Black Gold Higher Training Institute – معهد الذهب الاسود العالي للتدريب

Cyber security diploma

Diplomas

Black Gold

Diploma Cyber security

Cyber security diploma

The cybersecurity diploma is designed in accordance with the needs of the local labor market for this specialty, training in this specialty is carried out in nine training classes and training is carried out in this program on specialized skills in: the field of cybersecurity: "algorithms and logic”, information and communication technologies", "encryption basics”," operating systems " and " Internet of Things security And cloud computing”, "operating systems (2)”, ” Fundamentals of cybersecurity", " internet and computer networks, and an introduction to digital forensics and selected topics in cybersecurity. An introduction to network security, cybercrime and its risks, advanced computer network security, artificial intelligence technology, e-governance security, ethical hacking and protection methods.
* Scientific degree
The intermediate diploma is classified at the fifth level of the national framework of qualifications.
* Duration of training
Two and a half years
* Target group
Men and women
* Available branches
Dammam branches in the eastern region
* Mandatory requirements
3 and a half months cooperative training

This program aims to introduce the trainee to the basics and concepts of cybersecurity, assess the level of data protection, methods, procedures and standards for the implementation of cybersecurity work, and obtain the sixth level of the national professional qualifications system, where the cybersecurity diploma is designed in accordance with the needs of the local labor market for this specialty, and training in this specialty is:
* Participates in the implementation of continuous monitoring of computers and networks and the provision of appropriate security solutions
* Participates in conducting criminal investigation of cyber incidents and assisting in data recovery
* Learn about the concept of cloud computing and the Internet of things and ways to secure them
* Participates in the protection against cybercrimes and the implementation of ways to address them
* Acquires knowledge of the procedures used to overcome and deal with threats and risks
* Can work effectively in the security risk management and Response Team
* Acquires the necessary basic knowledge related to the components of computer networks and software
* Applies encryption to achieve information security over the internet and networks
* Recognizes the different applications of the use of Information Technology

  • This program is specially designed so that the trainee and the trainee are able to competently perform the following works:
    - Definition of logic based on programming science
    - Write basic code in Python language
    - Web page design
    - Familiarity with specialized terminology related to the field of cybersecurity
    - Participate in the protection of information and important assets of the organization in all its forms and at all stages of input, processing, storage, transportation and retrieval
    - Participation in familiarizing users in organizations with their obligations and duties required to protect information systems and information networks
    - Analyzes threats, assesses vulnerabilities of systems and deploys countermeasures
    - Knowledge of the importance of information security in e-government
    - Applying methods and practices related to cybersecurity based on legal and ethical principles in the kingdom of Saudi Arabia
    - Familiarity with the latest topics in the field of cybersecurity
Training classCourse nameTraining classCourse name
Chapter One: the first levelConcepts of operating systemsChapter Three: the first levelNetwork defense
Computer applicationsPrinciples of databases
English language-1Cyber threats
Chapter One: the second levelNetworking basicsChapter Three: the second levelComponents of information technology systems
Operating systemsEnglish language-3
English Language-2Programming web pages-2
Islamic studiesChapter Four: the first levelPrinciples of design in cybersecurity
  
Chapter Two: the first levelThe basics of cyber security Fundamentals of cloud computing
Basics of computer programmingQualification for professional certificates
Computer mathematicsChapter IV: the second levelPolicies, legislation, ethics and compliance
  
Chapter Two: the second levelAdvanced programmingChapter VBasics of cryptography
Cyber risk analysisProject
Programming web pages-1Cooperative training 2,1

The graduate of this program is awarded a diploma with a specialization in cybersecurity diploma and is expected to work in areas related to computer operations and cybersecurity such as:
* Assistant Information Security Manager
* Information security coordinator
* Information security manager
* Cyber security specialist
* Cybersecurity analyst
* Cyber security supervisor
* Assistant cyber investigator
* Ethical hacker
* Cyber security trainer and other work related to cyber security