Discover the essentials of cybersecurity and get an in-depth understanding on IT environment and its basic requirements for enhancement & protection
This is especially designed to educate you on various security aspects that are associated with IT background organizations. This will help in gaining extensive knowledge on cyber security topics. It will enable you to establish a highly secured base in terms of IT security for your organization. Also, it will help you reviewing and detecting existing loopholes in your operating IT environment.
It can be an enriching experience for both beginners as well as expert professionals, enrolling for this course. Be it Security Specialists, IT Admins, Developers etc. all can gain a lot of knowledge out of this course and utilize the same in their respective IT based domains.
Some exceptional benefits associated with this course enrollment are:
- Quality course material
- Lifetime access to the course
- Instant & free course updates
- Access to all Questions & Answers initiated by other students as well
- Personalized support from the instructor’s end on any issue related to the course
- Few free lectures for a quick overview
- Be loud and clear amongst the crowd
- Adapt personality that creates a connection
- Make self-image of audiences at a personal level
- Learn setting up a secure base for the IT environment
- Review existing base for the IT environment
- Get a certificate of completion on the successful course completion
- Learn about cybersecurity technologies along with devices, and physical security mechanisms for the IT organizations
Enroll today!!
This course will be providing various practice options in between the lessons, which you’ll find highly useful for better learning. Just a few minutes a day can transform your career growth.
Don’t miss this unique opportunity.
Achievements:
• Ph. D., “Enhanced Congestion Control for Internet Media Traffic”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menofiya University, 2006 - 2013.
• M. Sc., “Video Services for Distant Work in an IP Environment”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2002 - 2005.
• Researcher, IRISA Institute, Rennes I University, France, 2001 - 2002.
• Information Technology Diploma, Information Technology Institute ITI, Computer Networks Dept., 1998 - 1999.
• B. Sc., Communications and Electronics Dept., Faculty of Engineering, Cairo University, 1993 - 1998.
• Lean Six Sigma Green Belt, SECC/ITIDA, April 2016.
• Dale Carnegie Certified Instructor, 2015
• GIAC Assessing Wireless Networks GAWN 617, SysAdmin, Audit, Network, Security SANS, 2010.
• GIAC Certified Firewall Analyst GCFW 502, SysAdmin, Audit, Network, Security SANS, 2009.
• GIAC Certified Incident Handler GCIH 504, SysAdmin, Audit, Network, Security SANS, 2009.
• GIAC Security Essentials GSEC 401, SysAdmin, Audit, Network, Security SANS, 2009.
• RITI Advanced Management Program RAMP, Regional Information Technology Institute RITI, 2008.
• “Enhanced TCP-Friendly Rate Control for Supporting Video Traffic over Internet”, Mohammad A. Talaat, Gamal M. Attiya, and Magdi A. Koutb, Canadian Journal of Electrical and Computer Engineering CJECE, vol. 36, no. 4, 2013.
• “ETFRC: Enhanced TFRC for Media Traffic over Internet”, International Journal of Computer Networks, IJCN, vol. 3, no. 3, pp. 167-177, August 2011.
• “ETFRC: Enhanced TFRC for Media Traffic”, International Journal of Computer Applications, IJCA, vol. 18, no. 6, pp. 1-8, March 2011.
• “PSNR Evaluation for Media Traffic over TFRC”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Networks & CommunicationsIJCNC, vol. 1, no. 3, pp. 71-76, October 2009.
• “A Survey on Unicast Congestion Control Protocols for Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Science and Network Security IJCSNS, vol. 9, no. 3, pp. 254-261, March 2009.
• “Congestion Control for Internet Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, World Academy of Science, Engineering, and Technology WASET Proceedings, vol. 44, pp. 208-212, Venice, Italy, August 2008.
• “Content-Aware Adaptive Video Streaming System”, Mohammad A. Talaat, Magdi A. Koutb, Hamdy M. Kelash, and Reda H. Aboelez. Published in the proceedings of the following conferences:
• Information and Communications Technologies ICT 2005, Cape Town, South Africa, May 2005.
• International Conference on Information and Communications Technologies ICICT 2005, Cairo, Egypt, Dec. 2005.
Courses at Edugate:
1. Cyber Security in 90 Minutes
2. Computer Networks Security from Scratch
Courses you might be interested in
-
15 Lessons
-
10 Lessons
-
13 Lessons
-
39 Lessons