mustafa qahtan alsudani - Expert Profile

Profile Photo

Dr. mustafa qahtan alsudani

Jabir Ibn Hayyan University for Medical and Pharmaceutical Sciences

7 years of experience

cybersecurity , network security , data security

Iraq

About

I have extensive professional experience in the field of cybersecurity and network security, with a strong focus on analyzing, maintaining, troubleshooting, and securing network infrastructures in both research and applied technical environments. My work has concentrated on evaluating system vulnerabilities, analyzing network traffic, and developing defensive strategies to enhance the resilience of digital systems against cyber threats.

Throughout my career, I have gained hands-on expertise using specialized cybersecurity tools and environments, particularly in network traffic analysis, penetration testing, and threat detection. My experience includes working with tools such as Nmap, Wireshark, and various Linux-based security distributions such as Kali Linux, which I have used to conduct detailed experiments involving TCP SYN scans, UDP scans, XMAS scans, NULL scans, and FIN scans. These experiments were performed in controlled research environments using virtual machines (Ubuntu as the target system and Kali as the attacker) to simulate real-world attack scenarios and document network behavior under different scanning techniques.

In addition to technical execution, I have developed structured methodologies, analysis reports, and detailed documentation to support academic and scientific research in cybersecurity. This includes creating technical manuals, experiment workflows, and comprehensive network packet analyses aimed at improving the understanding of port-scanning behavior, intrusion detection mechanisms, and network protocol vulnerabilities. My documentation work is aligned with academic standards and supports publication in peer-reviewed engineering and cybersecurity journals.

I have also contributed to training and capacity-building efforts by guiding students and technical teams in understanding cybersecurity fundamentals, network monitoring, and secure system configuration. My training sessions and materials emphasize practical, real-world problem-solving using open-source security tools and standard network defense techniques.

My professional experience is supported by ongoing research in cybersecurity and network defense, particularly in analyzing network vulnerabilities using packet-capture files and evaluating system response behavior under different scanning and probing conditions. This work contributes to improving security practices and developing more resilient network infrastructures in academic and engineering environments.

Areas of Expertise

Technical Fields

Engineering Sciences

Training Capabilities

My academic specialization focuses on cybersecurity and network-security research using advanced laboratory and analytical equipment commonly utilized in scientific and educational environments. I have hands-on experience with the following systems, tools, and platforms:

Network & Cybersecurity Laboratory Equipment

Managed Network Switches (Cisco, TP-Link, MikroTik) for VLAN configuration, segmentation, and traffic isolation

Enterprise Routers & Firewalls (Cisco ISR, MikroTik Cloud Router Switch, pfSense appliances)

Wireless Access Points used for Wi-Fi security testing and encryption analysis

Virtualization & Simulation Systems

VMware Workstation and Oracle VirtualBox

for building attacker/target environments and simulating network infrastructures

Linux-based Security Labs (Kali Linux, Parrot Security OS)

Ubuntu / Debian Servers used for hosting vulnerable services for academic testing

Network Traffic Analysis & Protocol Research Tools

Wireshark

for packet inspection, protocol analysis, and network traffic monitoring

Nmap / Zenmap

used for port scanning experiments and vulnerability detection

TCPdump & Tshark

command-line packet capture tools for deep network analysis

Security Testing & Monitoring Systems

OpenVAS Vulnerability Scanner

Snort IDS / Suricata IDS

for intrusion detection research and experiment documentation

Metasploitable & DVWA

vulnerable virtual machines for controlled penetration testing

Scientific & Academic Computing Resources

High-performance computing nodes used for running analysis scripts

Python-based research tools (Scapy, Pandas)

used for packet manipulation and dataset analysis

Languages

English Arabic

Availability

2 weeks

Linkdin/Google Scholar/Institution Link

https://scholar.google.com/citations?user=F_dKkJ0AAAAJ&hl=en