
Online or onsite, instructor-led live Cyber Security (also known as Cybersecurity, Internet Security or IT Security) training courses demonstrate through interactive discussion and hands-on practice how to understand, plan and implement an Cybersecurity strategy within their organization. Special focus is given to setting up the proper systems and procedures needed to detect and mitigate threats. Internet Security courses are available as interactive trainings and a number of them include a testing and certification component.
Cybersecurity training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Saudi Arabia onsite live Cyber Security trainings can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider
Testimonials
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Andreas Rhein
Course: Certified Information System Security Professional (CISSP) CBK Review
I really liked the Crypto part
Carlos Ibarra
Course: Avanzado Java, JEE y Seguridad de Aplicaciones Web
I genuinely enjoyed the real examples of the trainer.
Joana Gomes
Course: Compliance and the Management of Compliance Risk
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Course: CISM - Certified Information Security Manager
I liked the trainer was passionate about the subject and very convincing too.
Diana Vladulescu
Course: Secure Web Application Development and Testing
Really liked the trainer's deep knowledge, real examples, the fact that he is also a practitioner.
18 Wojskowy Oddział Gospodarczy
Course: CRISC - Certified in Risk and Information Systems Control
I mostly liked the knowledge,.
18 Wojskowy Oddział Gospodarczy
Course: CRISC - Certified in Risk and Information Systems Control
I mostly was benefit from the hands-on examples.
Trading Point of Financial Instruments (XM
Course: Secure coding in PHP
The subject of the course was very interesting and gave us many ideas.
Anastasios Manios
Course: Secure coding in PHP
I generally enjoyed the interaction.
Andreas Hadjidemetris
Course: Secure coding in PHP
Most of the known subjects related with secure coding covered and explained well Nice presentations Easy to watch, not boring.
Trading Point of Financial Instruments (XM
Course: Secure coding in PHP
The way and its approach on each different section.
Trading Point of Financial Instruments (XM
Course: Secure coding in PHP
The trainer has very good communication skills and can easily get & hold audience's attention. He can explain the matter in a very easy and detailed way so that each person can understand it.
Trading Point of Financial Instruments (XM
Course: Secure coding in PHP
All topics were well covered and presented with a lot of examples. Ahmed was very efficient and managed to keep us focused and attracted at all times.
Kostas Bastas
Course: Secure coding in PHP
Everything! I didn't have any experience with Secure Coding and the whole training was interesting and helpful.
Trading Point of Financial Instruments (XM
Course: Secure coding in PHP
I genuinely enjoyed the real life examples.
Marios Prokopiou
Course: Secure coding in PHP
I loved the delivery from the trainer's side. Very enthusiastic and made the training really pleasant and interesting. Also, very clear about the content he was delivering.
Trading Point of Financial Instruments (XM
Course: Secure coding in PHP
I genuinely liked the real world scenarios.
Michail Alvanos
Course: Java and Web Application Security
I genuinely liked the organization.
Panagiotis Foutros
Course: Java and Web Application Security
Very good knowledge and character.
Constantinos Michael
Course: Java and Web Application Security
I was benefit from the exercises (SQL injection, XSS, CRSF. .).
David Lemoine - Statistical Solutions
Course: .NET, C# and ASP.NET Security Development
I liked the blend of theory/fundamentals/principles and activity/interactive-web-apps. Excellent mix.
Statistical Solutions
Course: .NET, C# and ASP.NET Security Development
Good pacing, by switching between lectures and activities the trainer was able to hold my attention, good variety of topics covered, trainer was very knowledgeable and able to adapt the subject matter to what was required.
Statistical Solutions
Course: .NET, C# and ASP.NET Security Development
I genuinely was benefit from the knowledge.
Luis Miguel Lara - Blue Indico Investments, S.L.U.
Course: CCSK - Certificate of Cloud Security Knowledge - Plus
The way in which he explained to us during the 2 days and his way of being, which makes learning enjoyable.
Víctor Miguel Prado Saster - Blue Indico Investments, S.L.U.
Course: CCSK - Certificate of Cloud Security Knowledge - Plus
I really liked the teacher's knowledge.
Ariany Auxiliadora Pulido Gonzalez - Blue Indico Investments, S.L.U.
Course: CCSK - Certificate of Cloud Security Knowledge - Plus
The trainer was very nice and available. I appreciated his knowledge, skills and preparation about the subject. Furthermore, he provided us extra content about IoT, very interesting.
Giuseppe Fiorita - Blue Indico Investments, S.L.U.
Course: CCSK - Certificate of Cloud Security Knowledge - Plus
Ahmed was always trying to keep attention of us.
Alberto Brezmes - Blue Indico Investments, S.L.U.
Course: CCSK - Certificate of Cloud Security Knowledge - Plus
I enjoyed the trainer methods to attract our attention.
Antonio Osuna Sánchez - Blue Indico Investments, S.L.U.
Course: CCSK - Certificate of Cloud Security Knowledge - Plus
Trainers command in his field
Adnan ul Husnain Hashmi - TDM GROUP
Course: Web Application Security
The hands-on labs were excellent.
Dr. Farhan Hassan Khan - TDM GROUP
Course: Web Application Security
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course: PKI: Implement and Manage
Very knowledgeable and approachable trainer.
Trainocate (S) Pte. Ltd.
Course: PKI: Implement and Manage
Dynamic; exactly the right level of info.
ZiuZ Medical B.V.
Course: HIPAA Compliance for Developers
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville
Course: IoT Security Architecture
clear voice of the trainer.
ZiuZ Medical B.V.
Course: HIPAA Compliance for Developers
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course: HIPAA Compliance for Developers
It was quite informal.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Trainer covered a lot of ground over a relatively short period.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
I enjoyed the practical exercises. Hands-on is the best way to learn.
W L Gore & Associates (UK) Ltd
Course: PKI: Implement and Manage
I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
Richard was very knowledgeable in his field.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
The practical exercises
Corvil
Course: C/C++ Secure Coding
The hands-on approach to explain the concepts.
Corvil
Course: C/C++ Secure Coding
It was pitched at the right level - challenging but understandable & informative.
Louise Voisey - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Exercise and be able to experiment.
Corvil
Course: C/C++ Secure Coding
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course: CGEIT – Certified in the Governance of Enterprise IT
a lot of good documents provided. It helps us building up our knowledge.
MOL Information Technology Asia Ltd.
Course: CGEIT – Certified in the Governance of Enterprise IT
The delivery
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
Depth and breadth of the course. Trainer was excellent also.
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
Cyber Security Subcategories in Saudi Arabia
Cybersecurity Course Outlines in Saudi Arabia
This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
By the end of this training, participants will be able to:
- Implement cybersecurity in automotive systems.
- Choose the most suitable technologies, tools, and approaches.
Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange
To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification
Target Audience:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
organization or who, for other reasons, wish to achieve and demonstrate a broad
understanding of the law, including the EU General Data Protection Regulation (GDPR) and
the UK Data Protection Bill and their practical application. It is recognized that those with
overall responsibility for data protection within an organization will need to develop a detailed
understanding of the law"
By the end of this training, participants will be able to:
- Assess their organization's security risk, as it relates to computer server rooms.
- Set up control and monitoring systems to restrict physical access to infrastructure.
- Design access policies for different members.
- Effectively communicate security policies with team members.
In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.
By the end of this training, participants will be able to:
- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.
Audience
- Network engineers
- Cyber security professionals
- System architects
- IT managers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training (remote), participants will learn the fundamentals of HIPAA as they step through a series of hands-on live-lab exercises.
By the end of this training, participants will be able to:
- Understand the basics of HIPAA
- Develop health applications that are compliant with HIPAA
- Use developer tools for HIPAA compliance
Audience
- Developers
- Product Managers
- Data Privacy Officers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice.
Note
- To request a customized training for this course, please contact us to arrange.
By the end of this training, participants will be able to:
- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.
By the end of this training, participants will be able to:
- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system
Audience
- Network engineers
- Developers
- System engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
By the end of this training, participants will be able to:
- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
for industry practitioners who wish to demonstrate their professional expertise and
understanding of the PCI Data Security Standard (PCI DSS).
All staff who need a working knowledge of Compliance and the Management of Risk
Format of the course
A combination of:
- Facilitated Discussions
- Slide Presentations
- Case Studies
- Examples
Course Objectives
By the end of this course, delegates will be able to:
- Understand the major facets of Compliance and the national and international efforts being made to manage the risk related to it
- Define the ways in which a company and its staff might set up a Compliance Risk Management Framework
- Detail the roles of Compliance Officer and Money Laundering Reporting Officer and how they should be integrated into a business
- Understand some other “hot spots” in Financial Crime – especially as they relate to International Business, Offshore Centres and High-Net-Worth Clients
By the end of this training, participants will be able to:
- Understand, evaluate and adopt different approaches to managing usernames and passwords.
- Setup a single login system that works across all applications used in a telecom environment.
- Use identity technology to get a clear understanding of their customers and their needs.
- Implement an authentication system that works across different platforms (laptop, mobile, etc.).
An exam voucher of US $ 760 is included in the training. (ISACA Member: US $575).
CISA Exam Material Scope:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Duration of the exam: 4 hours
Type: multiple choice test
Volume: 200 questions
List of the requirements that you must meet in order to be able to claim the CISA qualification:
- Pass the CISA exam. The CISA passing score is a mark of 450 or higher on the exam.
- Abide by the ISACA Code of Professional Ethics
- Promise to obey the CISA Continuing Professional Education Policy
- Gain at least 5 years of professional information systems auditing, control or security work experience.
- Comply with Information Systems Auditing Standards
If you’ve passed the exam and believe that you meet those requirements, then you can begin the application for certification: [here](https://www.isaca.org/credentialing/cisa/get-cisa-certified)
There is a fee of $50 for this application, and it can be paid: [on this link](http://www.isaca.org/cisapay)
There’s also a yearly fee that you must pay to maintain this certification after you’ve been granted it. The fee is $40 per annum for ISACA members, and $75 for non-members.
By the end of this training, participants will be able to:
- Install and configure Ubuntu operating system.
- Reinforce the physical security of Ubuntu Linux distribution.
- Embed encrypted server features to protect the administration system.
- Secure device interactions within the Ubuntu System.
- Recognize general security threats to Ubuntu environment and execute the proper solutions.