Under Construction

Resume

For more information on my current experience and skillset, you can download a brief summary of my resume, otherwise head over to my LinkedIn (although I tend to neglect it). Publications are available at Google Scholar.

Courses Taught

Introduction to Software Engineering

This third year module specifically aims to facilitate the development of competent software developers and engineers. The purpose of this module is to enable students to develop professional skills, knowledge and attitudes that are necessary to become highly competent as software developers and engineers.

Information System Design & Implementation

During this year-long project, students design, develop and implement information systems for the solution of business problems. Doing so they obtain, on a practical level, experience in a team relationship; to identify, analyse and implement a prototype of a business system.

Introduction to Ethical Hacking and Penetration Testing

This fourth year course aims to arm students with fundamental knowledge and resources to shield information systems from known and potentially unknown dangers. Concepts relating to securing software design and protect networked environments are covered. Not only to guard the corporate environment, but also to protect the users interacting with the system and their data.


Qualifications

PhD Computer Science

(in progress) 2015 – 2020

Supervisor: Prof SH (Basie) von Solms, PhD, FBCS CITP
Academy of Computer Science and Software Engineering, University of Johannesburg
Investigation of a system prototype to form a digital identity model of a user’s personally identifiable information by gathering identity fragments scattered across the Internet with the aim of giving users control over their own data and the entities that make use of it.

MSc Information Technology

(cum laude) 2011 – 2014

Supervisor: Prof SH (Basie) von Solms, PhD, FBCS CITP
Academy of Computer Science and Software Engineering, University of Johannesburg
Design and development of a prototype model to incorporate multiple factors of authentication on a per-transaction basis for cyber applications such as online banking systems.