Teaching
Teaching Activity
Alongside my professional and research activities, I am actively involved in academic teaching and executive education in the field of cybersecurity, with a particular focus on Cyber Threat Intelligence, dark web analysis, ransomware ecosystems, and offensive security.
My teaching activity is designed to bridge theoretical foundations, technical understanding, and real-world operational practices, with the objective of helping students and professionals develop a more structured and applied understanding of contemporary cyber threats.
University of Sannio (Unisannio)
As part of my academic and professional commitment to advancing Cyber Threat Intelligence, I am currently engaged as a PhD student and university lecturer at the University of Sannio.
My teaching and research activities at Unisannio focus on:
- Cyber Threat Intelligence (CTI)
- Dark Web Intelligence
- Ransomware ecosystems and operations
- Threat actor profiling and intelligence methodologies
- OSINT and CLOSINT data acquisition
- Threat Intelligence Platforms (TIPs) and applied intelligence workflows
This work is closely integrated with my ongoing research in attacker-centric CTI and ransomware ecosystem analysis.
University of Rome Tor Vergata
As part of the Master in Cybersecurity and Privacy at the University of Rome Tor Vergata, I deliver advanced modules focused on:
- Cyber Threat Intelligence
- Dark Web ecosystems
- Ransomware operations
- Threat actor tracking and infrastructure analysis
- OSINT-based investigation methodologies
These lectures are designed for a diverse audience including IT professionals, legal experts, and public-sector personnel, combining technical depth with applied threat intelligence methodologies and real-world case studies.
IUSI – Executive Master in Cybersecurity
I also contributed to the Executive Master in Cybersecurity at IUSI, where I delivered the practical laboratory module on penetration testing.
This training activity focused on:
- Reconnaissance and enumeration techniques
- Vulnerability validation and exploitation logic
- Privilege escalation and post-exploitation
- Structured penetration testing methodologies
- Technical reporting and attack path interpretation
The objective of this module was to provide participants with practical, ethically grounded offensive security skills in controlled environments.
Teaching Areas
My teaching activity currently covers topics such as:
- Cyber Threat Intelligence (CTI)
- Dark Web Intelligence
- Ransomware ecosystems and extortion models
- Threat actor behavior and operational patterns
- Indicators of Compromise (IoCs) and Indicators of Attack (IoAs)
- OSINT and CLOSINT methodologies
- Threat Intelligence Platforms (TIPs)
- Penetration Testing and adversarial tradecraft
- Applied cybersecurity case studies and threat analysis
Teaching Approach
My teaching is based on a practical and research-informed approach that combines:
- conceptual and methodological foundations
- real-world case studies
- technical demonstrations
- attacker-centric analysis
- operational relevance
This approach helps students and professionals move beyond purely theoretical cybersecurity models and better understand how adversarial ecosystems evolve in real-world contexts.
Academic and Professional Integration
A core element of my teaching philosophy is the integration between:
- academic research
- professional cybersecurity practice
- threat intelligence analysis
- technical and strategic education
This allows the educational experience to remain closely aligned with current developments in both the threat landscape and applied cybersecurity operations.