Course in IT Security in Middle East

Search Course Studies in IT Security in Middle East 2017

IT Security

Courses are academic classes taught by qualified instructors that are intended to enhance participant’s knowledge of a given area or training in a particular discipline. Courses vary broadly in terms of length, size, content and duration.

IT security is the protection of computer systems from damage, theft, intrusion, vandalism, or other attacks. It can include both physical protection of computer hardware and programmed protection of the software and data on a machine.

The Middle East boasts a uniquely diverse population filled with a myriad of political, cultural and religious identities. In this setting, students have the opportunity to learn first hand about historic cultures and empires based in the region.

View all Course Studies in IT Security in Middle East 2017

Read More

EC-Council Certified Courses

Zeus Consulting
Campus Full time 5 days September 2017 United Arab Emirates Dubai

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. [+]

Course Studies in IT Security in Middle East 2017. Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. EC-Council - Disaster Recovery Professional The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Who Should Attend Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. EC-Council - Certified Encryption Specialist ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others. Students will learn the basics of information theory as it applies to cryptography. Students will be introduced to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. The course also covers asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.... [-]