top of page
Video Game

סייבר ואבטחת מידע

אבטחת סייבר מתייחסת לכל היבט של הגנה על ארגון ,עובדיו ונכסיו מפני איומי סייבר

ככל שהתקפות סייבר הופכות נפוצות ומתוחכמות יותר והרשתות הארגוניות הולכות והופכות מורכבות יותר

כך נדרשים מגוון פתרונות אבטחת סייבר כדי להפחית את סיכוני הסייבר הארגוניים

ניתן לתאר את המושג אבטחת סייבר כשיטות,טכנולוגיות ותהליכים קולקטיביים שנועדו לסייע בהגנה על הסודיות

השלמות והזמינות של מערכות מחשב, רשתות ונתונים, מפני התקפות סייבר או גישה לא מורשית

Laptop Keyboard

Introduction to GDPR  

40 Academic hours

This course is designed to provide an introduction to the General Data Protection Regulation (GDPR) and its requirements. Participants will gain an understanding of the key principles, concepts, and obligations of GDPR, as well as practical strategies for compliance.

Introduction to Cyber Warfare

40 Academic hours

​Modern life depends on online services, so having a better understanding of cyber security threats is vital.

On this course  you’ll learn how to recognise online security threats that could harm you and explore the steps you can take to minimise your risk.

Entering credit card details
Cyborg with Gas Mask

PenetrationTesting

40 Academic hours

The main reason penetration tests are crucial to an organization's security is that they help personnel learn how to handle any type of break-in from a malicious entity. Pen tests serve as a way to examine whether an organization's security policies are genuinely effective

SOC Analyst

40 Academic hours

An SOC analyst is responsible for monitoring and auditing the company’s systems. They also monitor network activity and ensure that no suspicious activities are happening. The SOC Analyst also works with other departments of the company, such as human resources or sales, to ensure that their systems are secure. If someone in one of those departments has an issue with their work computer, it will be up to the SOC analyst to correct it.

Coding Station
Coding

Web Application Hacking

40 Academic hours

Web Application Hacking and Security is a specialization certification that enables the cybersecurity workforce to learn, hack, test, and secure web applications from existing and emerging security threats in the industry verticals.

Network Cyber Research

40 Academic hours

 The Network Security course aims to address cyber challenges experienced on the network level. The course covers various attack techniques and how to defend against them.
By the end of the course, participants will have the ability to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.

Code
Electronic Devices on Table

Python Security and Secure coding

32 Academic hours

Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.

Linux Forensics

40 Academic hours

This course will familiarize students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware all on a Linux system with readily available free and open source tools. Students will also gain an in-depth understanding of how Linux works under the covers.

Monitoring Room
Backend Developer

Python Security and Secure coding

32 Academic hours

Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.

Network Security

40 Academic hours

Picture yourself as a security professional with the mission to protect your company’s data from theft, damage, or disruption. Potential harm can come from a variety of sources. And the risk can quickly scale to a high-consequence event where you’ll have to react using the right knowledge. Network Security prepares you for tasks like these by developing the skills needed to design, implement and support security for network devices and ensure their integrity. 

Neurotechnology
Work Desk

Secure Development

40 Academic hours

  The Course will present security Guidelines, consideration and techniques for developing secure application, alongside explanations and demonstration of application specific attacks. Participant will learn and understand the different application security threats, and the right technique for mitigating each possible threat

40 Academic hours

Malware Analysis

Malware analysis is a critical skill in the information security community. This course is logically designed to help you leap through the complicated steps of static and dynamic malware analysis in an easy and proactive way. After this course, you will be able to understand the core skills required in malware incident response investigations and analysis of Advance persistent threats. The course will guide you trough the basic requirements and necessary skillsets required in order to take your knowledge to the next level. 

Code on Laptop Computer
Person Analyzing Data

Python Forensics

40 Academic hours

Python is uniquely positioned as a programming language to perform cyber investigations and perform forensics analysis. Unleash the power of Python by using popular libraries and Python tools to help you create efficient and thorough forensics investigations. This course will walk you through digital forensics on network traffic, host analysis, and memory analysis.

לקורסים נוספים בתחומים של סייבר ואבטחת מידע
מוזמנים להשאיר פרטים ונחזור אליכם בהקדם

תודה על פנייתך!

bottom of page