Skip to main content
Cyber and Information Security
Cyber and Information Security
Training Activity Rate
Trainer/s
رياض جزماوي
Training activity Hours
9
Training activity Date
-
Training Activity Days
Tuesday
Wednesday
Thursday
Start and End Time
17:00 - 20:00
Training Activity Classification
Digitization and Recent Development
Course Language
English
Methodology
IDL
Type of Training
short courses
Deadline for registration
Price For Jordanian
72 JOD
Price For Non Jordanian
180 US$
Outcomes

By the end of this training course, trainees will able to:

-    Define cybersecurity.

-    Describes objectives of cybersecurity.

-    Identify the key components of cybersecurity architecture.

-    Identify security tools and hardening techniques.

-    Describe different classes of attacks.

-    Define types of incidents including categories, responses and timelines for response.

-    Discuss new and emerging TI and IS technologies.

Target Group

-    Cybersecurity professionals with experience up to (2) years.

-    Security and IT auditors.

-    Compliance.

-    Anybody interested in gaining the foundation knowledge about cybersecurity.

Contents

-    Introduction to Cybersecurity.

-    Cybersecurity objectives.

-    Cybersecurity roles.

-    Differences between Information Security and Cybersecurity.

-    Cybersecurity Principles.

-    Confidentiality, integrity and availability .

-    Authentication and nonrepudiation.

-    Information Security (IS) within Lifecycle Management.

-    Lifecycle management landscape.

-    Security architecture processes.

-    Security architecture tools.

-    Intermediate lifecycle management concepts .

-    Risks and Vulnerabilities.

-    Basics of risk management.

-    Operational threat environments.

-    Classes of attacks.

-    Incident Response.

-    Incident categories.

-    Incident response.

-    Incident recovery.

-    Future Implications and Evolving Technologies.

-    New and emerging IT and IS technologies.

-    Mobile security issues, risks and vulnerabilities.

-    Cloud concepts around data and collaboration.