Cyber Security

Cyber security is how individuals and organisations reduce the risk of cyber attack.

About the Course

Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.

It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.

1-  SECURITY CHALLANGES IN AI SYSTMES
  1. Challenges of Securing Information in AI
  2. Information Security and Controls
  • AAA
  • PPP
  • CIA
  • Basic three control
  • Attacks and Defenses
2-    SECURITY THREATS AND VULNERABILITIES

a. Common Security Threats

  • Overview of Common Threats:
  • Malware (viruses, worms, trojans)
  • Phishing Attacks
  • Denial-of-Service (DoS) Attacks
  • Man-in-the-Middle Attacks  

b. Understanding Vulnerabilities

  • Definition of Vulnerabilities
  • Common Software and System Vulnerabilities:
  • Outdated Software
  • Weak Passwords
  • Lack of Encryption
  • Misconfigured Security Settings

c. Real-World Examples

  • Briefly discuss recent cybersecurity incidents or breaches
  • Highlight the impact of security lapses

d.Protective Measures

  • Introduction to Protective Measures:
    1. Regular Software Updates
    2. Strong Authentication Practices
    3. Encryption Best Practices
    4. Security Awareness Training

e. Social engineering psychological attacks

f. Physical social engineering attacks

g. Different types of server-side web application attacks

h. Client-side attacks

i. Types of social media & networking services

j. Risk assessment

k. Safe use of internet/social media – precautions/ practices

3-    DIGITAL CERTIFICATES
  1. Install a Certificate Authority (CA) Hierarchy
  2. Enroll Certificates
  3. Secure Network Traffic by Using Certificates
  4. Renew Certificates
  5. Revoke Certificates
  6. Back Up and Restore Certificates and Private keys
  7. Restore Certificates and Private keys
4-  NETWORK SECURITY
  1. Types of network security devices and how they can be used
  2. Security enhancement through network Technologies
  3. Secure network design elements
  4. Network Protocols (ICMP, SNMP, DNS, FTP, TELNET, IPV6)
  5. Network Administration Principles
5.   MOBILE SECUIRTY
  1. Types of Mobile Devices
  2. Mobile Device Security
  3. Mobile Device App Security
  4. BYOD Security
6-  ACCESS CONTROL AND MITIGATION OF AI SYSTEMS
    1. Access control and access control models
    2. Authentication Services
    3. Authentication credentials
    4. Single sign on
    5. Account management

 4850 USD

About this course:
Venues

Alkhobar - KSA

Duration:

5 Days

Date

13th April 2025

Course Details Files:

Click to Check PDF

Courses Categories

Successful Caucasian Woman Making Presentation
Soft Skills Courses
Candid shot of professional skilled Afro American female architect holding ruler and pen while drawi
Technical Courses
business approve and certificate concept, document permit and certified
Certified Courses