrn

ü  Specifyrnsoftware design requirements for a software project.

rnrn

ü  Identifyrnbest practices in developing a large-scale software project.

rnrn

ü  Utilizerncoding techniques appropriate for an identified software project.

rnrn

ü  Demonstraternquality assurance techniques associated with software development.

rnrn

ü  Employrnstandards for communicating with a client in a software developmentrnenvironment.


2019/2021
King Fahd Security College Assistant Professor

o  rnCurriculum Development based on the creationrnof Course Outlines using Program Intended Learning Outcomes (PILOs), CoursernIntended Learning Outcomes (CILOs), and Module Intended Learning Outcomesrn(MILOs) of Cyber Security, Cyber Forensics, and Computer Fundamentals courses.rnThis academic teaching and facilitating approach focus on students’rnachievements by reaching various levels in each criterion that relate to coursernCILOs.

rnrn

 

rnrn

o  rnTeaches the following undergraduaterncourses in the Bachelor of Security Sciences (BSS) program:

rnrn

§  CyberrnSecurity: This course focuses on:

rnrn

ü  Students’rnunderstanding of the difference between threats, risks, and vulnerabilities inrnthe cyber security landscape.

rnrn

ü  Introducingrnstudents to the importance of building cyber security culture.

rnrn

ü  Thernimportance of organizing cyber management priorities.

rnrn

ü  Explorernethics in cyber security.

rnrn

ü  Measuringrnthe relationship and interconnection between threats, risks, andrnvulnerabilities, using real-life scenarios.

rnrn

ü  CyberrnSecurity's role in the prevention, detection, and response to cyber-attacks andrnhow they can have an impact on profitability and reputation.

rnrn

§  CyberrnForensics:rnThis course focuses on:

rnrn

ü  Differencernbetween cyber security and cyber forensics.

rnrn

ü  Cyberrnforensics techniques based on File Forensics, Memory Forensics, Network Forensics,rnand Email Forensics.

rnrn

ü  Forensicsrninvestigation steps (Response to Incidents (RoI) steps).

rnrn

ü  Cyberrnforensics software.

rnrn

ü  Students’rnexposure to real-life cases/scenarios.

rnrn

§  ComputerrnFundamentals:rnThis course focuses on:

rnrn

ü  Computerrnsystems’ components (hardware and software).

rnrn

ü  Analogrnand digital signals.

rnrn

ü  Thernnumbering system (Decimal, Binary, and Hexadecimal).

rnrn

ü  ComputerrnArchitecture.

rnrn

ü  Computerrnapplications and security.

rnrn

ü  Hands-onrncomputer software practice.

rnrn

§  Capstone: This coursernfocuses on assessing students in Science, Math, Social Science, and SecurityrnSciences courses across all PILOs based on multiple criteria that include: Components,rnFramework, Assumptions, Limitations, Definition, Evidence, Evaluation,rnDiscernment, Innovation, Justification, Collection, Assessment, andrnApplication. Capstone assesses students on the following skills:

rnrn

ü  Knowledgernand Theory.rn

rnrn

ü  Cognitive Skills.

rnrn

ü  ProblemrnSolving Skills.

rnrn

ü  ResearchrnSkills.

rnrn

ü  Team-Work

rnrn

ü  PersonalrnResponsibility

rnrn

ü  Writingrnand Communication Skills


2017/2019
Colorado Technical University Assistant Professor

o  rnParticipated & assisted in therncurriculum development of various courses: Network Security Essentials, CloudrnSecurity and Privacy, Cloud Computing, Networks’ Fundamentals, Fundamentals of Networking,rnComputer Networking Labs, and PC Networks.

rnrn

o  rnTaught courses based on Intellipathrnand TestOut/LabSim concepts.

rnrn

o  rnTaught the following Graduatern(Master level) & Undergraduate classes

rnrn

§  NetworkrnSecurity Essentials (Graduate). The focus of this course was to ensurernstudents can:

rnrn

ü  Examinernand describe basic elements of networking concepts, topologies, and protocolsrnrequired to understand network security issues.

rnrn

ü  Formulaternsecurity-relevant decisions based on managing risk and a basic understanding ofrnthe network, hardware, software, and communication vulnerabilities

rnrn

ü  Appraisernthe Open Systems Interconnection (OSI) model and the relevance of each layer inrndeveloping network security architecture.

rnrn

ü  Distinguishrnand select fundamental security controls required to establish and maintain the

rnrn

ü  Confidentiality,rnIntegrity, and Availability of network communications.

rnrn

ü  Comparernand contrast network security mechanisms by OSI layer

rnrn

ü  Constructrna plan for the implementation of Confidentiality, Integrity, Authentication,

rnrn

ü  Authorizationrnand Non-repudiation cryptographic services that incorporate cryptography.

rnrn

 

rnrn

§  CloudrnComputing.rnThe focus of this course was to ensure students can:

rnrn

ü  Explainrnwhat cloud computing is.

rnrn

ü  Describernthe Service Oriented Architecture (SOA) and its relationship to cloudrncomputing.

rnrn

ü  Identifyrnand explain the Conceptual Reference Model for cloud computing including thernactors, their activities, and functions in cloud computing.

rnrn

ü  Identifyrnand describe the various services within cloud computing.

rnrn

ü  Describernthe advantages and disadvantages of SaaS, PaaS, IaaS, DaaS solutions.

rnrn

ü  Definernand describe corporate and IT governance for managing cloud computingrnenvironments.

rnrn

ü  Comparernand contrast scaling up and scaling out.

rnrn

ü  Describernthe advantages and disadvantages of using cloud computing.

rnrn

ü  Explainrnthe challenges to ID management in cloud computing.

rnrn

ü  Describernthe pros and cons of database and storage solutions in cloud computing.

rnrn

ü  Explainrnhow collaboration takes place within cloud computing.

rnrn

ü  Definernand describe virtualization and identify applications that are well-suited forrnuse in virtualized environments. List the advantages and disadvantages of usingrncloud service providers.

rnrn

 

rnrn

§  CloudrnComputing, Privacy, and Security. The focus of this course was to ensurernstudents can:

rnrn

ü  Evaluaternand identify current cloud computing platforms, protocols, and services.

rnrn

ü  Applyrnknowledge and illustrate methods for securing the cloud.

rnrn

ü  Analyzerncurrent strategies for securing the cloud.

rnrn

ü  Designrnand illustrate methods for disaster recovery and continuity.

rnrn

ü  Designrnpolicies and procedures to address gaps in cloud security.

rnrn

ü  Accessrncompliance and legal requirements issues regarding cloud computing.

rnrn

 

rnrn

§  Fundamentalsrnof Networking & Computer Networking Labs: The focus ofrnthis course was to ensure students can:

rnrn

ü rnExplainrnfundamental networking concepts, components, and functions.

rnrn

ü rnExplainrnthe role of TCP/IP network models.

rnrn

ü rnIllustraternaddressing and naming schemes and describe the importance of each.

rnrn

ü rnIdentifyrnand explain devices and media necessary for network communications.

rnrn

ü rnDescribernnetwork topologies, standards, and protocols.

rnrn

 

rnrn

§  ComputerrnNetworks and Communications. The focus of this course was to ensurernstudents can:

rnrn

ü  Explainrnthe evolution of data communications, network and ethernet specification, and networkrntopologies and protocols.

rnrn

ü  Demonstraterna basic understanding of the workings of the Open System Interconnection (OSI)rnseven-layer networking model and TCP/IP model.

rnrn

ü  Identifyrnnetwork security threats and detections and Prevention.

rnrn

ü  Illustraternnetwork optimization, documentation, and Troubleshooting NetworkrnCommunications.

rnrn

ü  Illustraterntelecommunications hardware, network devices, Internetwork devices, and networkrnadapters

rnrn

ü  Describernwireless systems concepts and network connections

rnrn

§  Capstone. Mentor students throughoutrntheir graduate projects.


1998/2019
Comcast Corp/Universal Studios/Sky Principal Engineer

1) Use proactive and reactive approaches to ensure the stability of the services and equipment of both SS7 and IP networks with over 16 million residential and business phone subscribers. 

2) Reliability Engineering Team leader of multiple primary telecommunication products including Nokia, Cisco, Ericsson & Huawei. This includes various products that include the IMS Platform, Broadsoft Business switches & Session Broader Controls (SBCs).

3) Identify issues, and implement solutions. Ensure all outages get addressed promptly and according to the business’ needs whether through mitigation or permanent solutions

4) Develop & automate many of the team's daily tasks to expedite troubleshooting. Simplify software and hardware upgrade methods and procedures to minimize process execution procedures and add extra validation steps to avoid and minimize any impact to customers.

5) Provide team training on new products and services to ensure that the entire team is on board and has the needed knowledge to execute and fulfill the team's daily tasks.


Summary of Skills

•tAcademic teaching Experience (Graduate/Master & Undergraduate Programs).
100%
•tCloud Computing, Security, Management Information Systems, and IT Service Management,
100%
•tExtensive experience & knowledge (professional and academic) of large IP, SIP & SS7 communication networks (A network with over one million miles of fiber & coax combined).
100%
•tManaging, Planning, and Integrating EIS including Strategy, Alignment, and Portfolio Management.
100%
•tCourse planning, E-learning programs, creative instruction style & Best practices in online education.
100%
•tPersonable, approachable, clear communicator of complex ideas & Organized and detailed.
0%

Contact Shaher Daoud

Sheikh Zayed was able to lay the foundation and the solid pillars of a strong state that has become a successful development model by all measures and a source of inspiration for states seeking progress.

LOCATION

Liwa College
Fatima Bint Mubarak Street
(Al Najda Street previously), Al Danah,
Baniyas Tower B,
Abu Dhabi, United Arab Emirates.