مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
NCA ECC Arabic Training | دورة تطبيق ضوابط الأمن السيبراني
Introduction & Strategic Foundations
Introduction to NCA ECC and Core Components (23:17)
Cybersecurity Strategy Development Control 1-1-1 (19:13)
Cybersecurity Strategy Documentation and Approval Control 1-1-1 (19:34)
Cybersecurity Strategy Alignment with National Frameworks (19:32)
Implementing the Cybersecurity Roadmap Control 1-1-2 (21:16)
Managing and Monitoring Cybersecurity Roadmap Execution Control 1-1-2 (23:25)
Periodic Review of Cybersecurity Strategy Triggers Control 1-1-3 (19:04)
Cybersecurity Strategy Update Processes and Approval Control 1-1-3 (19:59)
Continuous Improvement and Sustained Compliance 1-1-3 (18:07)
Governance & Organizational Structure
Establishing an Independent Cybersecurity Function Control 1-2-1 (18:50)
Cybersecurity Organizational Structure and Reporting Lines Control 1-2-1 (19:59)
Defining Mandate, Roles, and Responsibilities for roles - 1-2-2 & 1-4-1 (20:20)
Cybersecurity Staffing and Qualifications Control 1-2-2 & 1-4-2 (20:35)
Cybersecurity Critical roles and filling strategy that align with NCA 1-1-2 (21:49)
Leveraging the Saudi Cybersecurity Workforce Framework SCyWF 1-2-2 (18:05)
Policies, Standards & Compliance
Cybersecurity Sterring Committee 1-1-3 (19:26)
Cybersecurity Steering Committee Roles and Governance 1-2-3 (20:28)
Cybersecurity Steering Committee Reporting and Oversight 1-2-3 (18:32)
Developing Cybersecurity Policies and Documentation Control 1-3-1/3 (18:06)
20_-_Implementing_and_Approving_Cybersecurity_Policies_ar (19:13)
Developing Technical Security Standards Control 1-3-2 & 1-3-3 (23:44)
Periodic Review of Policies and Standards 1-3-4 (17:21)
Handling Regulatory Changes and Documenting Policy Updates Control 1-3 (20:19)
Risk Management
Core Cybersecurity Risk Management Methodology Control 1-5-1 (16:14)
Cybersecurity Risk Response Planning and Risk Register Maintenance Control 1-5-2 (19:57)
Practical Risk Mitigation and Continuous Monitoring Control 1-5-3 & 1-5-4 (15:32)
Risk Assessment - Control 2-5-1 (19:59)
Cybersecurity Risk Assessments for New Technologies 1-5-3-2/4 (15:51)
Managing Third-Party Cybersecurity Risks Control 1-5-3 (17:03)
Continuous Monitoring of Third-Party Cybersecurity and Risk Review 1-5-3-3/4 (17:11)
Secure Systems & Project Lifecycle
Secure Lifecycle Management in Technical Projects Control 1-6-1 (19:10)
Cybersecurity Requirements for System Acquisition and Development Control 1-6-2 (20:54)
Implementing Secure Coding Standards Control 1-6-3-1 (19:11)
Using Trusted Development Tools and Security Testing Control 1-6-3 (21:26)
Secure Configurations, Hardening, and Patching for Applications Control 1-6-3 (19:06)
Reviewing Cybersecurity in Project Management Practices 1-6-4 (18:06)
Documentation and Approval for Project Cybersecurity Compliance Control 1-6-4 (17:01)
Compliance with National & International Cybersecurity Regulations
Compliance with National Cybersecurity Regulations Control 1-7-1 (22:34)
Handling International Cybersecurity Obligations Control 1-7-1 (19:44)
Developing Compliance Documentation and Reporting Control 1-7-1 (18:55)
Internal Reviews, External Audits, and Remediation Oversight
Internal Cybersecurity Reviews and Audit Methodology Control 1-8-1 & 1-8-2 (17:09)
Independent External Cybersecurity Audits Control 1-8-2 (18:26)
Audit Reporting, Remediation, and Oversight Control 1-8-3 (19:00)
Cybersecurity in HR Processes
Cybersecurity Requirements Across Employee Lifecycle Control 1-9-1/1-9-2 (19:58)
Non-Disclosure Clauses and Contractual Obligations in HR Control 1-9-3 (19:05)
Vetting for Critical and Privileged Cybersecurity Positions 1-9-3-1/2 (20:50)
Implementing Cybersecurity Awareness from Onboarding 1-9-4-1/2 (17:40)
Enforcement and Compliance with HR Cybersecurity Policies Control 1-9-3 (16:22)
Managing Employees Access Rights - 1-9-6 (18:36)
Cybersecurity Awareness and Training Framework
Developing a Comprehensive Cybersecurity Awareness Framework Control 1-10-1 (19:01)
Implementing Multi-Channel Cybersecurity Awareness Campaigns Control 1-10-1 (21:31)
52_-_Essential_Awareness_Content_for_Common_Cyber_Threats_ar (19:38)
Specialized Cybersecurity Training for Technical Staff Control 1-10-4 (17:39)
Operational Security Training and Professional Development Control 1-10-4 (20:47)
Cybersecurity Training for Executive and Supervisory Roles 1-10-4-3 (18:15)
Securing Funding and Resources for Executive Cybersecurity Initiatives 1-10-4-3 (19:22)
Reviewing Cybersecurity Training Program Effectiveness 1-10-5 (19:41)
Adjusting and Documenting Awareness and Training Improvements 1-10-5 (17:52)
Asset Management
Effective Cybersecurity Asset Management Defining Requirements Control 2-1-1 (18:44)
Information and Technology Asset Lifecycle Management Control 2-1-2 (20:27)
Classifying, Labeling, and Handling Assets Control 2-1-3 (18:57)
Developing and Enforcing an Acceptable Use Policy Control 2-1-4 (20:02)
Implementing and Monitoring Asset Management Requirements 2-1-5 (17:39)
Periodic Review and Updates of Asset Management Policies Control 2-1-6 (19:10)
Identity & Access Management (IAM)
Developing IAM Cybersecurity Policies and Controls Control 2-2-1 (17:20)
User Authentication and Multifactor Authentication Control 2-2-2 (19:42)
Authorization Principles: Least Privilege and Segregation of Duties 2-2-3 (21:35)
Unique User IDs and Privileged Access Management PAM Control 2-2-4 (17:11)
Regular Identity and Access Reviews and Audits Control 2-2-4 (17:49)
Malware Protection
Establishing Robust Malware and Antivirus Protection Control 2-3-1 (21:09)
Management of External Storage Media Security Control 2-3-2 (16:54)
Patch Management Policy and Lifecycle Control 2-3-3 (21:57)
Centralized Time Synchronization and Infrastructure Review Control 2-3-4 (16:14)
Email Security
Defining and Implementing Email Security Requirements Control 2-4-1 (18:03)
Advanced Email Protection Against Modern Threats Control 2-4-2 (15:20)
Multifactor Authentication for Email Access Control 2-4-3-1 (19:22)
Secure Email Archiving, Backup, and Data Recovery Control 2-4-3-2 (24:14)
Implementing Email Authentication Standards SPF DKIM DMARC Control 2-4 (20:23)
Regular Review and Updates of Email Security Policies Control 2-4-4 (17:35)
Network Security
Network Security Policy Development Control 2-5-1 (20:53)
Logical and Physical Network Segmentation and Firewall Usage 2-5-2 / 2-5-3-1 (18:01)
Network Segregation for Development Environments - 2-5-3-2 (18:57)
Secure Internet Browse and Web Access Controls Control 2-5-3-3 (21:44)
Wireless Network Security and Encryption Control 2-5-3-4 (23:35)
Network Services, Ports, and Protocols Management Control 2-5-3-5 (31:42)
Intrusion Detection/Prevention Systems IDS/IPS Implementation Control 2-5-3-6 (19:45)
DNS Security and Secure Internet Channels Control 2-5-3-7 (20:46)
Protection from Advanced Persistent Threats APT on Networks Control 2-5-3-8 (21:13)
Regular Network Security Compliance Reviews and Audits Control 2-5-4 (20:42)
Mobile Device Security
Mobile Devices Security Policy and BYOD Control 2-6-1 (15:53)
Data Segregation, Encryption, and Access Management for Mobile Devices 2-6-2 (21:17)
Secure Configurations and Mobile Device Management MDM Control 2-6-3 (24:00)
Secure Data Deletion and Remote Wipe Strategies for Mobile Devices 2-6-4 (20:33)
Periodic Security Reviews and Compliance for Mobile Devices Control 2-6-5 (18:52)
Data Protection
Data Protection Policy and National Standards Control 2-7-1 (20:33)
Data Classification, Labeling, and Ownership Control 2-7-2 (20:59)
Implementing Data Privacy Measures Control 2-7-3 (19:29)
Technical Controls for Data Protection Control 2-7-4 (23:26)
Secure Data Disposal Control 2-7-5 (23:15)
Periodic Reviews of Data Protection Measures (21:23)
Cryptographic Standards, Key Management, Encryption Reviews
Understanding Cryptographic Standards and Key Management Concepts Control 2-8-1 (21:00)
Implementing Cryptographic Solutions in Systems Control 2-8-2 (20:34)
Managing Cryptographic Keys Securely Control 2-8-3 (19:41)
Data Encryption Based on Classific ation and Cryptographic Reviews 2-8-4 (15:59)
Backup Policies, Secure Backup Solutions, Recovery Testing
Defining and Implementing Backup Policies Control 2-9-1 (17:29)
Rapid Data and System Recovery Mechanisms Control 2-9-2 (22:00)
Implementing Secure Backup Solutions and Storage Control 2-9-3/4 (16:56)
Periodic Testing and Review of Backup Recovery Effectiveness 2-9-5 (17:47)
Vulnerability Assessment, Prioritization, Remediation
Understanding Vulnerability Assessment Methodologies 2-10-1 (22:37)
Classification and Prioritization of Vulnerabilities 2-10-2 (21:22)
Developing Remediation Plans and Patch Management Integration Control 2-10-3 (17:31)
Responding to Cybersecurity Vulnerability Notifications 2-10-4 (18:54)
Compliance Assessment and Documentation of Vulnerability Management (21:18)
Penetration Testing Scope, Execution, and Compliance
Defining and Documenting Penetration Testing Scope Control 2-11 (21:42)
Conducting Periodic Penetration Tests Control 2-11-2 (23:35)
Interpreting and Responding to Penetration Test Findings Control 2-11-3 (22:05)
Interpreting and Responding to Penetration Test Findings Control 2-11-4 (17:53)
Event Logging, SIEM, Secure Log Retention, Monitoring Effectiveness
Defining Event Logging and Monitoring Strategies Control 2-12-1 (21:39)
Collection and Centralization of Cybersecurity Logs (18:57)
Utilizing SIEM for Event Correlation and Monitoring Control 2-12-3 (22:52)
Secure Log Retention and Storage Management Control 2-12-4 (18:54)
Reviewing and Validating Log Monitoring Effectiveness Control 2-12-5 (23:26)
Incident Response Plans, Threat Intelligence, NCA Reporting
Developing Incident Response Plans and Procedures Control 2-13-1 (22:15)
Timely Reporting and Information Sharing with NCA Control 2-13-2 (15:52)
Threat Intelligence Management and Response Control 2-13-3 (20:20)
Periodic Review and Update of Incident Response Plan Control 2-13-4 (19:32)
Cybersecurity Resilience, BCM Integration, BIA
Integrating Cybersecurity Resilience into BCM Policies Control 3-1-1 (18:34)
Cybersecurity Incident Response and Disaster Recovery Plans 3-1-2 (20:32)
Business Impact Analysis BIA for Cybersecurity Resilience Control 3-1-3 (22:05)
Reviewing, Testing, and Refining Cybersecurity Resilience Procedures 3-1-4 (19:04)
Physical Security Policies, Access Control, Disposal
Defining Physical Security Policies and Critical Areas Control 2-14-1 (19:01)
Managing Secure Physical Access and Surveillance Control 2-14-2 & 2-14-3 (24:46)
Secure Disposal and Re-use of Physical Assets Control 2-14-4 (17:45)
Regular Reviews and Audits of Physical Security Control 2-14 (17:46)
WAF, Secure Design, MFA, Vulnerability Testing
Implementing and Managing Web Application Firewalls WAF Control 2-15-1 (19:11)
Secure Multi-Tier Web Application Design and Protocols Control 2-15-2 (17:47)
Integrating Multifactor Authentication MFA for Web Applications Control 2-15-3 (19:05)
Vulnerability Assessments and Backups for Web Applications Control 2-15-4 (19:39)
Periodic Review and Updates of Web Application Security Control 2-15-5 (16:58)
Third-Party Risk, Contracts, Cloud Security Standards
Integrating Cybersecurity Requirements into Third-Party Contracts Control 4-1-1 (20:54)
Risk Assessment for Third-Party Engagements Control 4-1-2 (18:11)
Third-Party Incident Communication and Data Handling Control 4-1-3 & 4-1-4 (17:37)
Hosting of Third-Party Cybersecurity Operations Centers in Saudi Arabia 4-1-5 (18:40)
Cloud Security as per NCA Requirements
Cloud Computing Cybersecurity Standards in Contracts Control 4-2-1 (19:08)
Data Hosting within Saudi Arabia for Cloud Environments Control 4-2-2 (18:15)
Environment Separation in Cloud Computing Control 4-2-3 (18:30)
Cloud Data Retrieval and Non-Recoverable Deletion Protocols Control 4-2-4 (17:52)
Regular Review and Updates of Cloud Cybersecurity Policies Control 4-2-5 (20:33)
ICS/OT Policies, Segmentation, Monitoring, Hardening
ICS/OT Cybersecurity Policies and Incident Management Control 5-1-1 (21:40)
Physical and Logical Network Segmentation for ICS/OT Control 5-1-3 (18:40)
Continuous Monitoring for ICS/OT Environments Control 5-1-3 (19:26)
Vulnerability Management, Patching, and Hardening for ICS 5-1-3 (16:08)
Restricting Mobile Devices and External Media in ICS/OT Control 5-1-3 (17:45)
Periodic Reviews and Updates of ICS/OT Cybersecurity Measures Control 5-1-3 (21:10)
Implementing Email Authentication Standards SPF DKIM DMARC Control 2-4
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock