1. The 3 principles of cybersecurity are confidentiality, integrity, and availability.
2. Misconceptions about cybersecurity can indeed hinder organizations from recognizing the benefits it offers.
3. Business Impact Analysis is an essential step in cybersecurity planning, helping identify critical assets and potential risks.
4. Creating a culture of cybersecurity involves the entire organization, not just the IT department. It requires a collective effort to promote security awareness and best practices.
5. Continuous cybersecurity improvements and maturity are achieved through regular assessments and adjustments to security measures.
Instructors

Dr. Kassem Saleh

- Dr. Saleh has a PhD in Computer Science from the University of Ottawa, Canada. - He was a Software Design Engineer at Northern Telecom and a Computer Systems Specialist at Bell Canada. - A Professor in Information Sciences at Kuwait University - Dr. Saleh has published about 130 journal and conference papers and one textbook on Software Engineering and has presented tutorials, lectures and invited talks at conferences and universities - Dr. Saleh holds professional certifications in software engineering (IEEE-PSEM), information security (ISC2-CISSP), project (PMI-PMP) and risk management (PMI-RMP), quality engineering (ASQ-CQE, ASQ-CSQE) and business analysis (PMI-PBA)

Additional Information

Attendance Certificate

 Language: English (US)

 duration: 2 hours 5 minutes

Introduction

Cyber-security is the use of protecting computer networks, applications, devices, and data to prevent them from destruction or cyber-attacks.


-         Gain knowledge about securing both clean and corrupted systems, protect personal data, and secure computer networks

-         Understand key terms and concepts in cyber law, intellectual property and cybercrimes, trademarks and domain theft.

-         Understand principles of web security.

-         Understand principles of web security.


- The 3 Principles of Cyber-Security and Accountability

- Misconceptions About and Benefits of Cyber-Security

- What Can Go To Assets? And Categories of Security Problems

- What Can Go To Assets? And Categories of Security Problems

- Step 1- Cyber-Security Stakeholders & Step 2-  Business Impact Analysis

- Step 3- Cyber-Security Objectives and Requirements & Step 4- Selection and Integration of Cyber-Security and Risk Management Framework

- Step 5- Cyber-Security Project Planning & Step 6- Planning for Cyber-Security Contingencies

- Step 7- Implementing Cyber-Security Controls & Step 8- Creating a Culture of Cyber-Security

- Step 9- Continuous Cyber-Security Maintenance & Step 10- Continuous Cyber-Security Improvements and Maturity

- Final Thoughts

 An online course that you can attend at any time that suits you with high quality. -

- To complete the rest of the course, kindly click on Join the course at the top of the screen or subscribe.

- After completing the course and attending it completely, a window will appear, write your name in both Arabic and English, and you will get the certificate directly.

- Certifications are accredited. Issued by the signature of the trainer and the management of the center.


Views
1 Total Views
1 Members Views
0 Public Views
Actions
0 Likes
0 Dislikes
0 Comments
Share on Social Networks


Share Link
Share by mail

Please login to share this quiz by email.

whatsapp