الأمن السيبراني Cyber Security

Published at 2021-06-05 9:55 PM
1 SAR Negotiable
الأمن السيبراني Cyber Security 1. Goals (الأهداف): At the completion of this program, trainee will be able to توضيح أهمية الأمن السيبراني تطبيق الأمن السيبراني التوعية بأساسيات الأمن السيبراني Discuss the evolution of security based on historical events. List various types of malicious software. Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices. Identify key cybersecurity tools which include the following: firewall, anti-virus, and cryptography, penetration testing and digital forensics. 2. Contents (المحتويات): أهداف الأمن السيبراني أنواع الاختراقات البرامج الخبيثة وأنواعها الحماية بعمق التشفير قوانين الأمن السيبراني أهمية الأمن السيبراني سياسات الأمن السيبراني An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more. In this volume, we take a detailed look at network security. Become a cyber security specialist. The very latest up-to-date information and methods. Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning. You will be able to configure firewalls on all platforms including Windows, MacOS, and Linux for all types of attack scenarios. Learn to configure and architect a small network for maximum physical and wireless security. Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark, Tcpdump, and Syslog. Understand how we are tracked online by corporations, nation-states your ISP and others. We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services. Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens. What are the best password managers to use and why. How passwords are cracked, and how to mitigate the password attacks. A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate. An advanced practical skill-set in securing laptops, desktops and mobile devices. Become a cyber security specialist The very latest up-to-date information and methods. You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks. We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI. How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies. 3. Target audience (الفئة المستهدفة): All IT Staff 4. Prequalification (متطلبات الالتحاق): None. Duration: 5 sessions 20 Hours 5 محاضرات 20 ساعة المدة: Language: English / Arabic إنجليزي / عربي اللغة: Tel/Whats 00966509475020