TRAINING PROGRAMME



Cyber Terrorism

Cyber Terrorism primarily focuses on the framework that consist of motivation, target, impact, method of action, domain, and tools of attack. This course provides overview of cyber terrorism framework as well as distinction between cyber terrorism and other types of cyber incidents. It covers existing cyber terrorism frameworks, terrorist use of the Internet and Internet radicalization as well as initiatives in protecting Critical National Information Infrastructure (CNII) against cyber threats in Malaysia. In addition, this course provides a practical hands-on training on cyber-attack lifecycle model.

 

  1. To introduce cyber terrorism framework
  2. To provide understanding of various components of cyber terrorism
  3. To apply cyber terrorism framework in analysing potential incidents related to cyber terrorism
  4. To provide practical hands-on training on cyber-attack lifecycle model

All level of participants interested to know about cyber terrorism.

Introduction to Cyber Terrorism

  1. Definition of cyber threats/incidents
  2. Cyber threats landscape
  3. Concept of cyber terrorism
  4. National Cyber Security Policy (NCSP) and CNII protection against cyber threats
Internet Radicalization
  1. Internet radicalization and terms
  2. Internet as enabler of cyber terrorism
Terrorist Use of the Internet
  1. Conceptualizing use of the Internet for terrorist purposes
  2. Types of activities
Cyber Terrorism Framework
  1. Existing models
  2. Framework components
  3. Analysis of cyber terrorism incidents (case study)
Introduction to Cyber-attack Lifecycle Model
  1. How Cyber Criminals Operate
  2. Identify and Prevent Intrusions
Reconnaissance
  1. Identify possible entry
  2. Planning for an attack
Weaponization & Delivery
  1. Crafting the attack
  2. Delivering attack
Exploitation & Persistency
  1. Sending crafted attack
  2. Maintaining access
  3. Backdooring
Pivoting
  1. Credential harvesting
  2. Attacking other end-point
Exfiltration
  1. Tunnelling
  2. Data exfiltration

 

 

  • 4 - 6 January 2022
  • 15 - 17 March 2022
  • 7 - 9 June 2022
  • 13 - 15 September 2022
  • 28 - 30 November 2022
*dates are tentative, unless specified

 

MYR2,400.00 (subject to 6% SST)

Please click here to register


Contact us to request for a quotation

 

18 CPD Point

Please submit the Certificate of Completion to Global ACE Certification at www.globalace.org

 

Have any inquiries? Check out the FAQ