Diplomas
Diploma Cyber security
Cyber security diploma
The cybersecurity diploma is designed in accordance with the needs of the local labor market for this specialty, training in this specialty is carried out in nine training classes and training is carried out in this program on specialized skills in: the field of cybersecurity: "algorithms and logic”, information and communication technologies", "encryption basics”," operating systems " and " Internet of Things security And cloud computing”, "operating systems (2)”, ” Fundamentals of cybersecurity", " internet and computer networks, and an introduction to digital forensics and selected topics in cybersecurity. An introduction to network security, cybercrime and its risks, advanced computer network security, artificial intelligence technology, e-governance security, ethical hacking and protection methods.
* Scientific degree
The intermediate diploma is classified at the fifth level of the national framework of qualifications.
* Duration of training
Two and a half years
* Target group
Men and women
* Available branches
Dammam branches in the eastern region
* Mandatory requirements
3 and a half months cooperative training
This program aims to introduce the trainee to the basics and concepts of cybersecurity, assess the level of data protection, methods, procedures and standards for the implementation of cybersecurity work, and obtain the sixth level of the national professional qualifications system, where the cybersecurity diploma is designed in accordance with the needs of the local labor market for this specialty, and training in this specialty is:
* Participates in the implementation of continuous monitoring of computers and networks and the provision of appropriate security solutions
* Participates in conducting criminal investigation of cyber incidents and assisting in data recovery
* Learn about the concept of cloud computing and the Internet of things and ways to secure them
* Participates in the protection against cybercrimes and the implementation of ways to address them
* Acquires knowledge of the procedures used to overcome and deal with threats and risks
* Can work effectively in the security risk management and Response Team
* Acquires the necessary basic knowledge related to the components of computer networks and software
* Applies encryption to achieve information security over the internet and networks
* Recognizes the different applications of the use of Information Technology
- This program is specially designed so that the trainee and the trainee are able to competently perform the following works:
- Definition of logic based on programming science
- Write basic code in Python language
- Web page design
- Familiarity with specialized terminology related to the field of cybersecurity
- Participate in the protection of information and important assets of the organization in all its forms and at all stages of input, processing, storage, transportation and retrieval
- Participation in familiarizing users in organizations with their obligations and duties required to protect information systems and information networks
- Analyzes threats, assesses vulnerabilities of systems and deploys countermeasures
- Knowledge of the importance of information security in e-government
- Applying methods and practices related to cybersecurity based on legal and ethical principles in the kingdom of Saudi Arabia
- Familiarity with the latest topics in the field of cybersecurity
| Training class | Course name | Training class | Course name |
|---|---|---|---|
| Chapter One: the first level | Concepts of operating systems | Chapter Three: the first level | Network defense |
| Computer applications | Principles of databases | ||
| English language-1 | Cyber threats | ||
| Chapter One: the second level | Networking basics | Chapter Three: the second level | Components of information technology systems |
| Operating systems | English language-3 | ||
| English Language-2 | Programming web pages-2 | ||
| Islamic studies | Chapter Four: the first level | Principles of design in cybersecurity | |
| Chapter Two: the first level | The basics of cyber security | Fundamentals of cloud computing | |
| Basics of computer programming | Qualification for professional certificates | ||
| Computer mathematics | Chapter IV: the second level | Policies, legislation, ethics and compliance | |
| Chapter Two: the second level | Advanced programming | Chapter V | Basics of cryptography |
| Cyber risk analysis | Project | ||
| Programming web pages-1 | Cooperative training 2,1 |
The graduate of this program is awarded a diploma with a specialization in cybersecurity diploma and is expected to work in areas related to computer operations and cybersecurity such as:
* Assistant Information Security Manager
* Information security coordinator
* Information security manager
* Cyber security specialist
* Cybersecurity analyst
* Cyber security supervisor
* Assistant cyber investigator
* Ethical hacker
* Cyber security trainer and other work related to cyber security