Introduction to Cyber Security (Arabic Version)

Arabic Course for Cyber Security

Ratings: 4.66 / 5.00




Description

After the revolution in technology we witnessed in the last few years, Internet has become an essential part of our social life, business, education, and entertainment, This exposed us to a new digital world and if you don’t use it safely you might become a victim to what we call hackers.

This course will introduce you to the world of Cyber Security by discussing some core concepts in Cyber Security that every security professional should be aware of, Such as:

-what is cybersecurity and why do we need it?

-why data must be protected and how?

-who are we protecting it from?

-Confidentiality, Integrity, and Availability tried and their importance in the world of cybersecurity.

-Cryptography, Encryption, hashing, and digital signature.

-what are Malwares and their types?

-what do we mean by vulnerabilities, exploits, and threats

-various types of cyberattacks and how they are performed

- the phases of hacking


In this course you will learn:

what is cyber security and why do we need it.

The elements of cyber security

the CIA security tried and its importance

types of hackers and threats

what is cryptography, Encryption, hashing and digital signature

what is vulnerability, Exploit and threat

types of malwares

Some cyber attacks such as brute force, Man in the middle and Social engineering.

the phases of cyber attack

some job profiles in cyber security

these topics are discussed on a basic level to make it easier for beginners to start their journey with a solid understanding of terminologies and core concepts of cybersecurity.

What You Will Learn!

  • what is cyber security and why do we need it.
  • The elements of cyber security
  • the CIA security tried and its importance
  • types of hackers and threats
  • what is cryptography, Encryption, hashing and digital signature
  • what is vulnerability, Exploit and threat
  • types of malwares
  • Some cyber attacks such as brute force, Man in the middle and Social engineering.
  • the phases of cyber attack
  • some job profiles in cyber security

Who Should Attend!

  • anyone who would like to have an overview of cyber security.
  • Individuals who want to start cyber security career path and don't know where to start