Cyber Shield
-
Uncategorized
-
Cyber-Security for Managers and Executives1m 2s
-
Introduction to Cyber-Security7m 4s
-
The 3 Principles of Cyber-Security and Accountability8m 23s
-
Misconceptions About and Benefits of Cyber-Security14m 30s
-
What Can Go To Assets? And Categories of Security Problems14m 27s
-
Step 1- Cyber-Security Stakeholders & Step 2- Business Impact Analysis13m 52s
-
Step 3- Cyber-Security Objectives and Requirements & Step 4- Selection and Integration of Cyber-Security and Risk Management Framework14m 53s
-
Step 5- Cyber-Security Project Planning & Step 6- Planning for Cyber-Security Contingencies15m 53s
-
Step 7- Implementing Cyber-Security Controls & Step 8- Creating a Culture of Cyber-Security16m 29s
-
Step 9- Continuous Cyber-Security Maintenance & Step 10- Continuous Cyber-Security Improvements and Maturity13m 59s
-
Final Thoughts4m 53s
-
Assesment10 xp
-
Step 5- Cyber-Security Project Planning & Step 6- Planning for Cyber-Security Contingencies
Instructors
Dr. Kassem Saleh
- Dr. Saleh has a PhD in Computer Science from the University of Ottawa, Canada. - He was a Software Design Engineer at Northern Telecom and a Computer Systems Specialist at Bell Canada. - A Professor in Information Sciences at Kuwait University - Dr. Saleh has published about 130 journal and conference papers and one textbook on Software Engineering and has presented tutorials, lectures and invited talks at conferences and universities - Dr. Saleh holds professional certifications in software engineering (IEEE-PSEM), information security (ISC2-CISSP), project (PMI-PMP) and risk management (PMI-RMP), quality engineering (ASQ-CQE, ASQ-CSQE) and business analysis (PMI-PBA)
Additional Information
Attendance Certificate
Language: English (US)
duration: 2 hours 5 minutes
Cyber-security is the use of protecting computer networks, applications, devices, and data to prevent them from destruction or cyber-attacks.
- Gain knowledge about securing both clean and corrupted systems, protect personal data, and secure computer networks
- Understand key terms and concepts in cyber law, intellectual property and cybercrimes, trademarks and domain theft.
- Understand principles of web security.
- Understand principles of web security.
- The 3 Principles of Cyber-Security and Accountability
- Misconceptions About and Benefits of Cyber-Security
- What Can Go To Assets? And Categories of Security Problems
- What Can Go To Assets? And Categories of Security Problems
- Step 1- Cyber-Security Stakeholders & Step 2- Business Impact Analysis
- Step 3- Cyber-Security Objectives and Requirements & Step 4- Selection and Integration of Cyber-Security and Risk Management Framework
- Step 5- Cyber-Security Project Planning & Step 6- Planning for Cyber-Security Contingencies
- Step 7- Implementing Cyber-Security Controls & Step 8- Creating a Culture of Cyber-Security
- Step 9- Continuous Cyber-Security Maintenance & Step 10- Continuous Cyber-Security Improvements and Maturity
- Final Thoughts
An online course that you can attend at any time that suits you with high quality. -
- To complete the rest of the course, kindly click on Join the course at the top of the screen or subscribe.
- After completing the course and attending it completely, a window will appear, write your name in both Arabic and English, and you will get the certificate directly.
- Certifications are accredited. Issued by the signature of the trainer and the management of the center.
Related Courses
Views | |
---|---|
396 | Total Views |
151 | Members Views |
443 | Public Views |
Actions | |
---|---|
0 | Likes |
0 | Dislikes |
0 | Comments |
Share by mail
Please login to share this video by email.