2500 SAR

Course information

Course language : Arabic
Start Date : 2024-Apr-16
Expiry Date : 2024-May-18
Course Level : Secondary certificate
Lectures : 25 Hour
Course Timing : 12:00:00am

Trainers

Basic skills in cybersecurity

Description of the training program (training course)

The training program (Cybersecurity) was designed in accordance with the world’s trend towards increasing electronic security for users and countries and preserving data. This program includes developing the trainee in securing the Internet from hacking in addition to securing all electronic devices used with protection systems from malicious programs and their spread. The program also creates the methods followed. In securing users and their devices, in addition to using secure protocols in communication processes, the program also reviews the most important methods of securing and encrypting payments in order to protect them from any dangers resulting from pirated electronic attacks.
The general objective of the training program

Teach cybersecurity best practices, including creating strong passwords, using antivirus software, browsing the Internet safely, and protecting personal data.
Build cyber incident recovery skills, including creating an incident response plan, data recovery, and incident reporting.
Detailed objectives of the training program:

Full knowledge of:-

To know the best standards and applications used in the field of cybersecurity.
To know all the security controls that are used to protect information and maintain computers.
To know all the ways to secure payments and protect various digital banking services.
To become familiar with the information security elements that operate on confidential systems and protocols
To understand PCI DSS standards and requirements for securing electronic payments.


Course outline:
First day:

Introduction to cybersecurity:
Definition of cybersecurity and its importance.
Common types of cyber threats.
The impact of cyber attacks on individuals and organizations.
Basic cybersecurity principles:
Password creation best practices.
Use antivirus software and update it regularly.
Browse the Internet safely and avoid suspicious websites.
Protect personal data and sensitive information.
the second day:

Online safety:
Risks of phishing and social engineering.
How to identify malicious emails and spam.
Use a VPN when connecting to public Wi-Fi networks.
Protect your privacy online.
the third day:

Hardware security:
Protect computers and smartphones from malware.
Update operating systems and software regularly.
Use backup software to protect data.
Configure a strong firewall.
the fourth day:

Network security:
Common network types and their risks.
Protect home and corporate networks.
Use encryption techniques to protect data.
Learn about spyware and ransomware.
The fifth day:

Recovery from cyber incidents:
Create a cyber incident response plan.
Recover data if it is lost or stolen.
Reporting cyber incidents.
Learn from past mistakes to prevent repeat accidents.


Advantages of applying the creative thinking and innovation techniques program


Avoid sensitive information such as passwords, financial data, and medical information from theft or unauthorized access.
Reduce the risk of financial fraud, such as theft of credit card or banking information.
Prevent viruses, spyware, ransomware, and other malware from harming devices and data.
Avoid data loss, corruption or encryption.
Prevent viruses, spyware, ransomware, and other malware from harming devices and data.
Avoid data loss, corruption or encryption.
Prevent viruses, spyware, ransomware, and other malware from harming devices and data.
Avoid data loss, corruption or encryption.


Target groups

Holds a bachelor’s degree in one of the appropriate information technology specializations.
Information studies, information technology, computer science, computer engineering, information systems, software engineering, network engineering

Personal skills:

Critical thinking and problem solving skills.
Communication and teamwork skills.
Continuous learning and creativity skills.
Professional ethics skills and self-confidence.
Technical skills:

Penetration testing and threat analysis.
Incident response and digital forensics.
Network security and application security.
Data encryption.

 

 

Course outline:
First day:

Introduction to cybersecurity:
Definition of cybersecurity and its importance.
Common types of cyber threats.
The impact of cyber attacks on individuals and organizations.
Basic cybersecurity principles:
Password creation best practices.
Use antivirus software and update it regularly.
Browse the Internet safely and avoid suspicious websites.
Protect personal data and sensitive information.
the second day:

Online safety:
Risks of phishing and social engineering.
How to identify malicious emails and spam.
Use a VPN when connecting to public Wi-Fi networks.
Protect your privacy online.
the third day:

Hardware security:
Protect computers and smartphones from malware.
Update operating systems and software regularly.
Use backup software to protect data.
Configure a strong firewall.
the fourth day:

Network security:
Common network types and their risks.
Protect home and corporate networks.
Use encryption techniques to protect data.
Learn about spyware and ransomware.
The fifth day:

Recovery from cyber incidents:
Create a cyber incident response plan.
Recover data if it is lost or stolen.
Reporting cyber incidents.
Learn from past mistakes to prevent repeat accidents.


Advantages of applying the creative thinking and innovation techniques program


Avoid sensitive information such as passwords, financial data, and medical information from theft or unauthorized access.
Reduce the risk of financial fraud, such as theft of credit card or banking information.
Prevent viruses, spyware, ransomware, and other malware from harming devices and data.
Avoid data loss, corruption or encryption.
Prevent viruses, spyware, ransomware, and other malware from harming devices and data.
Avoid data loss, corruption or encryption.
Prevent viruses, spyware, ransomware, and other malware from harming devices and data.
Avoid data loss, corruption or encryption.

 

user

trainer

trainer

trainer

Contact Information

Other Courses

Newsletter

Subscribe with us to receive all new courses and services

Whatsapp