0% found this document useful (0 votes)
17 views4 pages

Get Resource File

Uploaded by

abdowaheed765
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

Get Resource File

Uploaded by

abdowaheed765
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Security

People Develop Countries… We Develop P.E.O.P.L.E.


Program Admission Arrangements
Who May Apply?
Graduates of:
• Computer Engineering,
• Communications Engineering
• Computer Science

Prerequisites
These topics will be discussed with you in the interviews (Resources applicants can visit or study before interview)
• Introduction to computer networks
https://maharatech.gov.eg/course/view.php?id=37
• Introduction to cybersecurity
• https://maharatech.gov.eg/mod/page/view.php?id=14058
• Vmware Foundation
https://maharatech.gov.eg/course/index.php?categoryid=228
• ITI values that could be found here: http:// www.iti.gov.eg/Site/AboutUs

Selection Process
• Phase 1: IQ and Problem-Solving exam | English exam
• Phase 2: Technical Exam
Computer-based technical exam in the field of your interest
• Phase 3: Technical Interview
Those applicants would be discussing with the interviewing panel their pre-work -“Before You Apply”- in a one-to-one interview
• Phase 4: Interpersonal Skills Interview
Those how pass phase 3 will be promoted to this interview

Delivery Approach
• 75% face to face Learning| 25 % Online
• Common Hardware
• Common Software

Student deliverables
• Each student must deliver an international certficates based on his track.
Cyber Security

Graduates Job Profiles


Certifications
• ELearnSecurity eWPT
• Penetration Testers
• ELearnSecurity eMAPT
Can be considered ethical hackers, as they try to break into computers and networks in order to
• ELearnSecurity EciR
find potential security breaches. Penetration Testers duties include running tests, writing reports
about their findings, designing new tests, and running security audits.

• Cyber Incident Responder


His main responsibility is to respond to security disruptions, threats, and incidents. He/she works on
investigating and analyzing different logs, traffics and devices using a suite of forensic tools and
analysis techniques. Incident responder works also to identify the damage, put remediation and eWPT Certification
containment plan and advice with recommendations to improve existing controls. eLearn Security Web
application Penetration Tester

Industry/Academy Stakeholders
• Kaspersky eMAPT Certification
• Palo Alto eLearn Security Mobile
• ELearnSecurity Application Penetration Tester
• Eccouncil
• Cisco
ElearnSecurity Certified
Targeted Outcome Incident Responder (ECIR)
• Security companies, such as; Zinad, Fixed Solution, Inovasys , CyShield,
Security Meter
• Communication Mobile companies, such as; WE, Vodafone, _VOIS, Etisalat
Misr, Orange
• Fintech Services Providers, such as; Fawry, Aman, Bee, PayMob, MaxAB
• Banks, such as; National Bank of Egypt, Bank Misr, Alex Bank
Cyber Security
1503 Hours
Program Content Structure
Fundamental courses Core Courses
Track Orientation Workshop Cisco Internetworking
Database Fundamentals Cisco Network Associate
Operating Systems Fundamentals Microsoft Windows Active Directory
Introduction to Programming Microsoft Windows Infrastructure
Client-Side Technologies Fundamentals Red Hat System Administration I
Introduction to PHP Programming Red Hat System Administration II
Introduction to Python Programming Ethical Hacking and Security Assessment
Firewalls Technologies
Incident Handling Fundament Soft Skills
Computer and Network Forensics al Courses 5%
Soft Skills Courses Introduction to bug hunting 11%
Professional Demeanor (Workshop) Malware Analysis and Reverse Engineering
Communication Essentials for Professionals Metasploit Essentials
High Impact Presentations Mobile Penetration Testing
Job Seeking Skills Risk Assessment and Compliance
Web Penetration Testing
Windows Security Core
ITIL Foundation courses
Freelancing Basics 84%

You might also like