Filters
Search

Cyber ​​Security Diploma

Mid-term cybersecurity diploma General objective: This program aims to qualify the trainee to work in the field of cybersecurity, and obtain the fifth level of the National Professional Qualifications System.

Schedule

Date Location Price Book
28/11/2024
*
SAR 22,000.00 incl tax
+ -

Overview

The Cybersecurity Diploma was designed in accordance with the needs of the local labor market for the specialization. Training for this specialization is conducted in five midterm training semesters, the duration of each training semester being sixteen training weeks, equivalent to (1712) training hours, in addition to (360) hours of practical training in the labor market. No more than (78) credit hours. This program provides training on specialized skills in the field of cybersecurity and networks related to protecting companies and institutions from hacking. It also includes installing, operating and maintaining the computer, Network management, managing network server operating systems, securing networks and network server operating systems, and information security and protecting it from hacking. The focus during training is on the practical, applied aspect and a link to the theoretical aspect in most of the specialized courses, in addition to general skills in the English language, computer applications, vocational guidance, excellence, job behavior, communication skills, and learning skills. The graduate of this program is awarded a diploma in cybersecurity and is expected to work in the fields related to the cybersecurity process in companies, as a network security technician, as an operating security systems technician, as an assistant responsible for discovering vulnerabilities, and as a network technician.

Agenda

Detailed objectives of the program:

By the end of this program, the trainee will be able and competent to perform the following tasks:

  • Implementing security technologies and systems to protect the organization from hacking.
  • Protects important information and assets of the organization.
  • Technical work is applied within the organization to prevent cyber attacks and develop disaster recovery plans in the event of a breach.
  • Monitors the network and provides real-time security solutions.
  • Identify security vulnerabilities in the network architecture




FAQ

Downloads

*
*
*
*
Close