النسخة العربية

Oman National CERT Towards a safe cyber environment

INNOVATE OMAN

INNOVATE OMAN

We are very excited to launch Innovate Oman with the UK Oman Digital Hub , Plexal , CyLon , Imperial College London , and AL JABR . We’re supporting digital innovators in Oman through hackathons, accelerators and mentoring. Apply for our first cyber hackathon and we’ll help you build your pitch.

View
Oman 3rd best Arab country in Cybersecurity Index 2020

Oman 3rd best Arab country in Cybersecurity Index 2020

Oman has been ranked third in the Arab world and 21st globally in the Global Cybersecurity Index 2020 report released by the International Telecommunication Union (ITU).

View
Innovation Hub Oman’s 1st Virtual Hackathon

Innovation Hub Oman’s 1st Virtual Hackathon

Under the theme innovation in Fintech and Cybersecurity, Oman National CERT is partnering with Oman Arab Bank to host Oman’s 1st 24 hours virtual hackathon on 2nd and 3rd April 2021.The registration is open for all students and professionals. Join us by registering at www.oabinnovation.com

View
Safer Internet Day 2021

Safer Internet Day 2021

Safer Internet Day 2021 will take place on Tuesday, 9 February 2021, when - once again - we'll join forces across the globe to work "Together for a better internet".

View
6th National Cybersecurity drill

6th National Cybersecurity drill

The virtual drill is organized by the Ministry of Transport, Communications and Information Technology, represented by Oman National Computer Emergency Readiness Team (OCERT) in cooperation and coordination with the Cyber Defence Centre. Thirty-two government institutions participate in the drill.

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Publications Library

Publications Library

OCERT Newsletters
Category: OCERT Newsletters

1st Ambassadors Newsletter 2014 includes the latest news, announcements, articles, videos, upcoming courses, campaigns’ coverage, program statistics, ambassadors’ feedback and efforts.

Books
Category: Books

This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.

Magazines
Category: Magazines

Access Control and Security Systems magazine and Security Solutions Web site are business-to-business publications that focuses on how America's commercial, industrial and institutional facilities employ security systems to make their sites safer. We focus on the equipment used in security systems, and especially on how that equipment is integrated into "security solutions."

Books
Category: Books

Combines digital signal processing, psychoacoustic modeling and communications theory in developing algorithms for audio watermarking and steganography.

Books
Category: Books

This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.

Books
Category: Books

The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.

Books
Category: Books

This book introduces the major risks associated with using the Internet today, outlines the services users want from the Internet and the security problems and the outlines the basic security principles that an organization needs to understand before it adopts a security policy and invests in specific security mechanisms.

Books
Category: Books

This book concerns elementary and advanced aspects of coding theory and cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.

Books
Category: Books

This book is included Safe Computing in the Information Age. Computer systems are coming of age. As computer systems become more prevalent, sophisticated, embedded in physical processes, and interconnected, society becomes more vulnerable to poor system design, accidents that disable systems, and attacks on computer systems.

Books
Category: Books

Studies the security of public key cryptosystems, in particular the RSA public key cryptosystem and several variants.

1