CyberSecurity Malaysia latest initiative, with the support of the Malaysian Government, in collaboration with local professional training providers and local academia introduces a cyber security skills improvement project known as the Global ACE Certification Upskilling Programme.

This project integrates Global ACE Certification professional trainings, certification, and lifelong learning plans through Global ACE Certification membership. Participants are recognized under the Global ACE Certification in line with international standards when they pass the certification examination.

The main aspiration of Global ACE Certification membership is to stimulate cognitive skills that can be shared. This membership allows participants to continuously increase their respective cyber security capacity. Lifelong learning programs will be introduced throughout the year, where members can take the opportunity to expand their knowledge, enhance existing abilities and train new skills at their own pace. Thus, it provides an opportunity for members to share knowledge, expertise, and skills, identify latest cyber threats as well as appropriate mitigation methods.

The training, examination, and membership fee are waived. In addition, participants who pass the certification examination are eligible to apply as Professional Technologies or Certified Technicians from the Malaysia Board of Technologists (MBOT) under the Technologist and Technicians Act 2015 (Act 768), subject to MBOT terms and conditions.


  1. To cultivate a competent workforce working towards a consistent and high-quality level of service;
  2. To provide workforce with the appropriate Knowledge and Skills according to current needs, heading towards the Industrial Revolution 4.0;
  3. To foster the development of a globally recognized Malaysian professional certification program; and
  4. To create quality and competitive local professional program developers and providers.


Learning Outcomes

At the end of the program, the participant will be able :

  1. To build and maintain a comprehensive awareness and competence programme, as part of an organisation’s information security programme;
  2. To design and implement data protection policy for the organization to manage the data risk exposures;
  3. To gain knowledge of Incident Response Methodology, processes and in-depth knowledge on how to integrate SOC processes with Incident Response processes and learn how to automate them as a single workflow;
  4. To learn ways to harden the network and systems thus securing the corporate network and systems; and
  5. To examine application source code vulnerabilities and demonstrate how the issues are exploited by attackers.



The following fees are waived:

  1. Cyber security professional certification trainings;
  2. Professional examination* by Global ACE Certification; and
  3. Global ACE Certification Membership.

*to be conducted in separate session

Target Participants

  1. Educators from Institutions of Higher Learning (IHL).
  2. Working adults from:
    • Small & medium enterprises.
    • Multi-national corporations.
    • Government-linked corporations.
    • Government sectors.
  3. Freelance technical trainers.
  4. Post-graduates.


Training Offerings


(will be held online)


Certified Information Security Awareness Manager (CISAM)

A 2-days hands-on training and certification programme that provides the essential know-how, enabling information security professionals to develop and manage an effective security awareness programme for their organization.

Click here for more information

  1. Possess 2-years minimum of experience in managerial position; and
  2. Fundamental knowledge in information security

Certified Data Security Professional (CDSP)

This training is a practical qualification for those that work in the fields of data protection and privacy. It is fully up to date with the requirements of the Personal Data Protection Act (PDPA) as well as giving an understanding to the General Data Protection Regulation (GDPR).

Successful completion of the program demonstrates to employers and others that the candidate possesses a solid knowledge of requirements of data protection law, able to identify all components of data control process, translate the rules set out in PDPA to their own work environment, apply the translated concept in their own work practices and implement data security technologies to protect the data within the organization.

Click here for more information

  1. Possess an understanding of IT, computer networking, database operations, and cloud computing fundamental;
  2. Experienced in security concept such as Access Control, Security Compliance, Encryption, Database and System Administration; and
  3. At least one-year working experience in IT operations.

Security Operation Centre Analyst (CSOC)

As you are reading this document, more than 100 successful hacking has occurred in the world per minute. With all the news stories about hackers, botnets, and breaches involving personal information, it's easy for the security message to sound over-used and tired. It's easy for people to say, "It won't happen here."

Currently, Security Operation Centre (SOC) Analyst role is being only used in Security Operation Centers (SOC) that are monitoring financial institutions. Instead, we can upscale every IT person in an organization by equipping them with the skillset of a SOC Analyst so that they have the ability to review logs and identify attacks that are happening in their own organization and enable their organization to respond to them effectively.

Click here for more information

Posses fundamental understanding in information security/network/operating systems/applications/database systems.

Certified Penetration Tester (CPT)

A 5-days hands-on training and certification programmes that enable the participants handle the vulnerability assessment and penetration test for their customers.

Click here for more information

Possess fundamental understanding on information security/security assessment/network/operating systems/applications/database systems.

Certified Secure Application Professional (CSAP)

Everyday cybercriminals are looking for ways to penetrate the systems for their evil intentions. The recent rising trend of ransomware is also exploiting the unsecured systems to infect many other users or organizations. Therefore, the need for Malaysia to develop secure coding has become an important and urgent issue to protect organizations in Malaysia.

Click here for more information

  1. Experienced developer with prior knowledge of SDLC model, aware of the different models (e.g. Waterfall, Iterative, Agile,etc.); and
  2. Understands the need for a systematic approach to secure application development and testing.

Seats are limited!


Terms and Conditons

Interested participants are required to adhere to the following terms and conditions:

  1. Malaysian citizen only.
  2. Age 17-years old and above.
  3. Fulfil the pre-requisite for each training offerings.
  4. CyberSecurity Malaysia will review each application upon approval.

Registration Closed


Certified by:


Training Partners:



Supported by: