categories: Technology & Innovation
Level: General
Course Language: Arabic
By the end of this course, you will be able to: Create security objects.
Implement security policies and services and perform network address translation.
Implement site-to-site IPsec VPNs as well as Identify and assess different types of risks.
Free lessons
Introduction
Core Concepts 1
Core Concepts 2
Core Concepts 3
Core Concepts 4
Exercise 1: Know the Fundamentals 1
Exercise 1: Know the Fundamentals 2
Exercise 1: Know the Fundamentals 3
1. CH1: Cybersecurity Core Concepts
Introduction
Core Concepts 1
Core Concepts 2
Core Concepts 3
Core Concepts 4
Exercise 1: Know the Fundamentals 1
Exercise 1: Know the Fundamentals 2
Exercise 1: Know the Fundamentals 3
Basic Concepts of Cyber Security: Attack Vectors
Attack Vectors: Types of Hackers
Attack Vectors: Types of Attackers
Attack Vectors: Where Does the Attack Come From?
Attack Vectors: Business Impact Analysis
Attack Vectors: Know Your field
Exercise 2: Find out where to start 1
Exercise 2: Find out where to start 2
Exercise 2: Find out where to start 3
Cyber Security Core Concepts: Types of Controls
Types of Controls (Asset vs. Significant Assets)
Controls Classification
Controls Types: Controls Slides
Examples of Controls
Types of Controls: Evaluating Controls Against Value
Exercise 3: Value Analysis
Control Evaluation
Cyber Security Core Concepts: Identity and Access Management
Identity and Access Management (Authentication, Authorization, and Accounting)
Identity and Access Management (Federation)
Identity and Access Management (Identity Profiling)
Identity and Access Management (Access Management Process)
Identity and Access Management (Identity and Access Manager and Privileged Acess Manager)
Exercise 4: Use Case Disadvantages of an Identity and Access Manager and Privileged Access Manager
Cyber Security Core Concepts: Network Security
Network Security
Network Security: Content and Web Filtering
Network Security: Intrusion Detection System (IDS) & Intrusion Prevention Systems (IPS) 1
Network Security: Intrusion Detection System (IDS) & Intrusion Prevention Systems (IPS) 2
Network Security: Virtual Private Network (VPN)
Exercise 5: Repairing Defects in Network
Cyber Security Core Concepts: Security Operations
Security Operations: Data Leakage
Security Operations: Endpoint Security
Security Operations: Vulnerability Management Lifecycle
Security Operations: Defense in Depth
Exercise 6: "Defense in Depth" in Security Operations
Cyber Security Core Concepts: Software Development Security
Software Development Security: Open Web Application Security Project (OWASP)
Software Development Security: Bad Scenario Testing
Software Development Security: Logging & Monitoring
Software Development Security: (API & GUI Security)
Exercise 7: Where Did the Error Occur in the Version?
Cyber Security Core Concepts: Security Operations Center (SOC)
Security Operations Center: SOC Tiers
Security Operations Center: Monitoring and Reporting
Security Operations Center: Case Modeling
Exercise 8: How to Monitor
2. CH2: Risk Assessment and Compliance
Introduction to Risk Assessment and Compliance
Risk Management (What are the risks?) 1
Risk Management (What are the risks?) 2
Risk Management (Information Security Risks)
Risk Management (What are the risks?) 3
Risk Management Departments
Risk Management (Identification of Risks, Gaps and Threats)
Risk Management (Measurement of Final Risk)
Risk Management (Risk Classification)
Risk analysis (Quantitative vs Qualitative)
Risk Management
Compliance and Audit 1
Compliance and Audit 2
What is an Audit?
Audit Approach
Audit Procedures 1
Audit Procedures 2
Risk Assessment and Compliance (Governance)
Exercise: GRC Principles
In this course, you will learn about the main concepts of cybersecurity, risk assessment, and compliance.
Graduate from Engineering or Computer Science
Strong problem solving skills
Detail-oriented
Cyber security program manager
972 Learners
3 Courses