• Search...

categories: Technology & Innovation

Technology
CyberSecurity,VPN
SDG 9: Industry, Innovation and Infrastructure

Cybersecurity Management

Duration: 4 h 17 m / 75 lessons

Level: General

Course Language: Arabic

By the end of this course, you will be able to

  • By the end of this course, you will be able to: Create security objects.

  • Implement security policies and services and perform network address translation.

  • Implement site-to-site IPsec VPNs as well as Identify and assess different types of risks.

Course details

  • 4 h 17 m/75 lessons
  • Last updated: 27/10/2022
  • Course completion certificate

Course Content

Free lessons

1.

Introduction

1 Minutes
2.

Core Concepts 1

5 Minutes
3.

Core Concepts 2

5 Minutes
4.

Core Concepts 3

3 Minutes
5.

Core Concepts 4

4 Minutes
6.

Exercise 1: Know the Fundamentals 1

3 Minutes
7.

Exercise 1: Know the Fundamentals 2

2 Minutes
8.

Exercise 1: Know the Fundamentals 3

2 Minutes
1.

Introduction

1 Minutes
2.

Core Concepts 1

5 Minutes
3.

Core Concepts 2

5 Minutes
4.

Core Concepts 3

3 Minutes
5.

Core Concepts 4

4 Minutes
6.

Exercise 1: Know the Fundamentals 1

3 Minutes
7.

Exercise 1: Know the Fundamentals 2

2 Minutes
8.

Exercise 1: Know the Fundamentals 3

2 Minutes
9.

Basic Concepts of Cyber ​​Security: Attack Vectors

10.

Attack Vectors: Types of Hackers

3 Minutes
11.

Attack Vectors: Types of Attackers

3 Minutes
12.

Attack Vectors: Where Does the Attack Come From?

5 Minutes
13.

Attack Vectors: Business Impact Analysis

3 Minutes
14.

Attack Vectors: Know Your field

3 Minutes
15.

Exercise 2: Find out where to start 1

3 Minutes
16.

Exercise 2: Find out where to start 2

3 Minutes
17.

Exercise 2: Find out where to start 3

1 Minutes
18.

Cyber ​​Security Core Concepts: Types of Controls

1 Minutes
19.

Types of Controls (Asset vs. Significant Assets)

2 Minutes
20.

Controls Classification

2 Minutes
21.

Controls Types: Controls Slides

3 Minutes
22.

Examples of Controls

2 Minutes
23.

Types of Controls: Evaluating Controls Against Value

3 Minutes
24.

Exercise 3: Value Analysis

25.

Control Evaluation

4 Minutes
26.

Cyber ​​Security Core Concepts: Identity and Access Management

1 Minutes
27.

Identity and Access Management (Authentication, Authorization, and Accounting)

5 Minutes
28.

Identity and Access Management (Federation)

2 Minutes
29.

Identity and Access Management (Identity Profiling)

3 Minutes
30.

Identity and Access Management (Access Management Process)

3 Minutes
31.

Identity and Access Management (Identity and Access Manager and Privileged Acess Manager)

4 Minutes
32.

Exercise 4: Use Case Disadvantages of an Identity and Access Manager and Privileged Access Manager

3 Minutes
33.

Cyber ​​Security Core Concepts: Network Security

34.

Network Security

4 Minutes
35.

Network Security: Content and Web Filtering

5 Minutes
36.

Network Security: Intrusion Detection System (IDS) & Intrusion Prevention Systems (IPS) 1

1 Minutes
37.

Network Security: Intrusion Detection System (IDS) & Intrusion Prevention Systems (IPS) 2

3 Minutes
38.

Network Security: Virtual Private Network (VPN)

3 Minutes
39.

Exercise 5: Repairing Defects in Network

4 Minutes
40.

Cyber ​​Security Core Concepts: Security Operations

3 Minutes
41.

Security Operations: Data Leakage

2 Minutes
42.

Security Operations: Endpoint Security

3 Minutes
43.

Security Operations: Vulnerability Management Lifecycle

6 Minutes
44.

Security Operations: Defense in Depth

2 Minutes
45.

Exercise 6: "Defense in Depth" in Security Operations

4 Minutes
46.

Cyber ​​Security Core Concepts: Software Development Security

6 Minutes
47.

Software Development Security: Open Web Application Security Project (OWASP)

4 Minutes
48.

Software Development Security: Bad Scenario Testing

4 Minutes
49.

Software Development Security: Logging & Monitoring

1 Minutes
50.

Software Development Security: (API & GUI Security)

3 Minutes
51.

Exercise 7: Where Did the Error Occur in the Version?

5 Minutes
52.

Cyber ​​Security Core Concepts: Security Operations Center (SOC)

1 Minutes
53.

Security Operations Center: SOC Tiers

4 Minutes
54.

Security Operations Center: Monitoring and Reporting

2 Minutes
55.

Security Operations Center: Case Modeling

2 Minutes
56.

Exercise 8: How to Monitor

5 Minutes
1.

Introduction to Risk Assessment and Compliance

2 Minutes
2.

Risk Management (What are the risks?) 1

3 Minutes
3.

Risk Management (What are the risks?) 2

1 Minutes
4.

Risk Management (Information Security Risks)

1 Minutes
5.

Risk Management (What are the risks?) 3

3 Minutes
6.

Risk Management Departments

5 Minutes
7.

Risk Management (Identification of Risks, Gaps and Threats)

1 Minutes
8.

Risk Management (Measurement of Final Risk)

3 Minutes
9.

Risk Management (Risk Classification)

2 Minutes
10.

Risk analysis (Quantitative vs Qualitative)

2 Minutes
11.

Risk Management

5 Minutes
12.

Compliance and Audit 1

3 Minutes
13.

Compliance and Audit 2

3 Minutes
14.

What is an Audit?

1 Minutes
15.

Audit Approach

2 Minutes
16.

Audit Procedures 1

4 Minutes
17.

Audit Procedures 2

5 Minutes
18.

Risk Assessment and Compliance (Governance)

8 Minutes
19.

Exercise: GRC Principles

3 Minutes

About this course

In this course, you will learn about the main concepts of cybersecurity, risk assessment, and compliance.

Course requirements and prerequisites

Graduate from Engineering or Computer Science

Strong problem solving skills

Detail-oriented

Mentor

Looking for help?