windsor university logo

Cybersecurity For Everyone

Trusted Knowledge

Reliability

soft copy certificate

9.99$

Anytime, Anywhere

Totally Online

Six Sessions

One Graduation Project

All Skill Level

24H Duration

English Language

Course Overview

This course provides foundations for everyone interested in raising their awareness about cybersecurity domain to be able play safe with his digital asset. The program provides internet foundations, trends of threats, threat actors and their modifications. In this course, we offer basic skillsets that enable attendees to avoid being hacked by sharing best practice and foundation to avoid got trapped in social engineering phishing or attacked via viruses and or malware.

Why is it essential to learn Human Cybersecurity?

In fast growing Digital world where cybercrime is evolving , it becomes a must that every person , Parents , employees have foundation of cybersecurity to avoid being Hacked.

At this training program, you will learn how to:

  • Describe INTERNET and Its evolution.
  • List different types Threats , Threat Actors and Threat Trend
  • Understand how mitigate risks on own/corporate digital assets.
  • Behave when you have a hacking risk.

Who will attend this program:

  • Anyone who would like to understnd cyber security risks and mitigation
  • K12 studnets who would like to be specilized in Cynersecurity domains
  • employee and Individuals who should know how to protect their digital Asset

References:

  • Information technology – Security techniques – Information security management systems -Overview and vocabulary [ISO/IEC 27000:2018, 5 ed.]
  • Classifying Cyber Events: A Proposed Taxonomy (By Charles Harry, PhD, and Nancy Gallagher, PhD CISSM Working Paper February 2018)
  • A Brief History of the Internet-TV Books (1998) (By Stephen Segaller)

Meet your Instructor:

Dr. Hesham Ali – With over 27 years of global telecom experience and expertise in cybersecurity, AI, and digital transformation, Dr. Ali bridges academic knowledge with real-world application. Click here to learn more about him.


Program Outline:

Part One

  • Introduction

Part Two

  • Internet Evolution

Part Three

  • Threat Actors and Their Mitigation

Part Four

  • Hacking Process

Part Five

  • Play Safe

Part Six

  • Cybersecurity Career and Certificates

Part Seven

  • Cyberlaw

Part Eight

  • Security Standards

Are you Ready to advance your career ?

For more inquiries contact : [email protected]

Cybersecurity For Everyone

Trusted Knowledge

Reliability

soft copy certificate

9.99$

Anytime, Anywhere

Totally Online

Six Sessions

One Graduation Project

All Skill Level

24H Duration

English Language

Course Overview

This course provides foundations for everyone interested in raising their awareness about cybersecurity domain to be able play safe with his digital asset. The program provides internet foundations, trends of threats, threat actors and their modifications. In this course, we offer basic skillsets that enable attendees to avoid being hacked by sharing best practice and foundation to avoid got trapped in social engineering phishing or attacked via viruses and or malware.

Why is it essential to learn Human Cybersecurity?

In fast growing Digital world where cybercrime is evolving , it becomes a must that every person , Parents , employees have foundation of cybersecurity to avoid being Hacked.

At this training program, you will learn how to:

  • Describe INTERNET and Its evolution.
  • List different types Threats , Threat Actors and Threat Trend
  • Understand how mitigate risks on own/corporate digital assets.
  • Behave when you have a hacking risk.

Who will attend this program:

  • Anyone who would like to understnd cyber security risks and mitigation
  • K12 studnets who would like to be specilized in Cynersecurity domains
  • employee and Individuals who should know how to protect their digital Asset

References:

  • Information technology – Security techniques – Information security management systems -Overview and vocabulary [ISO/IEC 27000:2018, 5 ed.]
  • Classifying Cyber Events: A Proposed Taxonomy (By Charles Harry, PhD, and Nancy Gallagher, PhD CISSM Working Paper February 2018)
  • A Brief History of the Internet-TV Books (1998) (By Stephen Segaller)

Meet your Instructor:

Dr. Hesham Ali – With over 27 years of global telecom experience and expertise in cybersecurity, AI, and digital transformation, Dr. Ali bridges academic knowledge with real-world application. Click here
to learn more about him.

Program Outline:

Part One

  • Introduction

Part Two

  • Internet Evolution

Part Three

  • Threat Actors and Their Mitigation

Part Four

  • Hacking Process

Part Five

  • Play Safe

Part Six

  • Cybersecurity Career and Certificates

Part Seven

  • Cyberlaw

Part Eight

  • Security Standards

Are you Ready to advance your career ?

For more inquiries contact : [email protected]

Cybersecurity For Everyone

Trusted Knowledge

Reliability

soft copy certificate

9.99$

Anytime, Anywhere

Totally Online

Six Sessions

All Skill Level

English Language

24H Duration

One Graduation Project

Course Overview

This course provides foundations for everyone interested in raising his awareness about cybersecurity domain to be able play safe with their digital asset. The program provides internet foundations, trends of threats, threat actors and their modifications. In this course, we offer basic skillsets that enable attendees to avoid being hacked by sharing best practice and foundation to avoid got trapped in social engineering phishing or attacked via viruses and or malware.

Why is it essential to learn Human Cybersecurity?

In fast growing Digital world where cybercrime is evolving , it becomes a must that every person , Parents , employees have foundation of cybersecurity to avoid being Hacked.

At this training program, you will learn how to:

  • Describe INTERNET and Its evolution.
  • List different types Threats , Threat Actors and Threat Trend
  • Understand how mitigate risks on own/corporate digital assets.
  • Behave when you have a hacking risk.

Who will attend this program:

  • Anyone who would like to understnd cyber security risks and mitigation
  • K12 studnets who would like to be specilized in Cynersecurity domains
  • employee and Individuals who should know how to protect their digital Asset

References:

  • Information technology – Security techniques – Information security management systems -Overview and vocabulary [ISO/IEC 27000:2018, 5 ed.]
  • Classifying Cyber Events: A Proposed Taxonomy (By Charles Harry, PhD, and Nancy Gallagher, PhD CISSM Working Paper February 2018)
  • A Brief History of the Internet-TV Books (1998) (By Stephen Segaller)th

Meet your Instructor:

Dr. Hesham Ali – With over 27 years of global telecom experience and expertise in cybersecurity, AI, and digital transformation, Dr. Ali bridges academic knowledge with real-world application.

Click here to learn more about him

Program Outline:

Part One

  • Introduction

Part Two

  • Internet Evolution

Part Three

  • Threat Actors and Their Mitigation

Part Four

  • Hacking Process

Part Five

  • Play Safe

Part Six

  • Cybersecurity Career and Certificates

Part Seven

  • Cyberlaw

Part Eight

  • Security Standards

Are you Ready to advance your career ?

For more inquiries contact : [email protected]