Prof. Rexha started his teaching career back in 1995 at Mitrovica Technical Highschool, at that time part of University of Prishtina. Currently he is teaching several courses related to his field of expertise in bachelor, master and PhD studies in Computer Engineering department at University of Prishtina.

Currrent Teaching

  • Present2005

    Data Security

    Course content includes: Symmetric encryption algorithm: Data Encryption Standard (DES), Advanced Encryption Standard (AES), Asymmetric encryption algorithm: Rivest Shamir Addelman (RSA) , elliptic curve, Public key infrastructure (PKI), digital signatures, User authentication, e-mail security , Smart cards, Threats and virus handling, attacks, malware, and buffer overflow attacks, spoofing, Hands on: digital certificates X.509 and PKI

  • Present2007

    Computer Networks

    Course content includes: layer protocols and services, Internet Service Provider (ISP), Internet History. Principles of network applications, Web, HTTP, FTP, email, DNS and web server. Introduction to the transport layer services, multiplexing and de-multiplexing, reliable data transfer, TCP Protocol, wireshark tool for monitoring traffic, routing, network service model, virtual circuits and datagram networks, ports, IP protocol, routing algorithms, routing in the internet, link layer services, error detection codes, CRC, MAC, LAN, Ethernet Hubs & Switches, PPTP protocol, CDMA, WiFi, Mobile IP, cellular architecture, small offices home office network configuration (SOHO)

  • Present2007

    Software Engineering

    Course content: Software systems engineering, Ethical and professional responsibility, Organization, people and computer systems. Models of software processes, Iterative and approximate processes, Rational Unified Model, CASE. Management activities, Project planning, Scheduling activities, Risk management, Version planning, Version management, Software tools. Functional and non-functional requirements, User requirements, System requirements, Interface specification, Document of software requirements, Feasibility study, Analysis and validation of the requirements. System model and architectural design. Agile methods of software development. Reusability of software and testing

  • Present2014

    Internet Security

    Course content: Introduction to Cryptography, Terminology, types of attacks. Symmetric algorithms: DES/T-DES/AES. Non-symmetric algorithms: Principles of Cryptosystems with Public Key, RSA, Diffie-Hellman, Elliptic Curve, Hash functions (one way functions): MD5, SHA-1, SHA-12, Digital Signatures: Security in the Transport layer, Functionality of MIME and S / MIME, Architecture of Internet Mail, DKIM Strategy, E-mail Threats. Firewall Characteristics, Needs for firewall, Firewall configuration, Creation of a firewall to filter through a Linux PC, De-militarized Zone (DMZ), VPN. What is a virus, types of viruses, what is architecture of a virus, what are Trojans, virus protection steps. Introducing Network Components and Architecture Model, Services, Operation phases, Authentication phases, Key Management phases, Data transfer protection phases, WAP architecture, WAP End-to-End Security. Introduction to IP Security and benefits, IPsec documentation, IPsec Services, Anti-Replay Service, Transport and Tunnel Mode, Internet key exchange

Teaching History

  • 20122008

    Computer Networks Lab

    Lab part of the Computer Network course