Cybersecurity: Technology and Application


• Security Culture
• Mobile Insecurity
• Introduction to Network Security
• Data Protection in the Cloud
• Privacy Enhancing Technologies in Internet: Solutions and Tools
• Security Labs (includes Penetration Testing, VoIP Security& Privacy, Ethical Hacking)

• The course materials are supported with a number of practical exercises, tips and case studies to illustrate and give experience in applying the techniques described.

Specifically, it will enable you to:
- Become a subject matter expert on how major security technologies can both impact and protect your business.
- Engage confidently with management (since potential participants could include management, other words may be better here – perhaps “other corporate players or participants) on cybersecurity challenges, emerging technologies, and how those technologies can address business problems.
- Gain the tools and knowledge to develop a concrete strategic cybersecurity action plan for your organization.
- Making their organization more resilient to cyber-induced failures.
- Safeguarding their systems by evaluating them from a cyberattacker’s perspective
- Implementing security measures during the coding, testing, and deployment phases
- Planning their short-and long-term cybersecurity roadmap

Timing Location Price Student Price Online Price Trainer Registeration Status Feedback
صباحية 06/02/2017 King Saud University, College of Computer Science - Centre of Excellence for Information Security 2640.00 800.00 396.00 Assoc. Prof. Dr. Kashif Saleem Registeration is closed Feedback is closed
يوم الاثنين 13/02/2017 مسائية 2640.00 800.00 396.00 Assoc. Prof. Dr. Kashif Saleem Registeration is closed Feedback is closed
Speaker Language Englsih
Content Language Englsih
Target Users Participants may include: Engineers who need a greater understanding of the latest cybersecurity technologies Technical managers who want to familiarize themselves with emerging technologies. Entrepreneurs who would like to gain insights into trends and future capabilities of cybersecurity technology. Managers/C-level executives with a background in computer science who would like a greater understanding of the cybersecurity landscape.
Duration 4 Days

This course is suitable for anyone with a bachelor’s level education in computer science. Because the application of the course is broad, it can apply to both early career professionals as well as senior technical managers. To ensure participants understand how the concepts apply to business, at least a year of work experience is recommended. Teams of individuals from the same organization are also encouraged to apply.

  • Assoc. Prof. Dr. Kashif Saleem
    5.00 out of 5

  • Assoc. Prof. Dr. Kashif Saleem
    5.00 out of 5