النسخة العربية

Oman National CERT Towards a safe cyber environment

Regional Cybersecurity Week 2019

Regional Cybersecurity Week 2019

The 2nd Regional Cybersecurity Week will be held from 27th to 31st October 2019 in Kempinski Hotel, Muscat, Sultanate of Oman...

View
OIC-CERT Drill 2019

OIC-CERT Drill 2019

The OIC-CERT1 Drill is an annual event for the OIC-CERT member teams ...

View
National Cyber Security Drill ( Malware and dark web: The Persistent Threat )

National Cyber Security Drill ( Malware and dark web: The Persistent Threat )

The objective of this Cyber Drill is to enhance communication, teamwork, and participating teams’ incident response capabilities to ensure continued collective efforts against cyber threats through the CIRT of the region.

View
Oman Threat Hunters 2019

Oman Threat Hunters 2019

The ITU- Arab Regional Cybersecurity Centre (ITU-ARCC), hosted by Information Technology Authority and Oman National CERT, and in partnership with Silensec , is organizing “Threat Hunters 2019” , a national cybersecurity competition.Registration is open now through : https://cyberstars.pro/profile/register/

View
ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

The ISO/IEC 27001 Lead Auditor training is an intensive five-day course where you’ll discover internationally- recognized best practice auditing techniques so you can confidently lead auditing activities...

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Publications Library

Publications Library

Books
Category: Books

This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.

Books
Category: Books

Combines digital signal processing, psychoacoustic modeling and communications theory in developing algorithms for audio watermarking and steganography.

Books
Category: Books

This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.

Books
Category: Books

The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.

Books
Category: Books

This book introduces the major risks associated with using the Internet today, outlines the services users want from the Internet and the security problems and the outlines the basic security principles that an organization needs to understand before it adopts a security policy and invests in specific security mechanisms.

Books
Category: Books

This book concerns elementary and advanced aspects of coding theory and cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.

Books
Category: Books

This book is included Safe Computing in the Information Age. Computer systems are coming of age. As computer systems become more prevalent, sophisticated, embedded in physical processes, and interconnected, society becomes more vulnerable to poor system design, accidents that disable systems, and attacks on computer systems.

Books
Category: Books

Studies the security of public key cryptosystems, in particular the RSA public key cryptosystem and several variants.

Books
Category: Books

This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.

Books
Category: Books

The definitive guide to computer forensics -- the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators -- both theory and hands-on practice.

1