This interactive course promises the acquisition of fundamental knowledge and skills to understand different computer and security threats like credit card fraud, identity theft, email hoaxes, online banking phishing scams and more.
This interactive workshop promises the acquisition of fundamental knowledge and skills to understand different computer and security threats like credit card fraud, identity theft, email hoaxes, online banking phishing scams and more.
1 - Foundations of Security
2 - Securing Operating Systems
3 - Protecting System Using Antiviruses
4 - Data Encryption
5 - Data Backup and Disaster Recovery
6 - Internet Security
7 - Securing Network Connections
8 - Securing Online Transactions
9 - Securing Email Communications
10 - Social Engineering and Identity Theft
11 - Security on Social Networking Sites
12 - Information Security and Legal Compliance
13 - Securing Mobile Devices
The outline may vary depending on the offered center.
NobleProg is a leading IT training and consultancy provider that has branches all over the globe in different countries. NobleProg offers an extensive selection of vendor-authorized certifications and training. The vendors include some of the biggest names in the industry like;
- And many more
These partnerships allow NobleProg to deliver the most up-to-date curriculum with specific standards set in alignment with these top vendors. NobleProg offers all sorts of training options to the individuals and business community ranging from instructor-led classes to private, online and on-site training opportunity.
Led by qualified, experienced and certified instructors, NobleProg is the place to turn raw ambitions into tangible result through personal and career development in your respective field.
KHDA (Knowledge and Human Development Authority)
This certification is designed specially for IT Professionals have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation, and IS control monitoring and maintenance.
The outline of this course is followed by up-to-date and global common body of knowledge and it ensures that you gain a deep knowledge of threats, technologies, regulations, standards, and practices surrounding the security of Information System.
This course is designed to help you in getting your CGEIT certification. You will learn to define, establish and maintain an IT governance framework and also ensure the strategic alignment of IT with the business objective and it supports to achieve the overall goals of the business.
You will also learn to create a program for implementing information security strategy. It also includes implementing an information security program, Overseeing and directing information security activities for executing the information security program and planning, developing etc.
This course will give you the skills and knowledge to understand/apply the key methods and ideas of the information security field. You will learn about designing the architecture, design and management of the security of your firm.