{"id":14035,"date":"2022-09-20T15:06:33","date_gmt":"2022-09-20T12:06:33","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=14035"},"modified":"2026-02-05T21:15:41","modified_gmt":"2026-02-05T18:15:41","slug":"cyber-security-level-3","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/cyber-security-level-3\/","title":{"rendered":"Cyber Security Level 3 Course"},"content":{"rendered":"<p dir=\"ltr\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Overview<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>The Level 3 Cyber Security Technician Qualification has been developed to train people to provide first-line cyber security support.<\/li>\n<li>This requires individuals to monitor and detect potential security threats and escalate as necessary.<\/li>\n<li>An employee in this occupation will be responsible for supporting a cybersecurity function (frequently a Security Operations Centre or Network Operations Centre) working under supervision.<\/li>\n<li>The employee will be conducting specific cyber security tasks to defined procedures and standards.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Objective<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Follow information security procedures<\/li>\n<li>Maintain information security controls<\/li>\n<li>Develop information security training and awareness resources<\/li>\n<li>Monitor the effectiveness of information security training and awareness<\/li>\n<li>Handle and assess the validity of security requests from a range of internal and external stakeholders<\/li>\n<li>Follow technical procedures to install and maintain technical security controls<\/li>\n<li>Monitor and report information security events<\/li>\n<li>Recognize when and how to escalate information security events in accordance with relevant procedures and standards<\/li>\n<li>Review and modify access rights to digital information systems, services, devices, or data<\/li>\n<li>Maintain an inventory of digital information systems, services, devices, and data storage<\/li>\n<li>Scopes cyber security vulnerability assessments<\/li>\n<li>Evaluate the results of a cyber security vulnerability assessment<\/li>\n<li>Perform routine threat intelligence gathering tasks through consulting external sources<\/li>\n<li>Undertake digital information risk assessments<\/li>\n<li>Identify and categorize threats, vulnerabilities, and risks in preparation for response or escalation<\/li>\n<li>Document cyber security event information whilst preserving evidence<\/li>\n<li>Draft information management reports using standard formats appropriate to the recipients<\/li>\n<li>Review and comment upon cyber security policies, procedures, standards, and guidelines<\/li>\n<li>Perform cyber security compliance checks<\/li>\n<li>Translate audit requirements and collate relevant information from log files, incident reports, and other data sources<\/li>\n<li>Communication skills to co-operate as part of a multi-functional, multi-disciplinary team using a range of technical and non-technical language to provide an effective interface between internal or external users and suppliers<\/li>\n<li>Keep up-to-date with legislation and industry standards related to the implementation of cyber security in an organization<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>The Main Topic of the Course<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Understand Cyber Security Principles<\/li>\n<li>Understand Threat Intelligence in Cyber Security<\/li>\n<li>Cyber Security Testing, Vulnerabilities and Controls<\/li>\n<li>Cyber Security Incident Response<\/li>\n<li>Understand legislation and ethical conduct within cyber security<\/li>\n<li>Professional Skills and Behaviors for Cyber Security<\/li>\n<li>Network Principles, Networking Devices,<\/li>\n<li>Core terminology and Cyber Awareness<\/li>\n<li>Compliance and Policy<\/li>\n<li>Vulnerabilities and Threats<\/li>\n<li>Threat Identification and Events<\/li>\n<li>Forensic principles and Incidents<\/li>\n<li>Detecting and Reporting<\/li>\n<li>Risk Assessment and Asset Control<\/li>\n<li>Disaster Prevention<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Who is it For?<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Any (IT staff ) who are candidates for roles for Cyber Security Technicians like :<\/li>\n<li>Cyber Security Administrator,<\/li>\n<li>Access Control Administrator,<\/li>\n<li>Incident Response Technician, Junior Security<\/li>\n<li>Junior Operations Centre (SOC),<\/li>\n<li>Junior Penetration Tester,<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Benefits <\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">\u00a0preparing for CompTIA Security Plus<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Outlines and Training Plan<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">1st Module \u201c Introduction to cyber security \u201c<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Course Introduction<\/li>\n<li>Overview of cyber security<\/li>\n<li>fill the gap between trainees&#8217; knowledge regarding cybersecurity<\/li>\n<li>Security roles in the organization<\/li>\n<li>Security certificate\u00a0 level<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">2nd Module \u201c threat, attack, vulnerability \u201c<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Malware type<\/li>\n<li>Understating attack<\/li>\n<li>Threat intelligence<\/li>\n<li>Social engineering attack<\/li>\n<li>Common attack<\/li>\n<li>Understating vulnerability type<\/li>\n<li>Vulnerability scanning<\/li>\n<li>Penetration testing and bug bounty<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">3rd Module OWASP<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>10 top OWASP<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">4th Module \u201c cryptography \u201c<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Encryption<\/li>\n<li>Symmetric cryptography<\/li>\n<li>A Symmetric cryptography<\/li>\n<li>Key management<\/li>\n<li>PKI Public Key Infrastructure<\/li>\n<li>Cryptanalytic attack<\/li>\n<li>Cryptographic application<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">5th Module \u201c Identity Access Management IAM\u201c<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Identification<\/li>\n<li>Authentication<\/li>\n<li>Authorization<\/li>\n<li>Account management<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">6th Module \u201cphysical security and cloud security \u201c<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Data center protection<\/li>\n<li>Hardware and data security<\/li>\n<li>Business continuity management BCM<\/li>\n<li>Disaster recovery plan DRP<\/li>\n<li>Cloud computing<\/li>\n<li>Virtualization<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"direction: ltr; text-align: justify;\">7th Module \u201c Endpoint Security \u201c<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Host security<\/li>\n<li>Hardware security<\/li>\n<li>Configuration management<\/li>\n<li>Embedded devices security<\/li>\n<li>Working on the command line<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">8th Module \u201c network security \u201c<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>OSI<\/li>\n<li>TCP\/IP<\/li>\n<li>Secure network design<\/li>\n<li>Network security devices<\/li>\n<li>Network security techniques<\/li>\n<li>Wireless network<\/li>\n<li>Network attack<\/li>\n<li>Network tools<\/li>\n<li>Mobile device security<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">9th Module \u201c operation and incident response \u201c<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">\u2022 Incidence response program<br \/>\n\u2022 Attack Framework<br \/>\n\u2022 Incidence investigation<br \/>\n\u2022 Forensic techniques<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">10th Module \u201c GRC governance Risk &amp; Compliance \u201c<\/p>\n<ul dir=\"ltr\">\n<li style=\"text-align: justify;\">Risk analysis<\/li>\n<li style=\"text-align: justify;\">Risk management framework<\/li>\n<li style=\"text-align: justify;\">Supply chain<\/li>\n<li style=\"text-align: justify;\">Security policy<\/li>\n<li style=\"text-align: justify;\">Privacy and Compliance<\/li>\n<li style=\"text-align: justify;\">Security training and awareness<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":14036,"template":"","course_category":[38],"class_list":["post-14035","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/14035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":14,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/14035\/revisions"}],"predecessor-version":[{"id":34008,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/14035\/revisions\/34008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/14036"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=14035"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=14035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}