A Crash Course in Information Security

Course Description

This course equips the trainees with essential understanding of the concepts of Information Security, including the threats and ways of prevention, protection, and recovery from various types of malicious sources that threaten information systems. 

Course Objectives
This course aims to:

  • Provide an insight into the principles of Information Security and introduce protection mechanisms used to prevent attacks on computer systems.
  • Familiarise the trainees about the cryptographic concepts for various cipher systems. 
  • Explore different types of attack and the underneath concepts used to compromise systems.

Course Outcomes
At the end of the course, the participants should be able to:

  • Understand different protection methods that provide confidentiality, integrity, and availability of information systems. 
  • Implement different encryption methods.
  • Differentiate between different types of threats and ways of prevention. 

Who should Attend?
This course is suited for

  • Individuals with reasonable knowledge in any computer discipline with decent mathematic skills.
  • Secondary school students who studied computer for at least three years. 

Training Strategies

The following training strategies will be adopted for this course:

  • Group work, tutorial exercises, simple assignments, and lectures. 

Delivery Plan

  • Introduction to Information Security (day 1). 
  • Classic and Modern Ciphers (day 2). 
  • Security software and protocols (day 3).

Starts February 20, 2023 Ends February 22, 2023


Hours per Day: 4
Number of Days: 3
Total no. of Hours: 12 hours. 


Morning from    9:00 a.m. till 11:00 a.m.

Afternoon from   2:00 p.m. till 4:00 p.m.


Teaching is in English, but  Kurdish and Arabic support can be available if necessary.

Trainer Biography
Dr. Govand Kadir is an assistant professor in the Department of Computer Science and Engineering at UKH. He has more than 15 years of teaching experience and is an expert in the field of wireless networks and Cyber Security. H successfully conducted many kinds of research and projects with undergraduate and postgraduate students.