Cybersecurity: Technology and Application
Cybersecurity: Technology and Application
• Security Culture
• Mobile Insecurity
• Introduction to Network Security
• Data Protection in the Cloud
• Privacy Enhancing Technologies in Internet: Solutions and Tools
• Security Labs (includes Penetration Testing, VoIP Security& Privacy, Ethical Hacking)
• The course materials are supported with a number of practical exercises, tips and case studies to illustrate and give experience in applying the techniques described.
Specifically, it will enable you to:
- Become a subject matter expert on how major security technologies can both impact and protect your business.
- Engage confidently with management (since potential participants could include management, other words may be better here – perhaps “other corporate players or participants) on cybersecurity challenges, emerging technologies, and how those technologies can address business problems.
- Gain the tools and knowledge to develop a concrete strategic cybersecurity action plan for your organization.
- Making their organization more resilient to cyber-induced failures.
- Safeguarding their systems by evaluating them from a cyberattacker’s perspective
- Implementing security measures during the coding, testing, and deployment phases
- Planning their short-and long-term cybersecurity roadmap
Timing | Location | Price | Student Price | Online Price | Trainer | Registeration Status | Feedback |
---|---|---|---|---|---|---|---|
صباحية 06/02/2017 | King Saud University, College of Computer Science - Centre of Excellence for Information Security | 2640.00 | 800.00 | 396.00 | Assoc. Prof. Dr. Kashif Saleem | Registeration is closed | Feedback is closed |
يوم الاثنين 13/02/2017 مسائية | 2640.00 | 800.00 | 396.00 | Assoc. Prof. Dr. Kashif Saleem | Registeration is closed | Feedback is closed |
Speaker Language | Englsih |
---|---|
Content Language | Englsih |
Target Users | Participants may include: Engineers who need a greater understanding of the latest cybersecurity technologies Technical managers who want to familiarize themselves with emerging technologies. Entrepreneurs who would like to gain insights into trends and future capabilities of cybersecurity technology. Managers/C-level executives with a background in computer science who would like a greater understanding of the cybersecurity landscape. |
Duration | 4 Days |
This course is suitable for anyone with a bachelor’s level education in computer science. Because the application of the course is broad, it can apply to both early career professionals as well as senior technical managers. To ensure participants understand how the concepts apply to business, at least a year of work experience is recommended. Teams of individuals from the same organization are also encouraged to apply.
-
Assoc. Prof. Dr. Kashif Saleem
-
Assoc. Prof. Dr. Kashif Saleem