0% found this document useful (0 votes)
11 views4 pages

Get Resource File

The document outlines a Cyber Security program aimed at graduates from Computer Engineering, Communications Engineering, and Computer Science. It details the admission process, prerequisites, selection phases, delivery approach, and expected student deliverables, including certifications. The program prepares students for roles such as Penetration Testers and Cyber Incident Responders, with a structured curriculum covering fundamental and core courses.

Uploaded by

begadhabib0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

Get Resource File

The document outlines a Cyber Security program aimed at graduates from Computer Engineering, Communications Engineering, and Computer Science. It details the admission process, prerequisites, selection phases, delivery approach, and expected student deliverables, including certifications. The program prepares students for roles such as Penetration Testers and Cyber Incident Responders, with a structured curriculum covering fundamental and core courses.

Uploaded by

begadhabib0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Security

People Develop Countries… We Develop P.E.O.P.L.E.


Program Admission Arrangements
Who May Apply?
Graduates of:
• Computer Engineering,
• Communications Engineering
• Computer Science

Prerequisites
These topics will be discussed with you in the interviews (Resources applicants can visit or study before interview)
• Introduction to computer networks
https://maharatech.gov.eg/course/view.php?id=37
• Introduction to cybersecurity
• https://maharatech.gov.eg/mod/page/view.php?id=14058
• Vmware Foundation
https://maharatech.gov.eg/course/index.php?categoryid=228
• ITI values that could be found here: https://iti.gov.eg/about-us

Selection Process
• Phase 1: IQ and Problem-Solving exam | English exam
• Phase 2: Technical Exam
Computer-based technical exam in the field of your interest
• Phase 3: Technical Interview
Those applicants would be discussing with the interviewing panel their pre-work -“Before You Apply”- in a one-to-one interview
• Phase 4: Interpersonal Skills Interview
Those how pass phase 3 will be promoted to this interview

Delivery Approach
• 75% face to face Learning| 25 % Online
• Common Hardware
• Common Software

Student deliverables
• Each student must deliver an international certficates based on his track.
Cyber Security

Graduates Job Profiles


Certifications
• ELearnSecurity eWPT
• Penetration Testers
• ELearnSecurity eMAPT
Can be considered ethical hackers, as they try to break into computers and networks in order to
• ELearnSecurity EciR
find potential security breaches. Penetration Testers duties include running tests, writing reports
about their findings, designing new tests, and running security audits.

• Cyber Incident Responder


His main responsibility is to respond to security disruptions, threats, and incidents. He/she works on
investigating and analyzing different logs, traffics and devices using a suite of forensic tools and
analysis techniques. Incident responder works also to identify the damage, put remediation and eWPT Certification
containment plan and advice with recommendations to improve existing controls. eLearn Security Web
application Penetration Tester

Industry/Academy Stakeholders
• Kaspersky eMAPT Certification
• Palo Alto eLearn Security Mobile
• ELearnSecurity Application Penetration Tester
• Eccouncil
• Cisco
ElearnSecurity Certified
Targeted Outcome Incident Responder (ECIR)
• Security companies, such as; Zinad, Fixed Solution, Inovasys , CyShield,
Security Meter
• Communication Mobile companies, such as; WE, Vodafone, _VOIS, Etisalat
Misr, Orange
• Fintech Services Providers, such as; Fawry, Aman, Bee, PayMob, MaxAB
• Banks, such as; National Bank of Egypt, Bank Misr, Alex Bank
Cyber Security
1506 Hours
Program Content Structure
Fundamental courses Core Courses
Database Fundamentals Ethical Hacking and Security Assessment
Introduction to Programming © Metasploit Essentials
Operating Systems Fundamentals Firewalls Technologies
Cisco Internetworking Incident Handling
Cisco Network Associate Introduction to Python Programming
Microsoft Windows Active Directory Web Penetration Testing
Microsoft Windows Infrastructure Active Directory pentesting (Windows Security)
Red Hat System Administration I Introduction to bug hunting
Red Hat System Administration II Freelancing Basics Soft Skills
Client-Side Technologies Fundamentals Malware Analysis and Reverse Engineering 6%
Bash Shell Script Computer and Network Forensics
Introduction to Generative AI and prompt ITIL Foundation Core
engineering Mobile Penetration Testing courses
Risk Assessment and Compliance 55%
Soft Skills Courses Introduction to PHP Programming
Communication Essentials for Professionals Operational Technology (OT) Security Fundament
High Impact Presentations Cyber Threat Hunting and threat intelligence al Courses
Job Seeking Skills 39%
Professional Demeanor (Workshop)

You might also like