Principles and basics of cybersecurity

‏250 ‏600 Discount 58%

على الشركات والمؤسسات أن تحرص على حماية المعلومات الشخصية لعملائها والمعلومات المتعلقة بالعمل والتي تهدد نجاح الأعمال

(1)
38 Video
Course Trainer

The Academy

Overview

Companies and institutions must be careful to protect the personal information of their customers and work-related information that threatens the success of the business. This training program aims to develop the skills of participants in security and protecting information from cybercrimes in accordance with international training standards with an Arab vision.

Detailed objectives of the training program

  1. Definition information
  2. Information protection
  3. Information security pillars
  4. Definition of cybercrime
  5. Cybercrime risks
  6. Characteristics of cybercrime
  7. Targets of cybercrime
  8. Combat cybercrime
  9. Methods of maintaining information security
Training program topics

(1) Definition of information

  • Introducing the concept of information
  • How to classify information

(2) Definition of information security and protection

  • Understanding information security
  • Knowing the types of information
  • Images of data and information transfer
  • How to secure information
  • Motives for stealing information

(3) Pillars of information security

  • Protection of operating systems
  • Program and application protection systems
  • Database protection systems

(4) Electronic crimes

  • Definition of cybercrime
  • Classification of cyber crimes
  • The risks of cybercrime on the individual and society
  • Characteristics of cybercrime
  • Targets of cybercrime

(5) Combating cybercrime

  • Knowing how to combat cybercrime
  • Methods of maintaining information security
  • How do we ensure data integrity
  • How do we react if a hack occurs

Exercises and evaluation

  • Exercises on types of information
  • A panel discussion on electronic crimes and their goals
  • Brainstorm information security threats
  • Active discussion of training videos
  • A panel discussion on how to ensure the integrity of information
  • An exercise on how to act if a hack occurs
  • Prepare a model for how to protect the information security of the individual and the organization

Advantages of the information security and protection course with the upward arrow:

      • Focus on practical training.
      • Scientifically and practically qualified trainers with long experience.
      • Lecture equipment with the latest scientific educational methods.
      • Providing trainees with a wonderful training bag.
Course Content
Cyber ​​security basics
خطة دورة أساسيات الأمن السيبراني Watch More
أهداف الدورة التدريبية Watch More
الخطة دورة أساسيات الأمن السيبراني Watch More
Network Fundamental
ادارك مفهوم الشبكات (Understanding Computer Networks) و موديل الشبكات OSI / TCP (OSI and TCP/IP Network Models) Watch More
التميز بين أنواع الشبكات المختلفة (Different types of Network) و مكونات الشبكات (Network Components) Watch More
التميز بين اعمال بروتوكلات الشبكة TCP/IP (Networking protocols in TCP/IP Protocol Stack) و التعامل مع عناويين الشبكة IP (IP Addressing Concepts) Watch More
Find IP Addresses and Spoof Private IP Address Manually
Find MAC Address & how to Spoof it
Introduction to Networks and CCNA Watch More
Network components and how to connect them
DMZ , VLAN, Subnetting and NAT Watch More
Remote Access, Telephony , NAC and Virtualization Watch More
, Cloud Computing , iOT and Layered security / Defense in depth Watch More
مكونات الشبكة وطريقة ربطها
Network Security Threats, Vulnerabilities, and Attacks
المصطلحات الأساسية (Essential Terminologies) و مخاوف تتعلق بأمن الشبكة (Network Security Concerns) Watch More
التهديدات والهجمات المتعلقة بأمن الشبكات (Network Security Threats & Attacks) و نقاط الضعف في أمن الشبكات (Network Security Vulnerabilities) Watch More
Create a Virus using JPS Virus Maker
Network Security Controls, Devices and Protocols
عناصر أمن الشبكات(Elements of Network Security ) و ضوابط أمن الشبكة (Network Security Controls) Watch More
ضوابط أمن الشبكات والأجهزة والبروتوكولات (Network Security Controls, Devices and Protocols) Watch More
تحديد هوية المستخدم، والمصادقة، والترخيص والمحاسبة (User Identification, Authentication, Authorization and Accounting) و أنواع أنظمة التصريح للتعامل مع الانظمة Types of Authorization Systems)) Watch More
مبادئ أنظمة التصريح (Authorization Principles) و التشفير (Cryptography) Watch More
سياسة أمن الشبكات (Network Security Policy) و أجهزة أمن الشبكات والتقنيات الأخرى (Network Security Devices and other Technologies) Watch More
Create HTTP Trojan using HTTP RAT
Perform DoS Attack using LOIC
Data Encryption & Decryption using Advanced Encryption Package
الفرق بين أمن الشبكات، المعلومات، السيبراني Watch More
Introduction to Intrusion Detection System
اقتحامات الشبكة ودور IDS في الدفاع عن الشبكة ( Network Intrusions and Role of IDS in Network Defense) و وظائف IDS وما هو ليس كذلك؟ (IDS Functions and What IDS is NOT?) Watch More
أنشطة IDS وكيفية عمل( IDS IDS Activities and How IDS Works) و مكونات IDS وطرق الكشف عن(IDS Components and IDS Detection Methods ) Watch More
IPS ووظيفتها ووطريقة عملها ( IPS IPS & its Function and IPS Placement ) و الحاجة إلى IPS ( Need of IPS) Watch More
مقارنة في الية العمل بين IDS vs IPS و أنواع IPS Types of IPS)) و حلول )IDS/IPS IDS/IPS Solutions) Watch More
How to work with PRTG Protocol Analyzer
Detecting Intrusions using SNORT
Introduction to Firewalls
جدران الحماية ومجالاتة Firewalls and Concerns) ) و ما الذي تفعله جدران الحماية؟ What Firewalls Does?) ) Watch More
كيف يعمل جدار الحماية؟ ( How Does a Firewall Work?) و قواعد جدار الحمايةFirewall Rules) ) Watch More
أنواع جدران الحمايةTypes of Firewalls) ) و قيود جدار الحماية (Firewall Limitations) Watch More
التهديدات ونقاط الضعف في جدار الحمايةFirewall Threats & Vulnerabilities )) Watch More
Turn On or Off Windows Firewall
Allow an App through Windows Firewall
Evaluation
أداة لقياس رضا المستفيدين
Attachments

أهداف الدورة التدريبية.pdf

pdf file 309.83 kB
download

خطة دورة أساسيات الأمن السيبراني.pdf

pdf file 397.58 kB
download

Similar training courses

Combating money laundering, terrorist financing

Data entry and word processing

Microsoft Office and google Apps

Microsoft Office and google Apps