Training Details

  • Location Amman - Jordan
  • Type Online
  • Duration Available
  • Training Hours 20
  • Trainer Mohamed Al Shami
  • Trainer Bio Mohamed is a Regional Director and Principal Advisor with 20 years of international experience in the ICT market. He works for Ericsson, the world's leading communications company, as part of its global business unit. He is a member of ISACA Amman Chapter and an active member of the CERT communities, resellers and many of the Computer Incident Security Response Team (CSIRT) teams.
Cyber Security

What You’ll Learn

  • Define and use key terms and concepts in cybersecurity
  • The most common terms for cybersecurity
  • Next-generation antivirus and hacking software
  • Identify and distinguish threat actors and their drivers
  • Understand the preventive and detective controls developed by cybersecurity tools
  • Learn about the ITU's global cybersecurity program and its mission
  • Browser and email security
  • How to stay safe on social media and could
  • Awareness for children and parents about cybersecurity
  • What are the components of the program and how to use it to achieve the highest levels of protection
  • The most important penetration techniques
  • Areas of work in the Syrian security
  • Roles of work in cyber security
  • The most important certificates that help you in the field of cyber security

Description

After the great spread of the Internet, smart devices and portable devices, it has become necessary in our time to pay attention to cyber security and how to protect ourselves in the digital space starting from home to work and at the state level as a whole, and cybersecurity is one of the most prevalent topics in our days and learning has become an imperative. As our daily lives become more dependent on Internet-based tools and services, and as these platforms accumulate more than our most sensitive data, the demand is increasing for experts in cybersecurity. The world is now connected to the Internet and has made everyone more vulnerable to cyber attacks. Whether you like this relatively new cyber security world to work with as a professional, or would you like to protect yourself while online and on social media, this course is for you. In this discipline of 5 separate courses, he will introduce you to the most important terms in cybersecurity, what are the most important techniques used in cybersecurity, and how to maintain your systems from the risk of breaches. In the first course you will get an overview of the cyber security scene as well as international perspectives in this field. We will cover the legal environment that affects cybersecurity. This course is an introduction to the exciting field of cybersecurity.

 

Courses Included

  • Career path in Cyber Security
  • Protect systems from penetrations
  • Cyber Security ​​attack techniques
  • Cyber Security Basics
  • Introduction to Cyber Security

 

Enroll now Cyber Security

RSVP