تسجيل الدخول
|
y

ليلى سعد مبارك الدوسري

أستاذ مساعد
القسم :
نظم المعلومات
التخصص العام :
نظم المعلومات
التخصص الدقيق :
نظم المعلومات

معلومات التواصل
البريد الإلكتروني :
lsaldossary@pnu.edu.sa
رقم التحويلة :

نبذة عن عضو هيئة التدريس

المناصب الحالية

الجامعية

جدول المقررات
رمز المقرر الشعبة اسم المقرر من الساعة إلى الساعة
21679 تصميم نظم الأعمال الإلكترونية 08:00 09:40
وصف المقرر

24612 أمن نظم المعلومات 10:00 10:50
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

24695 أمن نظم المعلومات 10:00 11:40
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

جدول المقررات
رمز المقرر الشعبة اسم المقرر من الساعة إلى الساعة
21679 تصميم نظم الأعمال الإلكترونية 09:00 09:50
وصف المقرر

21679 تصميم نظم الأعمال الإلكترونية 08:00 08:50
وصف المقرر

24695 أمن نظم المعلومات 10:00 10:50
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

24695 أمن نظم المعلومات 11:00 11:50
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

جدول المقررات
رمز المقرر الشعبة اسم المقرر من الساعة إلى الساعة
24907 أمن نظم المعلومات 11:00 11:50
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

24907 أمن نظم المعلومات 10:00 10:50
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

24612 أمن نظم المعلومات 09:00 09:50
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

جدول المقررات
رمز المقرر الشعبة اسم المقرر من الساعة إلى الساعة
24612 أمن نظم المعلومات 08:00 09:40
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography

24907 أمن نظم المعلومات 10:00 11:40
وصف المقرر

An introduction to principle of information security encompasses 3 important aspects which is The CIA Triad of confidentiality, integrity and availability is the fundamental of information security. Each security vulnerability can be observed from the perspective of one of these main concepts. These concepts must be sufficiently addressed in effort to detect, protect, prevent and mitigate any attack on to the information systems. Students will know who the enemies to information systems are, how to evaluate their severity, and how to control these enemies. Students will be exposed to topics pertaining to introduction of information security, the need for security, legal, ethics and policy revolving information security. Apart from that, the students will be given the hands-on experience of how to determine and manage from the topic of risk management. The last topics involved the technical aspects of security; the topics were the access control and firewall, intrusion detection and prevention systems and cryptography