النسخة العربية

Oman National CERT Towards a safe cyber environment

Oman Threat Hunter 2018

Oman Threat Hunter 2018

“THREAT HUNTER” a national competition that is organized by ITU-Arab Regional Cybersecurity Center (ITU-ARCC) in a partnership with Silensec ...

View
Guide Manual for Reporting Abuse Through Social Media

Guide Manual for Reporting Abuse Through Social Media

This guidance booklet is written to facilitate reporting abuse process through Social Media and afford easy, smooth, and clear way of guidance to report over social media correctly.

View
Cybersecurity Specialized Training Courses

Cybersecurity Specialized Training Courses

Oman National CERT in cooperation with the Arab Regional Cybersecurity Center (ARCC) is conducting a series of specialized training in cybersecurity hosted in Oman.

View
Oman CERT participation in the Safer Internet Day 2018

Oman CERT participation in the Safer Internet Day 2018

Oman CERT is participating in the Safer Internet Day 2018 on 6th of February 2018, under the Theme: Create, connect and share respect: A better internet starts with you

View
Oman Cybersecurity CTF competition

Oman Cybersecurity CTF competition

ARCC in collaboration with Cyber Talents are organizing "Oman Cybersecurity CTF competition" hosted by ITA through Oman National CERT.

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Articles Library

Articles Library

Category: Mobile Security

Due to the fact that mobile devices are conveniently light and small but it also makes them more vulnerable to theft or ...

Category: Mobile Security

There are many different security threats when it comes to mobile security, but we’ll try to categorize them to make it ...

Category: Mobile Security

Encryption is the process of converting your personal and confidential information into unreadable format using special ...

Category: Mobile Security

Our children are exposed to many different online material and it’s a good idea to limit them to certain trusted and ...

Category: Mobile Security

Nowadays the big buzz word is “the Cloud”, so what is the Cloud? The Cloud is the use of computing resources (hardw ...

1