Get Resource File
Get Resource File
Prerequisites
These topics will be discussed with you in the interviews (Resources applicants can visit or study before interview)
• Introduction to computer networks
https://maharatech.gov.eg/course/view.php?id=37
• Introduction to cybersecurity
• https://maharatech.gov.eg/mod/page/view.php?id=14058
• Vmware Foundation
https://maharatech.gov.eg/course/index.php?categoryid=228
• ITI values that could be found here: http:// www.iti.gov.eg/Site/AboutUs
Selection Process
• Phase 1: IQ and Problem-Solving exam | English exam
• Phase 2: Technical Exam
Computer-based technical exam in the field of your interest
• Phase 3: Technical Interview
Those applicants would be discussing with the interviewing panel their pre-work -“Before You Apply”- in a one-to-one interview
• Phase 4: Interpersonal Skills Interview
Those how pass phase 3 will be promoted to this interview
Delivery Approach
• 75% face to face Learning| 25 % Online
• Common Hardware
• Common Software
Student deliverables
• Each student must deliver an international certficates based on his track.
Cyber Security
Industry/Academy Stakeholders
• Kaspersky eMAPT Certification
• Palo Alto eLearn Security Mobile
• ELearnSecurity Application Penetration Tester
• Eccouncil
• Cisco
ElearnSecurity Certified
Targeted Outcome Incident Responder (ECIR)
• Security companies, such as; Zinad, Fixed Solution, Inovasys , CyShield,
Security Meter
• Communication Mobile companies, such as; WE, Vodafone, _VOIS, Etisalat
Misr, Orange
• Fintech Services Providers, such as; Fawry, Aman, Bee, PayMob, MaxAB
• Banks, such as; National Bank of Egypt, Bank Misr, Alex Bank
Cyber Security
1503 Hours
Program Content Structure
Fundamental courses Core Courses
Track Orientation Workshop Cisco Internetworking
Database Fundamentals Cisco Network Associate
Operating Systems Fundamentals Microsoft Windows Active Directory
Introduction to Programming Microsoft Windows Infrastructure
Client-Side Technologies Fundamentals Red Hat System Administration I
Introduction to PHP Programming Red Hat System Administration II
Introduction to Python Programming Ethical Hacking and Security Assessment
Firewalls Technologies
Incident Handling Fundament Soft Skills
Computer and Network Forensics al Courses 5%
Soft Skills Courses Introduction to bug hunting 11%
Professional Demeanor (Workshop) Malware Analysis and Reverse Engineering
Communication Essentials for Professionals Metasploit Essentials
High Impact Presentations Mobile Penetration Testing
Job Seeking Skills Risk Assessment and Compliance
Web Penetration Testing
Windows Security Core
ITIL Foundation courses
Freelancing Basics 84%