TRAINING PROGRAMME



Search-Fu Power Search Technique

Search-Fu - Power Search Techniques is a 2-days hands-on workshop which aims to educate Internet users to search information effectively using various search engines.

Internet users often use only one or two search engines such as Google, Yahoo or Bing and do not leverage on the built-in features in the search engines

There are tons of information on the Internet. Without effective information searching techniques, Internet users will suffer information overload.

There are two different techniques for information searching: recall and precision. In this course participants are able to learn 3 crucial elements that are information searching mindset, various search engines and search-fu skills.

 

  1. Educate internet users on various concepts and techniques in information searching to get the better search results
  2. Highlight various search engines to assist the internet users to search information on the internet
  3. Identify various search-fu skills to find specific information on the internet

Individuals who want to improve their internet searching skills

Information Search & Seach Engines

  1. What is Search-Fu?
  2. Introduction to Information Search
  3. Case Study: How Google Works?
  4. Information Search Strategy I: Relevance Seesaw
  5. Information Search Strategy II: Expertise Matrix
  6. Information Search Strategy III: Search Mode
Advanced Search Techniques
  1. Keywords
  2. Advanced Operators
  3. Exercise I
  4. Advanced Search Page
  5. Exercise II
  6. Search Tools
  7. Exercise III
  8. Boolean Operation
  9. Exercise IV
  10. Search Results Reductions
  11. Exercise V
  12. Case Study - MH17 Incident
Leveraging with Other Search Engines
  1. People Search Engines
  2. Social Media Search Engine
  3. Blog Search Engine
  4. Twitter Search Engine
  5. Knowledge Search Engine
  6. Image Search Engine
  7. Similar Site Search
  8. Archive Search Engine
  9. Infrastructure Search Engine
  10. News Search
  11. Alert & Monitor

Dr. Mohamad Nizam Kassim
Specialist
Cyber Security Responsice Services
CyberSecurity Malaysia

Mr. Mohamad Nizam Kassim works as Specialist at Cyber Security Responsive Services, CyberSecurity Malaysia. He has a degree in Power Electrical Engineering from University of Wollongong (Australia), Master of Computer Science from Universiti Teknologi Malaysia (Malaysia), Machine Learning certification from Stanford University (USA), Data Science Specialization certification from John Hopkins University (USA) and three security certifications from SANS Institute (USA) - Wireless Security and Ethical Hacking, Network Penetration Testing and Ethical Hacking and Web Application Penetration and Ethical Hacking. Currently, he is pursuing his postgraduate studies in machine learning and natural language processing. He also involved in training and development for law enforcement agencies in information reconnaissance and profiling through his training – WiFi Practical Exploits Using BackTrack 5 (Offensive Edition), Google-Fu Power Search Techniques and Advanced Information Reconnaissance.

Prior to that, he involved more than six years in telecommunication industry in designing and implementing core-switched and packet-switched network for GSM and 3G networks, analyzing and predicting GSM and 3G mobile network traffics forecasts, implementing core-switched network monitoring system and subscribers provisioning system. Then, he dedicated his time in wireless station tracking, triangulation techniques and mobile phone threats assessments projects that aim to improve investigation techniques for law enforcement agencies. He also actively involved in Cyber Security Awareness For Everyone (CyberSAFE) program that aim to raise security awareness among Internet users in Malaysia since 2009. In 2011, he was selected by ISC2 USA and its Asian Advisory Board as one of honorees of the Asia Pacific Information Security Leadership Achievements (ISLA) 2011 in Jakarta, Indonesia for his contribution in CyberSAFE program.

His current research projects are developing predictive algorithm to detect scams and frauds websites and developing analytics platform for cyber threat intelligence profiling.

 

  • 30 - 31 March 2022 (confirmed - physical)
  • 31 May - 1 June 2022
  • 23 - 24 August 2022
  • 8 - 9 November 2022
*dates are tentative, unless specified

MYR1,600.00 (subject to 6% SST)

Please click here to register


Contact us to request for a quotation

12 CPD Point

Please submit the Certificate of Completion to Global ACE Certification at www.globalace.org

 

Have any inquiries? Check out the FAQ