INSTRUCTORS
  • Dr. Kassem Saleh
    Dr. Kassem Saleh

    - Dr. Saleh has a PhD in Computer Science from the University of Ottawa, Canada.
    - He was a Software Design Engineer at Northern Telecom and a Computer Systems Specialist at Bell Canada.
    - A Professor in Information Sciences at Kuwait University
    - Dr. Saleh has published about 130 journal and conference papers and one textbook on Software Engineering and has presented tutorials, lectures and invited talks at conferences and universities
    - Dr. Saleh holds professional certifications in software engineering (IEEE-PSEM), information security (ISC2-CISSP), project (PMI-PMP) and risk management (PMI-RMP), quality engineering (ASQ-CQE, ASQ-CSQE) and business analysis (PMI-PBA)

related to this course
Certification icon Attendance certificate
Language English (US)
Time 2 hours 5 minutes


Overview:

Cyber-security is the use of protecting computer networks, applications, devices, and data to prevent them from destruction or cyber-attacks.

Objectives:

-         Gain knowledge about securing both clean and corrupted systems, protect personal data, and secure computer networks

-         Understand key terms and concepts in cyber law, intellectual property and cybercrimes, trademarks and domain theft.

-         Understand principles of web security.

-         Understand principles of web security.

Audience:

-         Security analyst

-         Security engineer

-         Cryptanalyst

-         Security consultant

-         Security software developer

-         Security administrator

Course mechanism:

 An online course that you can attend at any time that suits you with high quality. -

- To complete the rest of the course, kindly click on Join the course at the top of the screen or subscribe.

- After completing the course and attending it completely, a window will appear, write your name in both Arabic and English, and you will get the certificate directly.

- Certifications are accredited. Issued by the signature of the trainer and the management of the center.

Why remote training?

With the rapid development, remote training and self-learning have become essential to ensure quick access to information and attend any online course at anytime and anywhere that suits you, and you can benefit from the best international experts.

Related Courses

  • The 3 keys to Business Success
    0 %
  • Leadership
    0 %
  • Cyber-security for Managers and Executives
    0 %
  • Excellence and Achievement
    0 %
  • Basics of marketing
    0 %
    • Introduction to Cyber-Security
      7 minutes
    • The 3 Principles of Cyber-Security and Accountability
      8 minutes
    • Misconceptions About and Benefits of Cyber-Security
      15 minutes
    • What Can Go To Assets? And Categories of Security Problems
      14 minutes
  • Road-Map to Cyber-Security
    • Step 1- Cyber-Security Stakeholders & Step 2-  Business Impact Analysis
      14 minutes
    • Step 3- Cyber-Security Objectives and Requirements & Step 4- Selection and Integration of Cyber-Security and Risk Management Framework
      15 minutes
    • Step 5- Cyber-Security Project Planning & Step 6- Planning for Cyber-Security Contingencies
      16 minutes
    • Step 7- Implementing Cyber-Security Controls & Step 8- Creating a Culture of Cyber-Security
      16 minutes
    • Step 9- Continuous Cyber-Security Maintenance & Step 10- Continuous Cyber-Security Improvements and Maturity
      14 minutes
    • Final Thoughts
      5 minutes