Cyber Security
Posted on 18th February 2025Duration
30 ساعة لمدة 5 ايام* Details of the accrediting body and accreditation number .
Categories
Information Technology, Business, IT & SoftwareSub Categories
Programming Languages, Databases, Development Tools, Artificial Intelligence, Project Management, Business Law, Network & Security, Operating Systems, IT Networking, AI & Machine LearningDescription of the training program (training course)
This course aims to develop skills and concepts in cybersecurity, and to improve technical capabilities, which helps to carry out tasks with high efficiency and cyber protection in many fields, and to train participants to understand the rules, foundations and elements of cybersecurity and the various threats that threaten users of information systems working in various industrial and economic institutions, and institutions of a sensitive nature that affect national security, and to clarify the aspects of legal protection of cybersecurity and its axes, and to understand the nature of ransomware attacks and their analysis and how to commit them and their most famous types. In addition to clarifying international efforts to protect countries and vital institutions from cyber attacks
The general objective of the training program
This course aims to develop skills and concepts in cybersecurity, and to improve technical capabilities, which helps to carry out tasks with high efficiency and cyber protection in many fields.
The detailed objectives of the training program
To learn about the basic principles of information security and cybercrimes.
To learn about the weaknesses in networks and electronic services.
To identify the risks associated with the transmission, processing and storage of information.
To apply network defense techniques and services provided.
To apply skills to repel cyber attacks via the Internet.
To identify network security testing techniques and attack repelling solutions.
To be able to deal with ethical and legal issues in the security of the organization's information.
To be able to evaluate and analyze local and international breaches that may occur to information systems.
To be able to develop solutions to protect computer networks and information from threats and breaches on both the internal and external levels.
To identify information security project management skills.
To identify the nature and methods of digital forensic investigations