English Version

المركز الوطني للسلامة المعلوماتية نحو بيئة معلوماتية آمنة للجميع

مسابقة عُمان للأمن السيبراني

مسابقة عُمان للأمن السيبراني

ينظم المركز العربي الإقليمي للأمن السيبراني بالتعاون مع شركة سايبر تالنتس "مسابقة عُمان للأمن السيبراني" بإستضافة من هيئة تقنية المعلومات ممثلة بالمركز الوطني للسلامة المعلوماتية.

التفاصيل
المؤتمر الإقليمي السادس للأمن السيبراني

المؤتمر الإقليمي السادس للأمن السيبراني

تاريخ: 20-21 نوفمبر 2017، بفندق شيراتون عمان بالعاصمة مسقط، سلطنة عمان

التفاصيل
التمرين الوطني الرابع للأمن السيبراني

التمرين الوطني الرابع للأمن السيبراني

يهدف التمرين الوطني للأمن السيبراني إلى تعزيز الجاهزية والإستعداد للتعامل مع الجرائم الإلكترونية المختلفة ومعالجة الحوادث الأمنية...

التفاصيل
المؤتمر السنوي للمراكز الوطنية للأمن السيبراني لمنظمة التعاون الإسلامي(OIC-CERT)

المؤتمر السنوي للمراكز الوطنية للأمن السيبراني لمنظمة التعاون الإسلامي(OIC-CERT)

بتاريخ 6-9 نوفمبر 2017 بالعاصمة باكو، أذربيجان

التفاصيل
فيروس الفدية (WannaCry Ransomware)

فيروس الفدية (WannaCry Ransomware)

حملة هجومية كبرى من فيروسات الفدية لأنظمة الكمبيوتر ويبدو أن الهجوم أثر على مئات الشركات الخاصة والمؤسسات العامة في العديد من البلدان

التفاصيل

التواصل الإجتماعي

الإبلاغ عن الحوادث الأمنية
الخدمات الإلكترونية
التعريفات الأمنية

الشهادات الإختصاصية

الشهادات الإختصاصية

Information Security Certificates

لقد قمنا بجمع الشهادات العالمية المتخصصة في مجال أمن المعلومات والمعترف بها دولياً





  • Advanced Information Security Certification (AISC)
  • The AIS Certification (Advanced Information Security) include advanced information security classes. These classes include PKI & certificate management, Security Policies and Services Oriented Architecture and IDS monitoring classes. In order to qualify for the AIS certification you have to complete the 4 Anti-Hacking Certification classes and the 4 AIS classes. The AIS classes are hands-on classes with performance based testing, the labs and experience exceed users expectations.

  • تفاصيل الشهادة

  • Anti-Hacking Certification (AHC)
  • The Anti-Hacking Certification offers the basics of performance based computer security education. From building a blueprint of your critical assets with Network Penetration Testing class, to knowing how a hacker thinks, and where the compromise happened inside your network, this certification exceeds users expectations for labs and experience.

  • تفاصيل الشهادة

  • Certified Ethical Hacker (CEH)
  • The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

  • تفاصيل الشهادة

  • Certified FISMA Compliance Practitioner (CFCP)
  • he Certified FISMA Compliance Practitioner (CFCP) exam is the only exam that tests for competencies in understanding FISMA compliance concepts related to the Federal Information Security Management Act. You must be knowledgeable about all of the different FISMA compliance methodologies to pass the exam.

  • تفاصيل الشهادة

  • Certified Identity Theft Risk Management Specialist (CITRMS®)
  • The Certified Identity Theft Risk Management Specialist (CITRMS®) certification program is the nation’s only training program specifically developed for professionals who are dedicated to educating and assisting clients, customers, businesses, and the general public in combating the epidemic of Identity Theft and related fraud. CITRMS®-qualified professionals are employed by a wide range of organizations including financial institutions; mortgage, real estate, and financial services firms; law enforcement, and other government agencies.

  • تفاصيل الشهادة


  • Certified Information Security Manager (CISM)
  • The CISM designation is awarded by the Information Systems Audit and Control Association. That is a new certification and is specifically geared toward experienced information security professionals. CISM is business-oriented and focused on information risk management while addressing management, design and technical security issues at the conceptual level. It is for the individual who must maintain a view of the "big picture" by managing, designing, overseeing and assessing an enterprise's information security.

  • تفاصيل الشهادة

  • Certified Information Systems Security Professional (CISSP)
  • The Certified Information Systems Security Professional (CISSP) is a certification for information security professionals. This certification is obtained through the International Information Systems Security Certification Consortium (ISC)2 for the purpose of recognizing individuals who have distinguished themselves as an experienced, knowledgeable, and proficient information security practitioner. The CISSP certificate also provides a means of identifying those persons who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in the information security profession.

  • تفاصيل الشهادة

  • Certified Protection Professional (CPP)
  • To meet these needs, the American Society for Industrial Security (ASIS) International administers the Certified Protection Professional (CPP) program. More than 8,000 professionals have earned the designation of CPP. This group of professionals has demonstrated its competency in the areas of security solutions and best-business practices through an intensive qualification and testing program. As a result, these men and women have been awarded the coveted designation of CPP, and are recognized as proven leaders in their profession. The CPP designation identifies professionals as dedicated to the security profession and recognizes their ability to perform to exemplary standards.

  • تفاصيل الشهادة

  • Computer Hacking Forensic Investigator Certification (CHFI)
  • EC Council - Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

  • تفاصيل الشهادة

  • Computer Technology Industry Association (CompTIA) (Security+)
  • CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. It is an international, vendor-neutral certification that is taught at colleges, universities and commercial training centers around the world. Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience, with an emphasis on security.

  • تفاصيل الشهادة

  • EC-Council Certified Security Analyst (ECSA)
  • EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.

  • تفاصيل الشهادة

  • GIAC Assessing and Auditing Wireless Networks (GAWN)
  • The GAWN certification is designed for technologists who need to assess the security of wireless networks. The certification focuses on the different security mechanisms for wireless networks, the tools and techniques used to evaluate and exploit weaknesses, and techniques used to analyze wireless networks. Students will not only gain experience using tools to assess wireless networks, they will understand how the tools operate and the weaknesses in protocols that they evaluate.

  • تفاصيل الشهادة

  • GIAC Certified Enterprise Defender (GCED)
  • The GCED builds on the security skills measured by the GSEC (no overlap). It assesses more advanced, technical skills that are needed to defend the enterprise environment and protect an organization as a whole. Knowledge, skills and abilities assessed are taken from the areas of Defensive Network Infrastructure, Packet Analysis, Penetration Testing, Incident Handling, and Malware Removal.

  • تفاصيل الشهادة





  • GIAC Certified Web Application Defender
  • The GIAC Web Application Defender certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal with common web application errors that lead to most security problems. The successful candidate will have hands-on experience using current tools to detect and prevent Input Validation flaws, Cross-site scripting (XSS), and SQL Injection as well as an in-depth understanding of authentication, access control, and session management, their weaknesses, and how they are best defended. GIAC Certified Web Application Defenders (GWEB) have the knowledge, skills, and abilities to secure web applications and recognize and mitigate security weaknesses in existing web applications.

  • تفاصيل الشهادة


  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
  • Security personnel whose job duties involve assessing target networks, systems and applications to find vulnerabilities. The GXPN certifies that candidates have the knowledge, skills, and ability to conduct advanced penetration tests, how to model the abilities of an advanced attacker to find significant security flaws in systems, and demonstrate the business risk associated with these flaws.

  • تفاصيل الشهادة

  • GIAC Information Security Fundamentals (GISF)
  • Proficient infosec administrators can network well on the eight layer of the ISO model (political) and the material contained in this track will help them to bridge the gap that often exists between managers and system administrators. GISF candidates will learn and be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.

  • تفاصيل الشهادة

  • GIAC Information Security Professional (GISP)
  • Security Professionals that want to fill the gaps in their understanding of technical information security; System, Security, and Network Administrators that want to understand the pragmatic applications of the Common Body of Knowledge; managers that want to understand information security beyond simple terminology and concepts; anyone new to information security with some background in information systems and networking. Candidates may also wish to use this certification as an independent assessment of your mastery of the (ISC)2 Common Body of Knowledge.

  • تفاصيل الشهادة

  • GIAC Penetration Tester (GPEN)
  • The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.

  • تفاصيل الشهادة

  • GIAC Secure Software Programmer- .NET
  • Individuals who are responsible for coding secure software applications using .NET, identifying shortfalls in the security knowledge of other programmers, ensuring other programmers have adequate secure coding skills, and advanced secure programming skills. The GIAC Secure Software Programmers certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal with common programming errors that lead to most security problems.

  • تفاصيل الشهادة

  • GIAC Secure Software Programmer-Java
  • Individuals who are responsible for coding secure software applications, identifying shortfalls in the security knowledge of other programmers, ensuring other programmers have adequate secure coding skills, and advanced secure programming skills. The GIAC Secure Software Programmers certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal with common programming errors that lead to most security problems.

  • تفاصيل الشهادة

  • GIAC Security Essentials (GSEC)
  • GIAC Security Essential Certification (GSEC) is a vendor-neutral certification that validates an individual’s understanding of information security. Professionals holding a GSEC certificate can prove they have the skills required for IT security-related fields. The GSEC certification is designed to show that the successful candidate has an understanding of technical information security and knowledge on the ten domains of knowledge as determined by GIAC.

  • تفاصيل الشهادة


  • GIAC Web Application Penetration Tester (GWAPT)
  • Web applications one of the most significant points of vulnerability in organizations today. Most organizations have them (both web applications and the vulnerabilities associated with them). Web app holes have resulted in the theft of millions of credit cards, major financial loss, and damaged reputations for hundreds of enterprises. The number of computers compromised by visiting web sites altered by attackers is too high to count. This certification measures and individuals understanding of web application exploits and penetration testing methodology. Check your web applications for holes before the bad guys do.

  • تفاصيل الشهادة

  • Global Information Assurance Certification (GIAC)
  • SANS' GIAC Training and Certification Program is designed to serve the people who are or will be responsible for managing and protecting important information systems and networks. GIAC course specifications were developed through a consensus process that involved more than a hundred members of SANS' faculty and other experienced security practitioners. They combine the opinions, knowledge, and expertise of many of the world's most experienced front-line security and system administrators, intrusion detection analysts, consultants, auditors, and managers.

  • تفاصيل الشهادة


  • Licensed Penetration Tester (LPT)
  • EC-Council’s Licensed Penetration Tester (LPT) is a natural evolution and extended value addition to its series of security related professional certifications. The Licensed Penetration Tester standardizes the knowledge base for penetration testing professionals by incorporating the best practices followed by experienced experts in the field.

  • تفاصيل الشهادة



  • SCSE - Symantec Certified Security Engineer
  • Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies.

  • تفاصيل الشهادة


  • Software Security Engineering Certification (SSEC)
  • Security University Software Security Engineer Certification is a number of classes that make a Software Security Engineer Certification. This certification is for anyone interested in securing software from flaws and bugs, with how to break code, and best practices for checking your code, to penetration testing your code. These classes and certification are new and will provide consistent, extreme hands-on software security labs and classes with trademarked escalating workshops and performance based training for security, IT professionals and now coding /developers.

  • تفاصيل الشهادة

  • SPS - Symantec Product Specialist
  • Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies.

  • تفاصيل الشهادة

  • STA - Symantec Technology Architect
  • Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies.

  • تفاصيل الشهادة

  • Systems Security Certified Practitioner (SSCP)
  • SSCP Certification was designed to recognize an international standard for practitioners of information security [IS] and understanding of a Common Body of Knowledge (CBK). It focuses on practices, roles and responsibilities as defined by experts from major IS industries. Certification can enhance an IS career and provide added credibility.

  • تفاصيل الشهادة

  • الذهاب لإعلى الصفحة