Personal Information
Organization / Workplace
Sultanate of Oman Oman
About
• An innovative and knowledgeable professional having 13+ years of experience as teaching faculty.
• Excellent knowledge of subject and also have great practical knowledge.
• Proficient in giving conceptual knowledge.
• Proficient in developing new lessons and activities to expand learning opportunities.
• Extensive participation on committees and extra-curricular activities.
Tags
computer security
rrb je
rrb je stage 2
rrb
rrb je stage 2 computer and applications
rrb je stage 2 computer and applications questions
security awareness
foss
previous year questions with answers and explanati
information security awareness
computer communication
computer networks
communication and networks
computer memory types
memory types
digital storage
adoption of foss
alternative educational framework
information technology
ip addressing
subnetting
cryptography
encryption
decryption
cryptology
database security
inference
sql injection
e-mail and internet use policies
polices and employment practices
computer security incident response teams
security risk assessment
detailed risk analysis process
computer security basics
computer security overview
computer security introduction
user authentication
computer security - user authentication
computer security - message authentication
message authentication
message security
elliptic curve cryptography
improved authentication
key agreement protocol
smartphone
mobile device security
smart phone security
ethical hacking steps
computer system hacking
steps for computer system hacking
internet threats
internet threats and defense mechanisms
effective information security
information security
opportunities and challenges in implementing foss
vlsm
ipv4 addressing and subnetting workbook 2016
risk determination
host-based ids
can you solve this
mental ability
problem solving
iq
problem-solving processes
education
research
research methodology
types of research
literature review
hypothesis
iot
iot security
internet of things
computer and applications
rrb je stage 2 computer and applications question
stage 2 computer and applications
b je stage 2 computer and applications questions p
previous year questions and answers with explanati
ccna 200-301 ipv6 addressing and subnetting mcqs c
ccna 200-301
ipv6 addressing
ipv6 addressing and subnetting mcqs
ccna
ipv6
cyber crime and computer crime
intellectual property
privacy and ethical issues
malware
viruses
worms
rootkits
mobile code
secure hash functions
hmac
the rsa public-key encryption algorithm
diffie-hellman key exchange protocol
symmetric encryption principles
data encryption standard
advanced encryption standard
stream ciphers and rc4
key distribution
it security management implementation
security controls or safeguards
it security plan
monitoring risks
intrusion detection
ids
intrusion
intrusion techniques
network-based ids
See more