Specialized Capacity Building
25 hours (distributed over 5 days)
IT Teams, Network Engineers, and Security Officers
Experience in networking or information technology
Completion of the “ISMS Fundamentals” program or its equivalent

- How these attacks work and how to prevent them
- Attack mechanisms and defense strategies
- IP and email spoofing and how to detect them
- The use of sniffing tools and how to protect against them
- Wireless network threats and how to secure them
- The difference between them and when to use each
- Introduction to SIEM and how to collect and analyze logs
- Wireshark, tcpdump, ntopng
- SolarWinds, Nagios, Zabbix
- Practical steps to set up initial network monitoring
- Packet filtering, stateful inspection, and Next-Generation Firewalls (NGFW)
- How to write and organize allow and deny rules
- Protecting web applications from breaches
- How IPS works and detection rules
- Practical steps for basic firewall configuration
- Understanding various log information and what it means
- Recognizing normal and anomalous patterns
- Classifying alerts by severity (Critical, High, Medium, Low)
- What to do when receiving a suspicious security alert?
- Recording information about the incident in an organized manner
After completing all course requirements, you can apply to receive an accredited Certificate of Completion from Ru’ya Academy for Leadership and Technology.
