Dr. Tahir M. Khan is an Assistant Professor in the Department of Computer and Information Technology at the Purdue University in West Lafayette, Indiana. Prior to joining Purdue University, he worked as an Assistant Professor in the Department of Information Systems and Technology at Utah Valley University. He has taught a wide range of courses including cybersecurity, system administration, digital forensics, and information technology courses at Utah Valley University and Gallaudet University. He also worked with Gallaudet University, where he had privileged of learning and teaching in American Sign Language (ASL).
Doctor of Philosophy in Information Technology, August 2017
George Mason University, Fairfax, VA
Master of Science in Information Systems Technology, August 2011
George Washington University, Washington, DC
Bachelor of Science in Information Media, December 2006
Saint Cloud State University, Saint Cloud, MN
Research Areas of Interest
Dr. Tahir Khan research interests are in the area of computer privacy, computer security, computer forensics, cybersecurity, internet of things, and cloud computing.
All students and faculty members are welcome to contact me at firstname.lastname@example.org for collaborating research projects.
Purdue University (Spring 2020)
CNIT 47100 - Vulnerability Analysis And Testing
CNIT 58100 - Malware Forensics
Purdue University (Fall 2019)
CNIT 34000 – UNIX Administration
Utah Valley University (Fall 2018 – Summer 2019)
IT 1200 - Scripting for Administrators
IT 2530 - Introduction to System Administration--Windows Client
IT 3530 - Advanced System Administration--Windows Server
IT 4850 - Digital Forensics Investigations
IT 6300 - Principles of Cybersecurity (Graduate Cybersecurity Course)
Gallaudet University (Fall 2012 - Spring 2018)
Advanced System Administration – Windows Server
Business Computer Applications
Client/Server Database Applications
Computer Hardware Essentials
Computer Networking Essentials
Decision Support Systems for Managers (Graduate Course)
Information Security Fundamentals
Information Technology Fundamentals
Introduction to Network Intrusions and Cybercrime
Intrusion Detections and Penetration Testing
Management Information Systems
Network Administration – Server Support
Operating Systems Essentials
Social and Professional Issues in IT
System Analysis and Design
Research and Publications
Jones, J., and Khan, T. (2017). Deleted File Persistence on Digital Media, Digital Forensics Research Workshop (DFRWS); Austin, Texas; organized by DFRWS; August 6-9, 2017.
Jones, J., Khan T., Laskey K., Nelson A., Laamanen M., and White D. (2016). Inferring previously uninstalled applications from digital traces. In Proceedings of the Conference on Digital Forensics, Security and Law 2016, pages 113–130, 2016.
Jones, J., Laskey, K., Khan, T., McCarrin, M. (2015). Inferring Past Activity from Partial Digital Artifacts, Open Source Digital Forensics Conference (OSDFcon); Herndon, Virginia; organized by Basis Technology; October 28, 2015.
Jones, J., Laskey, K., Khan, T., Nelson, A., Laamanen, M., White, D. (2015). Inferring Past Activity from Partial Digital Artifacts, Digital Forensics Research Workshop (DFRWS); Philadelphia, Pennsylvania; organized by DFRWS; August 10, 2015.
Khan, T. M. (2009). Microsoft Windows Vista: installing, upgrading and troubleshooting: step by step: a complete guide and reference. North Charleston, SC: BookSurge Publishing.
Khan, T. M. (2010). Installing, Upgrading and Troubleshooting Step by Step Guide: A Complete Guide and Reference. North Charleston, SC: Createspace.
Khan, T., Keith, S., (2005). Pollution Diffusion at SCSU. Annual St. Cloud State University Student Research Colloquium 2005; April 19, 2005.