Tfa 7 A

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Cybersecurity option

In ENSA Tangier
Hind Soulaimani
Anass Moumni
Abderrahman Zaouidi
Table of content

01 02 03
Introduction to Cybersecurity Career
Cybersecurity Option in ENSAT Opportunities in
Cybersecurity

04 05
Skills and Q&A Session
prerequirements
01
Introduction
What is cybersecurity?
Cybersecurity:
refers to the practice of protecting systems,
networks, and programs from digital attacks. These
attacks are usually aimed at accessing, changing, or
destroying sensitive information, extorting money
from users, or interrupting normal business.
Key aspects of cybersecurity include:
1. Network Security: Protecting the integrity, confidentiality,
and availability of data as it is transmitted across or between
networks.
2. Application Security: Keeping software and devices free of
threats by ensuring security measures are built into
applications during their development.
3. Information Security: Protecting the integrity and privacy of
data, both in storage and in transit.
4. Operational Security: Processes and decisions for handling
and protecting data assets.
5. Disaster Recovery and Business Continuity: Methods and
policies to recover from cyber attacks and ensure continued
operation.
6. End-User Education: Training individuals to recognize and
avoid potential threats such as phishing and other social
engineering attacks.
02
GCYS in ENSA
an overview
OUR EVOLUTION
OUR EVOLUTION
OUR EVOLUTION
03 Career
Opportunities in
Cybersecurity
in morocco
Security Analyst: Monitors an organization's
networks for security breaches, investigates
violations, and implements security measures.
Penetration Tester (Ethical Hacker): Identifies
and exploits vulnerabilities in systems to help
organizations improve their security.
Security Consultant: Provides advice and
expertise to organizations on how to protect
their data and systems.
Security Engineer: Designs and builds secure
systems and networks.
Incident Responder: Investigates and responds to
security breaches, including analyzing the cause of
the breach, repairing any damage, and implementing
measures to prevent future incidents.
Security Architect: Designs complex security
structures and ensures that they work together to
protect an organization's data.
Chief Information Security Officer (CISO): Oversees
an organization's IT security, including its strategy,
implementation, and management.
Forensic Computer Analyst: Investigates cyber crimes
and gathers evidence to be used in prosecuting cyber
criminals.
Security Operations Center (SOC) Analyst: Monitors
and analyzes an organization's security posture using
various security tools.
Security Auditor: Evaluates an organization's security
policies and procedures to ensure compliance with
laws and regulations.
Security Software Developer/Engineer: Develops
security software solutions and tools to protect
systems and data.
Security Compliance Analyst: Ensures that an
organization meets all industry regulations and
standards for security.
AND SO MUCH MORE!!
04
Skills, Knowledge
and prerequirements
05
Q&A Session

You might also like