By the end of this training course, trainees will be able to :
- Identify the nature of the risks of cyberattack and the difference between it and information security.
- Identify the rules of protection and mitigating the risks of cyber-attack.
- Identify defensive strategies through encryption, detection and control techniques.
- Specify the dimensions and in-depth defensive controls applied in cybersecurity management.
- Top senior management, Information Technology Department, operations and services departments, customer service, compliance, internal and external auditing, risk management, information security, and all employees of the organization due to the comprehensiveness and importance of the topic.
- Cybersecurity Introduction and Overview.
- Cybersecurity Concepts.
- Cyber-attack security and protection rules.
- Network, software, application and sensitive data protection controls.
- Mechanisms for responding to cyber-hacking attacks.
- Security and protection applications in the current technological environment .
- Practical case study.