{"id":4219,"date":"2020-02-19T15:42:22","date_gmt":"2020-02-19T12:42:22","guid":{"rendered":"http:\/\/engineering.tiu.edu.iq\/computer\/?p=4219"},"modified":"2020-10-18T11:34:44","modified_gmt":"2020-10-18T08:34:44","slug":"cyber-security-workshop","status":"publish","type":"post","link":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/","title":{"rendered":"Cyber Security Workshop"},"content":{"rendered":"<p style=\"text-align: justify;\">Global Shapers &#8211; Erbil Hub and in collaboration with the department of Computer Engineering, will be organizing a workshop on Cyber Security on Thursday, February 20th, 2020. The workshop will be presented by Mr. Saadulla D. Ahmed, Founder of Suncode IT Solutions and Consultancy Co.<\/p>\n<p style=\"text-align: justify;\">Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Wi-Fi, and due to the growth of &#8220;smart&#8221; devices, including smartphones, televisions, and the various devices that constitute the &#8220;Internet of things&#8221;.<\/p>\n<p style=\"text-align: justify;\">Owing to its complexity, both in terms of politics and technology, cyber security is also one of the major challenges in the contemporary world. \u00b7 In this workshop, participants will get an overview of how to analyze and monitor potential computing threats, what are malwares, Spams and Keyloggers? they will understand several types of hacking attacks.<\/p>\n<p>Participants will learn the following:<\/p>\n<ul>\n<li>How to protect their systems and network infrastructures and implement security solutions.<\/li>\n<li>They will get an idea on most known ways\u2019 hackers can socially engineer them at their work or home through email, mobile phones, browsing, downloaded files, connected home devices.<\/li>\n<li>They will know the common human emotions that hackers like to trigger, to trick them into giving them access to their money, personal accounts, systems and company networks.<\/li>\n<li>They will learn how to stop successful social engineering attacks.<\/li>\n<li>Learn how to securely configure their browser to block malicious scripts, cookies, trackers etc. on the Internet.<\/li>\n<li>After taking the workshop, they will feel safe, secure and private on the internet.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The workshop will be held in room #202, Tishk International University&#8217;s main building from 11:00 AM &#8211; 01:00 PM<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Global Shapers &#8211; Erbil Hub and in collaboration with the department of Computer Engineering, will be organizing a workshop on Cyber Security on Thursday, February 20th, 2020. The workshop will be presented by Mr. Saadulla D. Ahmed, Founder of Suncode IT Solutions and Consultancy Co. Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, <a href=\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\"> [&#8230;]<\/a><\/p>\n","protected":false},"author":57,"featured_media":4223,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":0,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-4219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-announcements"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>- Computer Engineering Department Tishk International University,<\/title>\n<meta name=\"description\" content=\"how to analyze and monitor potential computing threats, what are malwares, Spams and Keyloggers? main building from 11:00 AM - 01:00 PM\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Computer Engineering Department Tishk International University,\" \/>\n<meta property=\"og:description\" content=\"how to analyze and monitor potential computing threats, what are malwares, Spams and Keyloggers? main building from 11:00 AM - 01:00 PM\" \/>\n<meta property=\"og:url\" content=\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Engineering Department\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-19T12:42:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-18T08:34:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.png?fit=1275%2C1000&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1275\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Web Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:site\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Web Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\"},\"author\":{\"name\":\"Web Admin\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e\"},\"headline\":\"Cyber Security Workshop\",\"datePublished\":\"2020-02-19T12:42:22+00:00\",\"dateModified\":\"2020-10-18T08:34:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\"},\"wordCount\":320,\"publisher\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#organization\"},\"image\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\",\"name\":\"- Computer Engineering Department Tishk International University,\",\"isPartOf\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg\",\"datePublished\":\"2020-02-19T12:42:22+00:00\",\"dateModified\":\"2020-10-18T08:34:44+00:00\",\"description\":\"how to analyze and monitor potential computing threats, what are malwares, Spams and Keyloggers? main building from 11:00 AM - 01:00 PM\",\"breadcrumb\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg\",\"contentUrl\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg\",\"width\":1275,\"height\":1000,\"caption\":\"Tishk International University | Computer Engineering Department\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/engineering.tiu.edu.iq\/computer\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Workshop\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#website\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/\",\"name\":\"TIU\",\"description\":\"The Future is Here\",\"publisher\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/engineering.tiu.edu.iq\/computer\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#organization\",\"name\":\"TIU\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"TIU\"},\"image\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\",\"https:\/\/x.com\/tishkuni\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e\",\"name\":\"Web Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"caption\":\"Web Admin\"},\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/author\/web_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Computer Engineering Department Tishk International University,","description":"how to analyze and monitor potential computing threats, what are malwares, Spams and Keyloggers? main building from 11:00 AM - 01:00 PM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/","og_locale":"en_US","og_type":"article","og_title":"- Computer Engineering Department Tishk International University,","og_description":"how to analyze and monitor potential computing threats, what are malwares, Spams and Keyloggers? main building from 11:00 AM - 01:00 PM","og_url":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/","og_site_name":"Computer Engineering Department","article_publisher":"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","article_published_time":"2020-02-19T12:42:22+00:00","article_modified_time":"2020-10-18T08:34:44+00:00","og_image":[{"width":1275,"height":1000,"url":"https:\/\/i0.wp.com\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.png?fit=1275%2C1000&ssl=1","type":"image\/png"}],"author":"Web Admin","twitter_card":"summary_large_image","twitter_creator":"@tishkuni","twitter_site":"@tishkuni","twitter_misc":{"Written by":"Web Admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#article","isPartOf":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/"},"author":{"name":"Web Admin","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e"},"headline":"Cyber Security Workshop","datePublished":"2020-02-19T12:42:22+00:00","dateModified":"2020-10-18T08:34:44+00:00","mainEntityOfPage":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/"},"wordCount":320,"publisher":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#organization"},"image":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage"},"thumbnailUrl":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/","url":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/","name":"- Computer Engineering Department Tishk International University,","isPartOf":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage"},"image":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage"},"thumbnailUrl":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg","datePublished":"2020-02-19T12:42:22+00:00","dateModified":"2020-10-18T08:34:44+00:00","description":"how to analyze and monitor potential computing threats, what are malwares, Spams and Keyloggers? main building from 11:00 AM - 01:00 PM","breadcrumb":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#primaryimage","url":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg","contentUrl":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2020\/02\/cyber-security-workshop-01.jpg","width":1275,"height":1000,"caption":"Tishk International University | Computer Engineering Department"},{"@type":"BreadcrumbList","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/cyber-security-workshop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/engineering.tiu.edu.iq\/computer\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Workshop"}]},{"@type":"WebSite","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#website","url":"https:\/\/engineering.tiu.edu.iq\/computer\/","name":"TIU","description":"The Future is Here","publisher":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/engineering.tiu.edu.iq\/computer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#organization","name":"TIU","url":"https:\/\/engineering.tiu.edu.iq\/computer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"TIU"},"image":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","https:\/\/x.com\/tishkuni"]},{"@type":"Person","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e","name":"Web Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","caption":"Web Admin"},"url":"https:\/\/engineering.tiu.edu.iq\/computer\/author\/web_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts\/4219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/comments?post=4219"}],"version-history":[{"count":2,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts\/4219\/revisions"}],"predecessor-version":[{"id":4227,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts\/4219\/revisions\/4227"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/media\/4223"}],"wp:attachment":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/media?parent=4219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/categories?post=4219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/tags?post=4219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}