Skip to content
Home
About Us
Services
Web Intelligence
Forensics and Investigation
Ciso as a service
GRC Compliance
Security Consulting
Insider Threat
Technology Consulting
Email Protection
Firewalls & Malware Protection
Ransomware Protection
360 Cyber Defense
Tech Equipment Exports
Penetration Testing
Applicative Penetration Testing
Infrastructure Penetration Testing
IoT Penetration Testing
Mobile Applications Penetration Testing
Cloud Systems Penetration Testing
GRC
ISO27001
SOC2
PCI-DSS
GDPR
HIPAA
ISO27799
The National Cyber Security Framework (NCSF) – Israel
The Information Security Standards for the Capital Market (ISSCM) – Israel
The Information Security Standards for Securities (ISSS) – Israel
Lead Auditor
Surveillance
Management
Certificates
Blog
Contact
Cyber College
Home
About Us
Services
Web Intelligence
Forensics and Investigation
Ciso as a service
GRC Compliance
Security Consulting
Insider Threat
Technology Consulting
Email Protection
Firewalls & Malware Protection
Ransomware Protection
360 Cyber Defense
Tech Equipment Exports
Penetration Testing
Applicative Penetration Testing
Infrastructure Penetration Testing
IoT Penetration Testing
Mobile Applications Penetration Testing
Cloud Systems Penetration Testing
GRC
ISO27001
SOC2
PCI-DSS
GDPR
HIPAA
ISO27799
The National Cyber Security Framework (NCSF) – Israel
The Information Security Standards for the Capital Market (ISSCM) – Israel
The Information Security Standards for Securities (ISSS) – Israel
Lead Auditor
Surveillance
Management
Certificates
Blog
Contact
Cyber College
CYBER
The training anchor network and Shia-Syber College
We invite you to join the course
Implements cyber protection
A certificate from the Ministry of Labor will be awarded to course graduates
Course Plan - Implements Cyber Defense
Introduction to Information Security and Cyber Defense
Information security and risk management standards
Computer structure + fundamentals of operating systems
Basics of computer communication - A + B
Access protection in communication and internet
Differentiation and separation of communication networks
Aspects of information security in communication equipment (hardening) and information security
Encryption and authentication
Access control
Aspects of information security in operating systems and server hardening
Information security aspects in databases
Malware and anomaly detection
Information leaked
Management and registration of information security events (audit)
Handling information security incidents
Cloud computing, hosting services, virtualization
Transferring information from/to the organization
Business Continuity (BCP/DRP)
Applied security
Resilience testing methodology (infrastructure and application)
Law and ethics
physical security
The Zoom course
The course is supervised and supervised by an information and cyber security company
You are given experience and integration in practical work
under an information and cyber security company
Skip to content
Open toolbar
Accessibility Tools
Accessibility Tools
Increase Text
Increase Text
Decrease Text
Decrease Text
Grayscale
Grayscale
High Contrast
High Contrast
Negative Contrast
Negative Contrast
Light Background
Light Background
Links Underline
Links Underline
Readable Font
Readable Font
Reset
Reset