{"id":10032,"date":"2022-02-02T19:17:16","date_gmt":"2022-02-02T16:17:16","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=10032"},"modified":"2024-12-23T02:52:33","modified_gmt":"2024-12-22T23:52:33","slug":"cyber-security","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>General description of the training program<\/strong><\/p>\n<p style=\"text-align: justify;\">The training program (Cyber \u200b\u200bSecurity) is designed in accordance with the world\u2019s trend towards increasing electronic security for users and countries and saving data. This program includes developing the trainee in securing the internet from intrusions in addition to securing all electronic devices used with protection systems from malicious programs and their spread. The program also creates the methods used in securing users and their devices, in addition to using secure protocols in communication processes. Furthermore, the program reviews the most important methods of securing and encrypting payments in order to protect them from any dangers resulting from pirated electronic attacks.<\/p>\n<p style=\"text-align: justify;\"><strong>The general objective of the training program<\/strong><\/p>\n<p style=\"text-align: justify;\">Training participants on the latest cybersecurity systems and methods for institutions and individuals.<\/p>\n<p style=\"text-align: justify;\"><strong>Detailed objectives of the training program<\/strong><\/p>\n<p style=\"text-align: justify;\">\uf0a7 Introducing the best standards and applications used in the field of cybersecurity.<br \/>\n\uf0a7 Introducing all security controls that are used to protect information and maintain computers.<br \/>\n\uf0a7 Introducing the methods of securing payments and protecting the various digital banking services.<br \/>\n\uf0a7 Identifying the elements of information security that operate on confidential systems and protocols.<br \/>\n\uf0a7 Understanding the standards and requirements of PCI DSS to secure electronic payments.<\/p>\n<p style=\"text-align: justify;\"><strong>Information security and risk management<\/strong><\/p>\n<p style=\"text-align: justify;\">\uf0a7 Information Security Governance in the Information Technology Governance Framework COBIT 2019 COBIT 5.<br \/>\n\uf0a7 Governance, risk management, and compliance.<br \/>\n\uf0a7 The most recent cyber attacks in 2020-2021 (reasons and means of protection).<br \/>\n\uf0a7 Concepts and technology of information security.<br \/>\n\uf0a7 Information security governance standards.<br \/>\n\uf0a7 An overview of the information security strategy.<\/p>\n<p style=\"text-align: justify;\"><strong>Infrastructure insurance<\/strong><\/p>\n<p style=\"text-align: justify;\">\uf0a7 International Standard for Information Security ISO 27001:2013.<br \/>\n\uf0a7 Defining data security controls.<br \/>\n\uf0a7 Assessing and identifying weaknesses in web-based systems &#8211; mobile systems &#8211; embedded devices.<br \/>\n\uf0a7 Defining and applying security controls in software development environments.<br \/>\n\uf0a7 Integrating cyber security into the software development life cycle (SDLC).<br \/>\n\uf0a7 Applying the principles of secure design in network architectures.<\/p>\n<p style=\"text-align: justify;\"><strong>Information security and its impact on operational business continuity<\/strong><\/p>\n<p style=\"text-align: justify;\">\uf0a7 Application of encryption and electronic signature.<br \/>\n\uf0a7 Cloud security.<br \/>\n\uf0a7 Participate in Business Continuity Planning (BCP).<br \/>\n\uf0a7 Implementing PCI-DSS Electronic Payment Security Standards.<\/p>\n","protected":false},"author":1,"featured_media":9120,"template":"","course_category":[74,38],"class_list":["post-10032","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-compatia-en","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/10032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":19,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/10032\/revisions"}],"predecessor-version":[{"id":27821,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/10032\/revisions\/27821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/9120"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=10032"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=10032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}