Content has been allocated for mentally and physically challenged people, proportionate to their cognitive abilities, to qualify them and enable them to safely use the Internet and modern electronic devices, taking into account the variety of special needs of these people. This is similar to the content that is intended for students of various age groups.

In order to ensure the promotion of the concepts of digital citizenship and the consolidation of cyber security, cyber security educational curricula are directed to all groups and segments of society without exception. They also aim to raise a comprehensive level of awareness within the local community.

The platform is being authorized for digital access in compliance with international standards to enable the right of physically and mentally individuals to independently access information.

  • 1

    Safe Internet Usage

    This visual content discusses Internet safety, protecting personal information like passwords, pictures, and important information, and how to use the Internet safely. like keeping the family,s phone numbers and other information private.

    WATCH NOW
  • 2

    Rules for Safe Internet Browsing

    This visual content talks about how the user can protect themselves from the risks of using the Internet on their own; in order to prevent anonymous individuals from stealing their data and the significance of providing virus protection software.

    WATCH NOW
  • 3

    Safe Email Usage

    This visual content talks about how you need to be careful when using email, create a hard-to-guess password, and refrain from opening emails from unknown sources or ones that contain advertisements.

    WATCH NOW
  • 4

    Trusted Information on the Internet

    This visual content emphasizes the importance of only using the Internet for information that is reliable. Official and approved websites, such as schools, universities, ministries, and well-known businesses, provide this reliable information.

    WATCH NOW
  • 5

    Trusted Information on the Internet/Part Two (copyrights)

    This visual content discusses the significance of citing information sources and identifying the authors of texts and works. respect for copyrights and intellectual property, and emphasizes the importance of following the law when using the Internet; to safeguard both ourselves and others.

    WATCH NOW
  • 6

    Your Health and the Computer

    This visual content discusses the significance of health care and warns that prolonged time spent in front of a computer and other technical devices may result in numerous health issues, such as weak vision, eye strain, back pain, and spine curvature.

    WATCH NOW
  • 7

    Your Health and the Computer/Part Two (Social Isolation)

    This visual content discusses how social isolation and psychological issues like anxiety, tension, and aggressive behavior can result from prolonged use of electronic devices. And the need to safeguard interpersonal relationships and properly divide time between studying, having fun with friends, and checking electronic devices.

    WATCH NOW
  • 8

    Computer Protection

    This visual content discusses the significance of using strong, difficult-to-guess passwords, not sharing passwords with others, and not using common words as passwords to safeguard the computer from hacking

    WATCH NOW
  • 9

    Computer Protection/ Part Two (Software Licenses)

    This visual content discusses the significance of using licensed software and the dangers of unauthorized software and information use. not to use or download any untrusted software without authorization; to shield electronic devices from harm and avoid accountability.

    WATCH NOW
  • 10

    Intellectual Property

    Before using any electronic game, image, or proprietary material, this visual content discusses the necessity of obtaining permission for it. Additionally, the necessity of respecting intellectual property and adhering to laws to safeguard our rights and those of others.

    WATCH NOW
  • 11

    Intellectual Property/Part Two (Digital Piracy)

    This visual content discusses the importance of respecting intellectual property owners’ copyrights to prevent piracy and theft of their innovations. Additionally, issue a warning against infringing copyrights and making unauthorized use of an intellectual property.

    WATCH NOW
  • 12

    Digital Publishing and Social Media

    This visual content discusses the significance of social media and its potential as a wonderful and useful innovation if properly utilized and safety guidelines adhered to. and the need to exercise caution when utilizing these methods, because it might make us vulnerable to fraud and other dangers.

    WATCH NOW
  • 13

    Digital Publishing and Social Media (Cyberbullying)

    This visual content discusses the dangers of cyberbullying and cautions against speaking, publishing images or clips of visual content, or making offensive comments on other people’s pages. And not to share any posts that are inappropriate or could harm other people’s mental health.

    WATCH NOW
  • 1

    Malware

    This visual content discusses the dangers posed by malware that is intended to harm devices or corrupt data and prevent devices from functioning properly. Such as: Adware, Spyware, Worms, and Trojans

    WATCH NOW
  • 2

    Network Protection from Malware

    By not revealing the username or password, not opening emails from unknown sources, creating strong passwords, periodically changing them, avoiding suspicious websites, and updating an anti-virus program, this visual content discusses ways to protect network-connected electronic devices from malicious programs and viruses.

    WATCH NOW
  • 3

    Social Media networks/ Part one

    This visual content discusses the benefits of social media, including the fact that it makes it possible to communicate with people all over the world, facilitates the exchange of ideas with other people, makes it easier to access news and information, and aids in e-marketing and business operations.

    WATCH NOW
  • 4

    Social Media networks Challenges

    This visual content discusses social media’s difficulties, as it has an impact on real relationships, wastes time, encourages the spread of rumors, and has the potential to put its users at risk for cyberbullying, data theft, and privacy violations

    WATCH NOW
  • 5

    Computer Protection Procedures

    This visual substance discusses methods for safeguarding the computer by installing antivirus programs on it, and regularly updating it so that you detect new malware, and avoid closing the firewall because network loopholes are the target of viruses.

    WATCH NOW
  • 6

    Communication Protocols in Networks

    This visual content deals with the communication protocol in networks, which is a digital system that includes rules for exchanging messages. to ensure that it arrives properly; Where the information is divided into packages in which the transmitter and receiver are identified so that a confirmation is sent to the sender when the packet is received by the receiver. When the packet is lost, it is retransmitted again.

    WATCH NOW
  • 7

    Data Privacy

    This visual content talks about the importance of preserving data privacy, and not giving personal data to anyone over the Internet. Because this may involve the risk of exposing the person to theft. Therefore, it is necessary to refrain from sharing personal information with others.

    WATCH NOW
  • 8

    Children’s Personal Information

    This visual content talks about the necessity of preserving children’s data and not disclosing it so that they are not exposed to abuse, and the necessity of reading the privacy statement that explains the type of information and the reason for its request, and where it will be used.

    WATCH NOW
  • 9

    Backup and database protection

    This visual content talks about protecting databases by making backup copies, and placing them in a secure, protected system that can be accessed when needed. Backups can be stored on an online storage account or on various external storage media.

    WATCH NOW
  • 10

    Backup and database protection with the password

    This video talks about protecting databases and backups with strong passwords, to provide protection for files and data. When setting the password for the database, it must be opened in Exclusive Mode.

    WATCH NOW
  • 11

    Online Meetings

    This video talks about online meetings, where a remote meeting can be held via the Internet, which allows many details to be shared through it, such as files, data, and presentations. There are modern applications that have been employed for this purpose, such as Zoom.

    WATCH NOW
  • 12

    Best practices for working online

    This visual content talks about best practices for working online, adherence to proper procedures to reach the best results, sharing information with caution, being mindful of potential hardships such as different languages and cultures, and avoiding sharing personal information with strangers.

    WATCH NOW
  • 1

    Evaluating Online information Sources

    This visual content talks about how to evaluate information sources on the Internet through 6 basic criteria for evaluating electronic resources, which are: responsible party, purpose, coverage, accuracy, validity, objectivity, and credibility.

    WATCH NOW
  • 2

    Tracking and privacy

    This visual content talks about the online data tracking policy, and that the Internet user leaves behind a huge amount of information since Google tracks every user’s movement on the Internet. It points out that Qatar is the first Gulf country to impose a law to protect personal data.

    WATCH NOW
  • 3

    Network Security Protocols

    This visual content talks about network security, and the importance of maintaining networks from the risks of external attacks, by using network security protocols that ensure the security and integrity of data during transmission over the network, and the firewall allows data to pass if it matches the permissible standards.

    WATCH NOW
  • 4

    Security and Usability

    The security mechanisms for data are discussed in this visual content. by being careful when dealing with spam, not opening emails from an unknown sender, creating strong passwords that are hard to guess, constantly changing them, and not sharing passwords with anyone.

    WATCH NOW
  • 5

    Surveillance Systems

    This visual content is about monitoring systems that are designed to monitor certain events or things, and provide monitoring data to other servers or devices on the Internet. One of the most common surveillance systems is: Theft alarm system. Examples of applications of control systems in our lives are: washing machines, air conditioners, and alarm systems.

    WATCH NOW
  • 6

    Sensors

    This visual content talks about sensors that are used to detect the presence of a signal such as motion, light, pressure, temperature change, etc. There are several types of sensors, including: temperature sensors, smoke sensors, touch sensors, motion sensors, light sensors, and pressure sensors

    WATCH NOW
  • 7

    Information Security in Commercial Institutions

    This visual content talks about information security in commercial organizations, and that companies use passwords to access files, provide suitable devices to protect the network and e-mail, digitally educate their employees, and work on periodic automatic updates of operating systems and applications, and install protection programs.

    WATCH NOW
  • 8

    Searching and verifying the quality of information

    This visual content talks about how to search and check the quality of information on the Internet, and that when collecting information about a specific idea or when visiting a website, the information quality standards must be checked, which include: Accuracy, relevance, timeliness, level of detail, and adequacy.

    WATCH NOW
  • 9

    Gathering data and verification

    This visual content talks about how to collect data and verify its credibility on the Internet, by having excellent research tools, and relying on reliable data sources.

    WATCH NOW
  • 10

    Data Encryption

    This visual content talks about a way to protect data by encrypting it and hiding it from unwanted people. So that only the person who has the decryption key can access it. There are two main types of encryptions. They are: Symmetric encryption and asymmetric encryption.

    WATCH NOW
  • 11

    System Design – System Security Issues

    This visual content talks about the mechanisms for identifying the elements and components of the system; Through analysis, design, implementation, testing, and then publication. During the design phase, system elements, components, and system interfaces are identified, such as system architecture, hardware components, operating systems, programming, integration with other systems, and system security issues.

    WATCH NOW
  • 12

    Cloud computing – information security

    This visual content talks about the importance of cloud computing and protecting information security. Cloud computing is characterized by the ability to expand according to the growth of the organization, the possibility of accessing systems from anywhere, its lower cost, and the lack of need for technical support and information technology specialists.

    WATCH NOW
  • 13

    Are My Files Safe on Cloud Storage?

    This visual content talks about cloud storage, and that it is a technology that provides a safer service for companies to store data instead of traditional computing methods, but care must be taken when moving to the cloud, taking into account data security and adhering to digital security policies, and qualifying employees when moving to cloud computing.

    WATCH NOW
  • 14

    Raspberry Pi Based projects – Digital Surveillance Systems

    This visual content talks about digital surveillance systems, and that a smart home is a great example of automation using a Raspberry Pi. In this type of house, it is possible to remotely monitor and control objects and devices that support this technology, and to build a surveillance system using high-resolution cameras.

    WATCH NOW
  • 15

    Researching and verifying Quality of information (Market Study)

    This visual content talks about studying the market, collecting and analyzing data and information about a specific market, and the consumers in it, with the aim of knowing consumers’ habits and current needs, and the products that may be popular with them. Therefore, the quality of the information should be ensured through standards of accuracy, relevance, and timing.

    WATCH NOW
  • 16

    Electronic payment methods

    This visual content talks about electronic payment methods and online shopping, where it is possible to shop online using tablets and smartphones, and payment can be made upon receiving the product, or through an online payment service such as a credit or debit card, and a bank transfer can be made or by using transfer companies.

    WATCH NOW
  • 17

    Secure online financial transactions

    This visual content talks about secure financial transactions over the Internet, and the need to follow safety steps to complete financial transactions, by updating programs on computers and electronic devices, searching for trust signs and digital certificates, reading the privacy agreement, keeping transaction records, and checking e-mail.

    WATCH NOW
  • 18

    Online fraud

    This visual content talks about online scams carried out by fake websites. They offer discounts, have poor design and weak language, limited or suspicious contact options, and URLs on fake sites containing strange words, letters, or unusual domains

    WATCH NOW
  • 19

    Trust Signs and Secure Connection

    This visual content is about trust signs and safe connections on the Internet. And that security banners, transaction protection symbols, and trust signs must appear on web pages that request sensitive information. A secure connection is a connection that is encrypted by one or more protocols to ensure the security of data flow between two or more parties on the network.

    WATCH NOW
  • 20

    Digital security

    This visual content talks about digital security responsible for protecting computers, networks, programs, and data from unauthorized access, and is concerned with protecting enterprise data, everything related to saving and using that data, protecting business continuity in the enterprise, and allowing safe operation of applications built on IT systems in the enterprise.

    WATCH NOW
  • 21

    The importance of information security and CIA Triad

    This visual content talks about the importance of information security, which increases with the importance of data and information available on the network, and the need for its availability to users without interruption. The CIA Triad consists of three elements: confidentiality, integrity, and availability.

    WATCH NOW
  • 22

    Cybercrimes

    This visual content talks about cybercrime and the use of computers to achieve illegal ends. Such as electronic scams, illegal distribution of copyrighted material, identity theft, invasion of privacy, online harassment, or cyber intrusion.

    WATCH NOW
  • 23

    Personal security precautions

    This visual content talks about personal security precautions, through regular software updates, the use of antivirus and firewall software, digital communication with caution, the use of strong passwords, in addition to two or multiple verifications, periodic data backup, avoiding using public Wi-Fi networks

    WATCH NOW
  • 24

    Detection and removal of malware

    This visual content talks about the detection and removal of malicious software, and when you suspect the presence of any malicious software, you should stop online shopping and banking services on the computer, update your antivirus software, scan your computer for viruses and spyware, check your browser, and seek support.

    WATCH NOW
  • 25

    Ransomware attack

    This visual content talks about ransomware attacks and how to protect electronic devices from it by checking the router, protecting its password, using a security option for the wireless network, checking for updates of the operating system and applications, checking the firewall, and backing up important data.

    WATCH NOW
  • 26

    Firewall

    This visual content talks about the firewall, which is software or hardware used for network security, that controls incoming and outgoing traffic by analyzing the data packets and determining whether they should be allowed through or not. A firewall blocks suspicious connections, but it does not protect against email fraud, ads, and spam.

    WATCH NOW
  • 27

    File and folder permissions

    This visual content discusses permissions for files and folders. It explains that, depending on what we want others to be able to control, we use a variety of permissions to safeguard our files and folders. One of the most significant categories of permissions: is complete control, modification, reading, and execution, as well as viewing, reading, and writing folder contents.

    WATCH NOW
  • 28

    Digital footprint

    This visual content talks about our digital footprint, which is how we browse, communicate, and do other things online. They are two types: the active digital footprint we leave of our own free will, like our publications on communication sites and subscriptions to electronic lists, and the unknown digital footprint we leave unintentionally; Such as applications and sites that determine our geographical location.

    WATCH NOW
  • 29

    Effects of digital tracking

    This visual content talks about digital tracking, and that every action or browsing we do on the Internet leaves a trace called a digital footprint, which others may be able to see, such as browsing history, the sites we visit, and websites saving some information in storage memory and cookies.

    WATCH NOW
  • 30

    Safe browsing of social networks

    This visual content discusses being cautious when browsing social networks, not sharing any private information, adjusting privacy settings, verifying the identity of people with whom we communicate so that they cannot see the content we share, using strong passwords, avoiding bullies, and being cautious about a number of excessive friendships.

    WATCH NOW
  • 31

    Cybersecurity

    This visual content discusses the fact that Cyber Security is a system for protecting computer systems directly connected to the Internet from any electronic attacks that could result in identity theft, attempts at blackmail, and the loss of important data. It also protects data and programs from these attacks. As a result, Cyber Security regulations that guard against cybercrime must be adhered to and data must be safeguarded

    WATCH NOW