● Introduction ● History ● Information security fundamentals ● Type of information security ● Implement information security ● Policy standards ● Introduction to cyber security ● Cyber security roles ● Type of hackers ● Cyberattacks ● Hacking steps ● Cyber security mechanisms ●Vulnerability assessment ● Future of cyber security ● Best practices ● Cyber forensic
GDSC Lead
GDSC Libya Facilitator
lead
Marketing/ Creative Manager
Content writer
إعداد العروض التقديمية والتصوير الفوتوغرافي
Backend
social media site management
مدرب
Graphic designer
Trainings Management/Coordination
Trainings Management/Coordination