{"id":37252,"date":"2026-05-12T18:20:20","date_gmt":"2026-05-12T15:20:20","guid":{"rendered":"https:\/\/bti.stu.edu.iq\/?p=37252"},"modified":"2026-05-14T09:00:17","modified_gmt":"2026-05-14T06:00:17","slug":"a-faculty-member-at-the-technological-technical-institute-in-basra-delivered-an-online-course-on-fundamental-cybersecurity","status":"publish","type":"post","link":"https:\/\/bti.stu.edu.iq\/en\/37252\/","title":{"rendered":"A Faculty Member at the Technological Technical Institute in Basra Delivered an Online Course on Fundamental Cybersecurity."},"content":{"rendered":"<div dir=\"auto\">\n<div class=\"relative w-full overflow-visible\">\n<section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-(--header-height)\" dir=\"auto\" data-turn-id=\"10469378-869d-4cba-9599-89b8677076c1\" data-turn-id-container=\"10469378-869d-4cba-9599-89b8677076c1\" data-testid=\"conversation-turn-65\" data-scroll-anchor=\"false\" data-turn=\"user\">\n<div class=\"text-base my-auto mx-auto pt-12 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col\">\n<div class=\"flex max-w-full flex-col gap-4 grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"user\" data-message-id=\"10469378-869d-4cba-9599-89b8677076c1\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden items-end rtl:items-start\">\n<div class=\"flex flex-col w-fit max-w-(--user-chat-width,70%) items-start self-end rtl:items-end rtl:self-start\">\n<div class=\"user-message-bubble-color corner-superellipse\/0.98 relative min-w-0 overflow-hidden rounded-[22px] px-4 py-2.5 leading-6 w-full\">\n<div class=\"A_HxFq_root\" data-custom-highlighting-behavior=\"boundary\" data-testid=\"collapsible-user-message-root\">\n<div id=\"_r_84_\" class=\"A_HxFq_content\" data-testid=\"collapsible-user-message-content\">\n<div class=\"max-w-full min-w-0 [overflow-wrap:anywhere] whitespace-pre-wrap\"><span style=\"font-size: 1rem;\">In line with the directives of the President of the Southern Technical University, Professor Dr. Adnan Abdullah Ateeq, and under the supervision of the Dean of the Technological Technical Institute in Basra, Assistant Professor Dr. Diyah Kammel Shary, Dr. Mahmoud Arif Al-Shuraida, a faculty member in the Electronic Technologies Department at the Institute, delivered the lectures of the online course entitled: <\/span><span style=\"font-size: 1rem;\">\u201cFundamental Cybersecurity\u201d<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"relative w-full overflow-visible\">\n<section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:d7c313b6-6a8e-4afa-93f6-57ef4117b9b1-32\" data-turn-id-container=\"request-WEB:d7c313b6-6a8e-4afa-93f6-57ef4117b9b1-32\" data-testid=\"conversation-turn-66\" data-scroll-anchor=\"false\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex max-w-full flex-col gap-4 grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"2306dc47-1dd9-4e02-8e5e-26d40ff351da\" data-message-model-slug=\"gpt-5-5\" data-turn-start-message=\"true\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden\">\n<div class=\"markdown prose dark:prose-invert wrap-break-word w-full light markdown-new-styling\">\n<p data-start=\"443\" data-end=\"641\">The course was organized by the Continuing Education Center at the Southern Technical University with broad participation from academic staff and researchers representing various Iraqi universities.<\/p>\n<p data-start=\"643\" data-end=\"853\">The course covered several important topics related to cybersecurity concepts, cyber threats, methods of protecting information and data, as well as the best practices adopted in strengthening digital security.<\/p>\n<p data-start=\"855\" data-end=\"1028\" data-is-last-node=\"\" data-is-only-node=\"\">This course comes within the framework of supporting scientific and academic activities and enhancing cybersecurity awareness in line with modern technological developments<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<div dir=\"auto\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-37235\" src=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698228560_990642373483811_9131232011304423630_n-300x150.jpg\" alt=\"\" width=\"300\" height=\"150\" srcset=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698228560_990642373483811_9131232011304423630_n-300x150.jpg 300w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698228560_990642373483811_9131232011304423630_n-768x385.jpg 768w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698228560_990642373483811_9131232011304423630_n-100x50.jpg 100w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698228560_990642373483811_9131232011304423630_n-1536x770.jpg 1536w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698228560_990642373483811_9131232011304423630_n.jpg 1600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/> <img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-37237\" src=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698764909_990642436817138_7738744149785392128_n-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698764909_990642436817138_7738744149785392128_n-300x200.jpg 300w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698764909_990642436817138_7738744149785392128_n-768x512.jpg 768w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698764909_990642436817138_7738744149785392128_n-100x67.jpg 100w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2026\/05\/698764909_990642436817138_7738744149785392128_n.jpg 1536w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In line with the directives of the President of the Southern Technical University, Professor Dr. Adnan Abdullah Ateeq, and under the supervision of the Dean of the Technological Technical Institute in Basra, Assistant Professor Dr. Diyah Kammel Shary, Dr. Mahmoud Arif Al-Shuraida, a faculty member [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":37234,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[116],"tags":[],"table_tags":[],"class_list":["post-37252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts\/37252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/comments?post=37252"}],"version-history":[{"count":1,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts\/37252\/revisions"}],"predecessor-version":[{"id":37253,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts\/37252\/revisions\/37253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/media\/37234"}],"wp:attachment":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/media?parent=37252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/categories?post=37252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/tags?post=37252"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/table_tags?post=37252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}