Personal Information
Organization / Workplace
Sultanate of Oman Oman
About
• An innovative and knowledgeable professional having 13+ years of experience as teaching faculty.
• Excellent knowledge of subject and also have great practical knowledge.
• Proficient in giving conceptual knowledge.
• Proficient in developing new lessons and activities to expand learning opportunities.
• Extensive participation on committees and extra-curricular activities.
Tags
rrb je stage 2
rrb je
computer security
rrb
rrb je stage 2 computer and applications
rrb je stage 2 computer and applications questions
previous year questions with answers and explanati
security awareness
foss
information security awareness
ipv6
ccna
ipv6 addressing and subnetting mcqs
ipv6 addressing
ccna 200-301
ccna 200-301 ipv6 addressing and subnetting mcqs c
previous year questions and answers with explanati
b je stage 2 computer and applications questions p
stage 2 computer and applications
rrb je stage 2 computer and applications question
computer and applications
internet of things
iot security
iot
hypothesis
literature review
types of research
research methodology
research
education
problem-solving processes
iq
problem solving
mental ability
can you solve this
host-based ids
network-based ids
intrusion techniques
intrusion
ids
intrusion detection
monitoring risks
it security plan
security controls or safeguards
it security management implementation
key distribution
stream ciphers and rc4
advanced encryption standard
data encryption standard
symmetric encryption principles
diffie-hellman key exchange protocol
the rsa public-key encryption algorithm
hmac
secure hash functions
mobile code
rootkits
worms
viruses
malware
privacy and ethical issues
intellectual property
cyber crime and computer crime
risk determination
detailed risk analysis process
security risk assessment
computer security incident response teams
polices and employment practices
e-mail and internet use policies
sql injection
inference
database security
cryptology
decryption
encryption
cryptography
computer communication
computer networks
communication and networks
computer memory types
memory types
digital storage
adoption of foss
alternative educational framework
information technology
ip addressing
subnetting
ipv4 addressing and subnetting workbook 2016
vlsm
opportunities and challenges in implementing foss
information security
effective information security
internet threats and defense mechanisms
internet threats
steps for computer system hacking
computer system hacking
ethical hacking steps
smart phone security
mobile device security
smartphone
key agreement protocol
improved authentication
elliptic curve cryptography
message security
message authentication
computer security - message authentication
computer security - user authentication
user authentication
computer security introduction
computer security overview
computer security basics
See more
Presentations
(36)Documents
(1)Personal Information
Organization / Workplace
Sultanate of Oman Oman
About
• An innovative and knowledgeable professional having 13+ years of experience as teaching faculty.
• Excellent knowledge of subject and also have great practical knowledge.
• Proficient in giving conceptual knowledge.
• Proficient in developing new lessons and activities to expand learning opportunities.
• Extensive participation on committees and extra-curricular activities.
Tags
rrb je stage 2
rrb je
computer security
rrb
rrb je stage 2 computer and applications
rrb je stage 2 computer and applications questions
previous year questions with answers and explanati
security awareness
foss
information security awareness
ipv6
ccna
ipv6 addressing and subnetting mcqs
ipv6 addressing
ccna 200-301
ccna 200-301 ipv6 addressing and subnetting mcqs c
previous year questions and answers with explanati
b je stage 2 computer and applications questions p
stage 2 computer and applications
rrb je stage 2 computer and applications question
computer and applications
internet of things
iot security
iot
hypothesis
literature review
types of research
research methodology
research
education
problem-solving processes
iq
problem solving
mental ability
can you solve this
host-based ids
network-based ids
intrusion techniques
intrusion
ids
intrusion detection
monitoring risks
it security plan
security controls or safeguards
it security management implementation
key distribution
stream ciphers and rc4
advanced encryption standard
data encryption standard
symmetric encryption principles
diffie-hellman key exchange protocol
the rsa public-key encryption algorithm
hmac
secure hash functions
mobile code
rootkits
worms
viruses
malware
privacy and ethical issues
intellectual property
cyber crime and computer crime
risk determination
detailed risk analysis process
security risk assessment
computer security incident response teams
polices and employment practices
e-mail and internet use policies
sql injection
inference
database security
cryptology
decryption
encryption
cryptography
computer communication
computer networks
communication and networks
computer memory types
memory types
digital storage
adoption of foss
alternative educational framework
information technology
ip addressing
subnetting
ipv4 addressing and subnetting workbook 2016
vlsm
opportunities and challenges in implementing foss
information security
effective information security
internet threats and defense mechanisms
internet threats
steps for computer system hacking
computer system hacking
ethical hacking steps
smart phone security
mobile device security
smartphone
key agreement protocol
improved authentication
elliptic curve cryptography
message security
message authentication
computer security - message authentication
computer security - user authentication
user authentication
computer security introduction
computer security overview
computer security basics
See more