Security Essentials

This course introduces various topics in the field of computer and network security and protection, as well as the extent to which the field of network security relates to other areas in information technology.


This course also provides the information and knowledge necessary to prepare for further trainers related to specialized security fields, in addition to a general introduction to this field. Upon completion of the course, he will be expected to be able to identify security threats to computer networks, strengthen internal systems and services, as well as network connectivity devices and services, ensure the security of network communications, manage infrastructure for secure business transactions, and enforce an organizations computer and network security policy. , as well as monitoring the security infrastructure.

Course Duration : 30 Hours

Course Outline

Module 01: Comparing Security Roles and Security Controls

Module 02: Explaining Threat Actors and Threat Intelligence

Module 03: Performing Security Assessments

Module 04: Identifying Social Engineering and Malware

Module 05: Summarizing Basic Cryptographic Concepts

Module 06: Implementing Public Key Infrastructure

Module 07: Implementing Authentication Controls

Module 08: Implementing Identity and Account Management Controls

Module 09: Implementing Secure Network Designs

Module 10: Implementing Network Security Appliances

Module 11: Implementing Secure Network Protocols

Module 12: Implementing Host Security Solutions

Module 13:Implementing Secure Mobile Solutions

Module 14: Summarizing Secure Application Concepts

Module 15: Implementing Secure Cloud Solutions

Module 16: Explaining Data Privacy and Protection Concepts

Module 17: Performing Incident Response

Module 18: Explaining Digital Forensics

Module 19: Summarizing Risk Management Concepts

Module 20: Implementing Cyber security Resilience

Module 21: Explaining Physical Security