categories: Technology & Innovation
Level: General
Course Language: Arabic
By the end of this course, you will be able to: Learn about hacking techniques.
Dealing with various incidents and holding forensic work and network analysis.
Identify malware reverse engineering analysis tools and techniques.
Free lessons
Introduction to Incident Handling and Response
Incident Response (IR) & Security Operations Center (SOC) 1
1. Incident Handling and Response
Introduction to Incident Handling and Response
Incident Response (IR) & Security Operations Center (SOC) 1
Incident Response (IR) & Security Operations Center (SOC) 2
Incident Response (IR) & Security Operations Center (SOC) 3
How to Deal With and Respond to Incident
Incident Handling and Response: Kill Chain Model 1
Incident Handling and Response: Kill Chain Model 2
Incident Handling and Response: Kill Chain Model 3
Control Reversals and Working with the Red Team 1
Control Reversals and Working with the Red Team 2
Incident Handling Planning
Incident Response (IR) Models 1
Incident Response (IR) Models 2
Incident Response Models: Playbook Use Case
Comprehensive Exercise
In this track, you will learn the cybersecurity fundamentals, the basics of networking, the fields of cybersecurity, basic concepts of cybersecurity, how to create security objects, implement security services, and identify and assess different types of risks. You will also learn about cybersecurity controls, the concept of ethical hacking, infrastructure services, and secure infrastructure engineering. Also, through this track, you will learn about hacking techniques, how to handle and respond to various incidents, and malware reverse engineering techniques.
Graduate from Engineering or Computer Science
Strong problem solving skills
Detailed oriented
Cyber security program manager
973 Learners
3 Courses