{"id":166,"date":"2018-10-24T13:41:50","date_gmt":"2018-10-24T13:41:50","guid":{"rendered":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/?page_id=166"},"modified":"2025-08-22T13:28:12","modified_gmt":"2025-08-22T13:28:12","slug":"educations","status":"publish","type":"page","link":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/educations\/","title":{"rendered":"Educations"},"content":{"rendered":"<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><em>Qualifications:<\/em><\/strong><\/p>\n<ul>\n<li><em>Ph.D., Computing (Computer security engineering)\u00a0<\/em>\n<ul>\n<li><strong>Monash University<\/strong> (2026 QS World ranking: #36)<\/li>\n<\/ul>\n<\/li>\n<li><em>M.Sc.<\/em> (by research), Informatics and Software Engineering\n<ul>\n<li><strong>Norwegian University of Science and Technology<\/strong><\/li>\n<\/ul>\n<\/li>\n<li><em>B.Sc., Informatics and Computer Science<\/em>\n<ul>\n<li><strong>Norwegian University of Science and Technology<\/strong><\/li>\n<\/ul>\n<\/li>\n<li><em>B.S.S (honours)<\/em>\n<ul>\n<li><strong>The University of Dhaka<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><em>Certificate Courses<\/em>:<\/strong><\/p>\n<ul>\n<li><em>Completed a course on Cybersecurity Risk Management\u00a0<\/em>\n<ul>\n<li>Offered by <em><strong style=\"font-style: normal;\">Harvard University<\/strong><\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>Completed a course on Blockchain Technology<\/em>\n<ul>\n<li>Provided by the <strong>University of California, Berkeley<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u00a0<em>Completed an intensive course on the Economics of Blockchain\u00a0<\/em>\n<ul>\n<li>Provided by <strong>Massachusetts Institute of Technology (MIT)<\/strong><\/li>\n<\/ul>\n<\/li>\n<li>Other certificate courses completed:\n<ul>\n<li>Digital Forensics for Penetration Testers<\/li>\n<li>Computer Forensics Best Practices<\/li>\n<li>Vulnerability Analysis and Management<\/li>\n<li>Common Cybersecurity Attacks and Defense Strategies.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><em>Professional memberships:<\/em><\/strong><\/p>\n<ul>\n<li>Senior Member, IEEE<\/li>\n<li>Certified Member, Australian Computer Society.<\/li>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Qualifications: Ph.D., Computing (Computer security engineering)\u00a0 Monash University (2026 QS World ranking: #36) M.Sc. (by research), Informatics and Software Engineering [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages\/166"}],"collection":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/comments?post=166"}],"version-history":[{"count":18,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages\/166\/revisions"}],"predecessor-version":[{"id":388,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages\/166\/revisions\/388"}],"wp:attachment":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/media?parent=166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}