Information security basics

Best Seller Icon Bestseller
0 Students
  • Last Updated 03/2025
  • Certified Course
Card image

What Will We Learn

The general goal of the program:

Developing the trainee’s skills in information security and the threats he faces, and applying appropriate security solutions to confront these threats efficiently and effectively

Capabilities that the program aims to develop:

Applying the basics of information security, and methods of protecting and responding to attacks that threaten information security efficiently and effectively.

Objectives:

  • Introduction to information security
  • Systems protection
  • Information security for mobile devices
  • Security policies for information systems
  • Network vulnerabilities and attacks
  • Network defense
  • Introduction to cryptography
  • Encryption application
  • Security and cloud computing
  • Access control basics
  • Authentication
  • Vulnerability assessment
  • Business continuity

Outputs: 

After completing the training in the program, it is expected that the trainee will be able to:

  • Information security is easily known.
  • Identify the sources of attacks easily.
  • It classifies the types of attacks on the computer and the network according to their damage with recision and precision.
  • Applies the necessary protection methods and methods to maintain the safety of devices efficiently and effectively.
  • Uses protection laws and provisions according to the systems used in the facility accurately and proficiently.
  • Distinguish between network vulnerabilities according to their sources easily.
  • Learn about the basics and security of cloud computing easily and conveniently.
  • Recognizes various attack methods on networks and appropriate defense methods with precision and proficiency.
  • Distinguishes between access control methods and how to use them accurately and proficiently.
  • Recognize authentication credentials and verify them easily.
  • Identifies risks in information security and how to mitigate and manage them accurately and proficiently.
  • Applies the necessary procedures to recover data when disasters occur efficiently and effectively.
Show More

Course Content

Video Images
Preview this course
SAR
30-Day Money-Back Guarantee
  • Hours
  • Enrolled0 Students
  • Chapters 0
  • Total Lessons 0
  • Exams 0
  • Course Completion Certificate Yes