ãÑßÒ ÝíÑÓÊ ÅíÓÊ ááÊÏÑíÈ FIRST EAST
íÚáä
ãÑßÒ ÝíÑÓÊ ÅíÓÊ ááÊÏÑíÈ (FIRST EAST) – ÔÑßÉ ãÊÎÕÕÉ Ýí ÊÞÏíã ÎÏãÇÊ ÊÏÑíÈíÉ ÈÇÍÊÑÇÝíÉ ÚÇáíÉ ááÌåÇÊ ÇáÍßæãíÉ æÇáÎÇÕÉ –
Úä ÝÊÍ ÈÇÈ ÇáÊÓÌíá æÇáÊÑÔíÍ Ýí:
ÃÍÏË ÈÑÇãÌ ÇáÃãä ÇáÓíÈÑÇäí áÚÇã 2026
ÊäÝÐ ÇáÈÑÇãÌ ÏÇÎá ÇáããáßÉ ÇáÚÑÈíÉ ÇáÓÚæÏíÉ
Ãåã ÇáÏæÑÇÊ ÇáÇÍÊÑÇÝíÉ Ýí ÇáÃãä ÇáÓíÈÑÇäí
ÏæÑÉ ÇáÃãä ÇáÓíÈÑÇäí ÇáãÊÞÏã æÍãÇíÉ ÇáÈäíÉ ÇáÊÍÊíÉ
ÏæÑÉ ÇÎÊÈÇÑ ÇáÇÎÊÑÇÞ ÇáÃÎáÇÞí (Ethical Hacking)
ÏæÑÉ ÅÏÇÑÉ ãÎÇØÑ ÇáÃãä ÇáÓíÈÑÇäí (Cyber Risk Management)
ÏæÑÉ Ããä ÇáÔÈßÇÊ ÇáãÊÞÏãÉ (Advanced Network Security)
ÏæÑÉ ÊÍáíá ÇáÊåÏíÏÇÊ ÇáÓíÈÑÇäíÉ (Threat Intelligence)
ÏæÑÉ ÇáÇÓÊÌÇÈÉ ááÍæÇÏË ÇáÓíÈÑÇäíÉ (Incident Response)
ÏæÑÉ ÇáÊÍÞíÞ ÇáÌäÇÆí ÇáÑÞãí (Digital Forensics)
ÏæÑÉ Ããä ÇáÊØÈíÞÇÊ æÇÎÊÈÇÑ ÇáÇÎÊÑÇÞ (Web & App Security)
ÏæÑÉ ÇáÍãÇíÉ ãä ÇáåÌãÇÊ ÇáÅáßÊÑæäíÉ ÇáãÊÞÏãÉ (APT Defense)
ÏæÑÉ Ããä ÇáÍæÓÈÉ ÇáÓÍÇÈíÉ (Cloud Security)
ÏæÑÉ Ããä ÇáãÚáæãÇÊ æÝÞ ISO 27001
ÏæÑÉ ÅÏÇÑÉ ãÑÇßÒ ÇáÚãáíÇÊ ÇáÃãäíÉ (SOC)
ÏæÑÉ ÊÍáíá ÇáÈÑãÌíÇÊ ÇáÎÈíËÉ (Malware Analysis)
ÏæÑÉ Ããä ÅäÊÑäÊ ÇáÃÔíÇÁ (IoT Security)
ÏæÑÉ Ããä ÇáÐßÇÁ ÇáÇÕØäÇÚí (AI Security)
ÏæÑÉ ÍãÇíÉ ÇáÈíÇäÇÊ æÇáÎÕæÕíÉ (Data Protection & Privacy)
ÏæÑÉ ÇáÊÔÝíÑ æÃãä ÇáÈíÇäÇÊ (Cryptography)
ÏæÑÉ Ããä ÇáÃäÙãÉ ÇáÕäÇÚíÉ (ICS/SCADA Security)
ÏæÑÉ Ããä ÇáåæíÉ æÇáæÕæá (IAM Security)
ÏæÑÉ ÇáÍæßãÉ æÇáÇãÊËÇá Ýí ÇáÃãä ÇáÓíÈÑÇäí (GRC)
ããíÒÇÊ ÈÑÇãÌäÇ ÇáÊÏÑíÈíÉ
ÊäÝíÐ ÏÇÎá ÇáÓÚæÏíÉ æÌãíÚ ÇáÏæá ÇáÚÑÈíÉ
ãÏÑÈæä Ïæáíæä ãÚÊãÏæä
ãÍÊæì ÊÏÑíÈí ÍÏíË æÝÞ ÃÍÏË ÇáãÚÇííÑ ÇáÚÇáãíÉ
ÔåÇÏÇÊ ãÚÊãÏÉ
ÃäÙãÉ ÇáÊÏÑíÈ
ÊÏÑíÈ ÍÖæÑí ÏÇÎá ÇáÓÚæÏíÉ
ÊÏÑíÈ ÏÇÎáí ááãÄÓÓÇÊ (In-House)
ÊÏÑíÈ ÃæäáÇíä ãÈÇÔÑ
ÈÑÇãÌ ÞÕíÑÉ æØæíáÉ ÇáÃãÏ
ÇáãÏÏ 5 ÃíÇã | 10 ÃíÇã | ÔåÑ | 3 ÃÔåÑ | 6 ÃÔåÑ
ÚÑæÖ ÎÇÕÉ
ÎÕæãÇÊ ããíÒÉ ÚäÏ ÊÓÌíá ÇáãÌãæÚÇÊ
ãÑæäÉ Ýí ÊÍÏíÏ ÇáãæÇÚíÏ æÃãÇßä ÇáÊäÝíÐ ÍÓÈ ÇÍÊíÇÌÇÊßã
ááÊÓÌíá æÇáÇÓÊÝÓÇÑ
íÑÌì ÅÑÓÇá ÇÓã ÇáÏæÑÉ ÚÈÑ:
hadeer@trainingfe.com
æÇÊÓÇÈ: 00201107581309
https://wa.me/201107581309
íÊã ÇáÑÏ ÎáÇá 24 ÓÇÚÉ
#ÇáÃãä_ÇáÓíÈÑÇäí #CyberSecurity #ÊÏÑíÈ #ÏæÑÇÊ_ÊÏÑíÈíÉ
#ÊØæíÑ_ÇáãåÇÑÇÊ #ÇáÓÚæÏíÉ #ÈÑÇãÌ_ÊÏÑíÈíÉ #FIRST_EAST
#ÊÃåíá_ÇáãæÙÝíä #ÇáÏæÑÇÊ_ÇáãÄßÏÉ_
