סייבר ואבטחת מידע
אבטחת סייבר מתייחסת לכל היבט של הגנה על ארגון ,עובדיו ונכסיו מפני איומי סייבר
ככל שהתקפות סייבר הופכות נפוצות ומתוחכמות יותר והרשתות הארגוניות הולכות והופכות מורכבות יותר
כך נדרשים מגוון פתרונות אבטחת סייבר כדי להפחית את סיכוני הסייבר הארגוניים
ניתן לתאר את המושג אבטחת סייבר כשיטות,טכנולוגיות ותהליכים קולקטיביים שנועדו לסייע בהגנה על הסודיות
השלמות והזמינות של מערכות מחשב, רשתות ונתונים, מפני התקפות סייבר או גישה לא מורשית
Introduction to GDPR
40 Academic hours
This course is designed to provide an introduction to the General Data Protection Regulation (GDPR) and its requirements. Participants will gain an understanding of the key principles, concepts, and obligations of GDPR, as well as practical strategies for compliance.
Introduction to Cyber Warfare
40 Academic hours
Modern life depends on online services, so having a better understanding of cyber security threats is vital.
On this course you’ll learn how to recognise online security threats that could harm you and explore the steps you can take to minimise your risk.
PenetrationTesting
40 Academic hours
The main reason penetration tests are crucial to an organization's security is that they help personnel learn how to handle any type of break-in from a malicious entity. Pen tests serve as a way to examine whether an organization's security policies are genuinely effective
SOC Analyst
40 Academic hours
An SOC analyst is responsible for monitoring and auditing the company’s systems. They also monitor network activity and ensure that no suspicious activities are happening. The SOC Analyst also works with other departments of the company, such as human resources or sales, to ensure that their systems are secure. If someone in one of those departments has an issue with their work computer, it will be up to the SOC analyst to correct it.
Web Application Hacking
40 Academic hours
Web Application Hacking and Security is a specialization certification that enables the cybersecurity workforce to learn, hack, test, and secure web applications from existing and emerging security threats in the industry verticals.
Network Cyber Research
40 Academic hours
The Network Security course aims to address cyber challenges experienced on the network level. The course covers various attack techniques and how to defend against them.
By the end of the course, participants will have the ability to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.
Python Security and Secure coding
32 Academic hours
Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.
Linux Forensics
40 Academic hours
This course will familiarize students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware all on a Linux system with readily available free and open source tools. Students will also gain an in-depth understanding of how Linux works under the covers.
Python Security and Secure coding
32 Academic hours
Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.
Network Security
40 Academic hours
Picture yourself as a security professional with the mission to protect your company’s data from theft, damage, or disruption. Potential harm can come from a variety of sources. And the risk can quickly scale to a high-consequence event where you’ll have to react using the right knowledge. Network Security prepares you for tasks like these by developing the skills needed to design, implement and support security for network devices and ensure their integrity.
Secure Development
40 Academic hours
The Course will present security Guidelines, consideration and techniques for developing secure application, alongside explanations and demonstration of application specific attacks. Participant will learn and understand the different application security threats, and the right technique for mitigating each possible threat
40 Academic hours
Malware Analysis
Malware analysis is a critical skill in the information security community. This course is logically designed to help you leap through the complicated steps of static and dynamic malware analysis in an easy and proactive way. After this course, you will be able to understand the core skills required in malware incident response investigations and analysis of Advance persistent threats. The course will guide you trough the basic requirements and necessary skillsets required in order to take your knowledge to the next level.
Python Forensics
40 Academic hours
Python is uniquely positioned as a programming language to perform cyber investigations and perform forensics analysis. Unleash the power of Python by using popular libraries and Python tools to help you create efficient and thorough forensics investigations. This course will walk you through digital forensics on network traffic, host analysis, and memory analysis.