• Category
    تطويري
  • Presence
    345 SAR
  • online
    0 SAR

Cybersecurity and information security

This program describes the threats facing cyberspace and ways to protect against them. You will be able to understand the basic principles of encryption. You will also be able to understand how users are exploited to obtain sensitive data or gain unauthor

Details

Description of the training program (training course)
This program describes the threats facing cyberspace and ways to protect against them. You will be able to understand the basic principles of encryption. You will also be able to understand how users are exploited to obtain sensitive data or gain unauthorized access and other related topics.

  The general objective of the training program
This program aims to train participants to understand the rules, foundations and elements of cybersecurity and the various threats that threaten users of information systems who work in various industrial and economic institutions, and institutions of a sensitive nature, and to clarify the legal protection aspects of cybersecurity and its axes, and to understand what it is. Ethical penetration testing. In addition to clarifying international efforts to protect countries and vital institutions from cyber attacks, as well as training participants on cyber security rules, and how to deal with information systems in critical institutions related to national security and industrial and vital institutions.

Detailed objectives of the training program
1. Learn about ethical penetration testing and what is the difference between penetration testing and security vulnerability assessment
2. Knowing the purpose of conducting a penetration test, its types, and testing methods
3. Full knowledge of the steps to download and install the Virtual Machine and the Kali Linux system
4. Learn about the process of reconnaissance and collecting information and what are the methods of reconnaissance
5. Knowing the security vulnerabilities and what are the most prominent of these vulnerabilities
6. Learn about the history, policy, dimensions and concept of cybersecurity
7. Knowledge of the features of cybersecurity, including security, confidentiality, and other solutions
8. Identify cyber risks from space crimes, the types of these crimes, and what cyber attacks are
9. Knowing what are the motives behind countries’ interest in cybersecurity
10. Full knowledge of countries’ efforts in the field of cybersecurity
11. Know what the requirements for cybersecurity are
12. Learn about the concept of cyber deterrence and the requirements of deterrence
13. Knowledge of cybersecurity strategies
14. Identify the role of legislation and laws in cybercrimes
15. Know the impact of legislation and laws in reducing cybercrimes
16. Know the concept of electronic piracy, its causes and manifestations
17. Learn about the concept of operating systems and network security and how to conduct information security
18. Identify electronic blackmail, its punishment, and its effects

Course information

  • Course start date : 2024-05-20
  • Duration : 15
  • Hours: 45
  • Number of seats: 1000
  • studying days : from الأحد to الخميس
  • Study time : 18:00 - 20:00
  • Training period: مسائي
  • training type: اونلاين

Course trainers