{"id":6910,"date":"2025-06-16T15:41:51","date_gmt":"2025-06-16T12:41:51","guid":{"rendered":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/?p=6910"},"modified":"2026-02-16T15:47:15","modified_gmt":"2026-02-16T12:47:15","slug":"cybersecurity-basic-training-course-and-certificate-ceremony-concluded","status":"publish","type":"post","link":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/","title":{"rendered":"Cybersecurity Basic Training Course and Certificate Ceremony Concluded"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><span class=\"selected\">We are proud to announce the successful completion of the <\/span><strong><span class=\"selected\">Cybersecurity Basic Training Course<\/span><\/strong><span class=\"selected\">, a comprehensive program organized by the <\/span><strong><span class=\"selected\">IT Department<\/span><\/strong><span class=\"selected\"> and the <\/span><strong><span class=\"selected\">Computer Engineering Department<\/span><\/strong><span class=\"selected\"> at <\/span><strong><span class=\"selected\">Tishk International University \u2013 Sulaimani<\/span><\/strong><span class=\"selected\">. The course was designed to equip students with essential knowledge in <\/span><strong><span class=\"selected\">digital safety<\/span><\/strong><span class=\"selected\">, <\/span><strong><span class=\"selected\">cybersecurity fundamentals<\/span><\/strong><span class=\"selected\">, and practical strategies to defend against contemporary <\/span><strong><span class=\"selected\">cyber threats<\/span><\/strong><span class=\"selected\">.<\/span><\/p>\n<h3><strong><span class=\"selected\">A Commitment to Foundational Skills<\/span><\/strong><\/h3>\n<p><span class=\"selected\">Throughout the training, students demonstrated great enthusiasm and a strong commitment to learning, actively participating in a series of interactive sessions. These sessions were meticulously crafted to help participants build and reinforce their foundational cybersecurity skills. This initiative reflects the university\u2019s dedication to providing students with practical, industry-relevant knowledge that is critical for success in today\u2019s digital world.<\/span><\/p>\n<h3><strong><span class=\"selected\">Celebrating Achievement<\/span><\/strong><\/h3>\n<p><span class=\"selected\">To honor the dedication and hard work of all participants, a formal <\/span><strong><span class=\"selected\">Certificate Awarding Ceremony<\/span><\/strong><span class=\"selected\"> was held on <\/span><strong><span class=\"selected\">May 29, 2025<\/span><\/strong><span class=\"selected\">. The ceremony served as an important milestone, celebrating the students\u2019 newly acquired skills and encouraging their continued learning and professional development in the field of cybersecurity. We extend our sincere congratulations to all participants on this significant achievement.<\/span><\/p>\n<p><span class=\"selected\">We express our gratitude to both the IT Department and the Computer Engineering Department for their collaborative effort in organizing and delivering this successful training course. We look forward to offering more valuable skill-building opportunities in the near future.<\/span><\/p>\n<p><strong><span class=\"selected\">Keywords:<\/span><\/strong><span class=\"selected\"> Cybersecurity, Training, Certificate, IT Department, Computer Engineering, Digital Safety, Cyber Threats, Tishk International University, Professional Development<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-slider-sc\"><div class=\"fusion-flexslider-loading flexslider flexslider-hover-type-none\" data-slideshow_autoplay=\"1\" data-slideshow_smooth_height=\"0\" data-slideshow_speed=\"7000\" style=\"max-width:100%;height:100%;\"><ul class=\"slides\"><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/1-3.png\" class=\"wp-image-11834\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/2-2.png\" class=\"wp-image-11835\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/3-2.png\" class=\"wp-image-11836\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/4-3.png\" class=\"wp-image-11837\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/5-2.png\" class=\"wp-image-11838\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/6.png\" class=\"wp-image-11839\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/7-1.png\" class=\"wp-image-11840\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/8.png\" class=\"wp-image-11841\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/9.png\" class=\"wp-image-11842\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/10.png\" class=\"wp-image-11843\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/06\/11.png\" class=\"wp-image-11844\" \/><\/span><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":95,"featured_media":6911,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[191],"tags":[],"class_list":["post-6910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-university-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Basic Training Course and Certificate Ceremony Concluded - TIU<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Basic Training Course and Certificate Ceremony Concluded - TIU\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/\" \/>\n<meta property=\"og:site_name\" content=\"TIU\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-16T12:41:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T12:47:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kewan Hama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:site\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kewan Hama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/\"},\"author\":{\"name\":\"Kewan Hama\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e\"},\"headline\":\"Cybersecurity Basic Training Course and Certificate Ceremony Concluded\",\"datePublished\":\"2025-06-16T12:41:51+00:00\",\"dateModified\":\"2026-02-16T12:47:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/\"},\"wordCount\":2470,\"publisher\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png\",\"articleSection\":[\"University News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/\",\"name\":\"Cybersecurity Basic Training Course and Certificate Ceremony Concluded - TIU\",\"isPartOf\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png\",\"datePublished\":\"2025-06-16T12:41:51+00:00\",\"dateModified\":\"2026-02-16T12:47:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png\",\"contentUrl\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Basic Training Course and Certificate Ceremony Concluded\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/\",\"name\":\"TIU\",\"description\":\"Business Management Department\",\"publisher\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization\",\"name\":\"Tishk International University\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png\",\"contentUrl\":\"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png\",\"width\":4034,\"height\":3631,\"caption\":\"Tishk International University\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\",\"https:\/\/x.com\/tishkuni\",\"https:\/\/www.instagram.com\/tishk.international.university\/\",\"https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e\",\"name\":\"Kewan Hama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"caption\":\"Kewan Hama\"},\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/author\/kewan_hama_web_editor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Basic Training Course and Certificate Ceremony Concluded - TIU","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Basic Training Course and Certificate Ceremony Concluded - TIU","og_url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/","og_site_name":"TIU","article_publisher":"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","article_published_time":"2025-06-16T12:41:51+00:00","article_modified_time":"2026-02-16T12:47:15+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png","type":"image\/png"}],"author":"Kewan Hama","twitter_card":"summary_large_image","twitter_creator":"@tishkuni","twitter_site":"@tishkuni","twitter_misc":{"Written by":"Kewan Hama","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#article","isPartOf":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/"},"author":{"name":"Kewan Hama","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e"},"headline":"Cybersecurity Basic Training Course and Certificate Ceremony Concluded","datePublished":"2025-06-16T12:41:51+00:00","dateModified":"2026-02-16T12:47:15+00:00","mainEntityOfPage":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/"},"wordCount":2470,"publisher":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage"},"thumbnailUrl":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png","articleSection":["University News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/","name":"Cybersecurity Basic Training Course and Certificate Ceremony Concluded - TIU","isPartOf":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage"},"thumbnailUrl":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png","datePublished":"2025-06-16T12:41:51+00:00","dateModified":"2026-02-16T12:47:15+00:00","breadcrumb":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#primaryimage","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png","contentUrl":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/2-2.png","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/cybersecurity-basic-training-course-and-certificate-ceremony-concluded\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Basic Training Course and Certificate Ceremony Concluded"}]},{"@type":"WebSite","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/","name":"TIU","description":"Business Management Department","publisher":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization","name":"Tishk International University","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/","url":"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png","contentUrl":"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png","width":4034,"height":3631,"caption":"Tishk International University"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","https:\/\/x.com\/tishkuni","https:\/\/www.instagram.com\/tishk.international.university\/","https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q"]},{"@type":"Person","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e","name":"Kewan Hama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","caption":"Kewan Hama"},"url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/author\/kewan_hama_web_editor\/"}]}},"_links":{"self":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts\/6910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/comments?post=6910"}],"version-history":[{"count":1,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts\/6910\/revisions"}],"predecessor-version":[{"id":6912,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts\/6910\/revisions\/6912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/media\/6911"}],"wp:attachment":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/media?parent=6910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/categories?post=6910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/tags?post=6910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}