أمن نظم معلومات - Information Systems Security IS324T
To understand how to manage an information security program, you must understand the basic principles. These principles are the building blocks, or primitives, to being able to determine why informati
-
-
Chapter 1: Introduction to Information Security
-
Chapter 2: The Need for Security
-
Chapter 3 Legal, Ethical, and Professional Issues in Information Security
-
Chapter 5 Risk Management
-
Chapter 6: Security Technology: Access Controls
-
Chapter 7 Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
-
Chapter 8: Cryptography
- Chapter 9: Cloud and IOT Security
-
Labs 2024
- Lab 1: Phishing Attack 28:44
- Lab 2: Web Browsing Security - Part 1 21:36
- Lab 2: Web Browsing Security - Part 2 00:00
- Lab3: Autopsy Tool 24:30
- Lab 7: Backup and Recovery and File Integrity Monitoring -Part 1 22:24
- Lab 7: Backup and Recovery and File Integrity Monitoring - Part 2 11:49
- Lab 5: Footprinting, Scanning - Part 1 21:14
- Lab 5: Footprinting, Scanning - Part 2 22:37
- Lab 6: Malware Defense - Part 1 18:22
- Lab 6: Malware Defense - Part 2 15:09
- Lab 7 - Revision 00:00
- Lab 8 - Part 1 23:57
- Lab 8 - Part 2 10:53
- Tutorials
-
Labs
- Lab 1 Solution 20:46
- Lab 1 : Clamwin Antivirus Tool
- Lab 2: Windows Data Backup and Recovery 11:23
- Lab 3 solution 16:21
- Lab 3 Screenshot
- Lab 4 Solution 27:02
- Lab 4 Solution Screenshot
- Lab 4 - 3.10D Steps 11:33
- Lab 4- 3.10E- TrueCrypt 05:04
- Project Explanation 03:32
- Lab 3.1 - Footprinting 31:12
- Lab 3.2 Port Scanning 16:41
- Lab 3.4B Screenshot File
- Lab 3.4B Vulnerability Identification 13:22
- Lab 3.22B: Malware Prevention and Detection with Malwarebyte 10:30
- Tutorial 8: 3.4 Lab 05:10
- Lab 3.22A : Malware Prevention and Detection with Spybot 16:11
-
Cisco Course - Introduction to Cybersecurity
-
Revision and Review Questions Solution
-
Homework
- CBA Calculation Exercise File
- CBA Calculation Exercise 10:35
- Tutorial Solution File
- Tutorial Solution (CRYPTOGRAPHY) 11:56
- Tutorial 6 Solution 03:46
- Tutorial 9 Solution File
- Tutorial 9 Solution 07:54
- Assignment 3 Solution 05:54
- Assignment 1 Solution File
- Assignment 1 Solution 04:52
- Chapter 5 Assignment Solution File
- Chapter 5 Assignment Solution 05:36
- Chapter 8 Assignment Solution File
- Assignment 1 Solution (Risk Management) 20:03
- Assignment 1 Solution File (حل السؤال الاخير بعد تعديل السؤال من دكتورتكم)
- Tutorial 2 Solution - Encryption 06:09
- Assignment 2 Solution
-
Exams
-
Chapter 1: Introduction to Information Security
- To understand how to manage an information security program, you must understand the basic principles. These principles are the building blocks, or primitives, to being able to determine why information assets need protection.
-
Eng. Enaam Ahmed Mohammed holds a B.sc of Computer Engineering (2004) from Cairo University - Egypt and Master degree in IT (2007) from SIKKIM MANIPAL University - India. She has teaching experience for more than 15 years and has professional Experience in the following fields: • Oracle 9i – Certified from oracle (OCA) • Visual Studio .Net ( C
) • C, C++ • Visual Basic 6 • PHP • JavaScript • HTML, CSS She worked as a Teacher at many Universities and educational centers from 2005 - 2010 such as UMS University, Al Wataneia University, NCC Eduction center and APTECH Worldwide center. From the beginning of 2010 till now she had taught many courses for different Saudi Arabia Universities such as PNU, KSU, PSU, Shaqra University and Imamu University. She has experience for teaching many courses as below: • Database fundamentals. • Software Engineering. • Networking and Network Protocols. • Information security. • Programming language (Java, C++, C
, Python) • Operating system. • Multi-tier and Web development. • System Analysis and design. • Data warehouse and Data Mining • Object Oriented design • Support and Decision Making Systems • Data Structure -
Student feedback
4.00
350 SAR -150SAR
Original Price 500 SAR - Hurry up!
Lectures
101 Videos
Duration
24:09:00
Material
32 Files
Assignments
Yes, Completely
Labs
Yes, Completely
Project
No
Certificate
Not Applicable
Reviews (3)
Real reviews from real students.
الشرح متوسط\ التجاوب قليل والاسلوب مش ولا بد\ الحلول العملية لازم نراجع بعدها
شرحها واضح وبسيط ماتعقد لك الامور
ماندمت والله ثالث مره اشترك معها واجيب قريد حلو والشرح واضح وتعطي المختصر الله يسعدها 👍🤍