cyber security diploma

The main objective of the program: This program aims to qualify the trainee to work in the field of cyber security and computer networks and security

Price & Date

Location Price Book
SAR 10,000.00 incl tax
+ -


Program description:


The Cyber Security Diploma is designed in line with the needs of the local labor market for the specialization. Training takes place in two mid-term training semesters. The duration of each training semester is sixteen weeks, with a total of (992) training hours, equivalent to (42) credit hours.


Training takes place in this program on specialized skills in: in the field of cyber security and networks related to protecting companies and institutions from hacking.

It also includes installation, operation and maintenance of computers, network management and management of network servers operating systems, network security and operating systems | Network servers, information security and protection from hacking. The focus during training is on the practical and applied side and its connection to the theoretical side in most of the specialized courses, in addition to general skills in the English language, computer applications, vocational guidance , functional behavior and communication skills


The graduate from this program is awarded an associate diploma in cyber security and is expected to work in areas related to the cyber security process in companies, as a network security technician, an assistant responsible for discovering gaps, a network technician, a maintenance technician



The detailed objectives of the program :


By the end of this program, the trainee will be able and efficiently to perform the following tasks:


  •      Understand the principles of security within a computing environment and build the necessary skills to evaluate, apply and implement security technologies and systems.
  •      Participate in protecting the organization's critical information and assets, by incorporating Cyber security risk management and business continuity best practices across the organization.
  •      Implement continuous monitoring of the network and provide security solutions in real time.
  •      Identify security vulnerabilities in the network structure.