TRAINING PROGRAMME



Cyber Terrorism

Cyber Terrorism primarily focuses on the framework that consist of motivation, target, impact, method of action, domain, and tools of attack. This course provides overview of cyber terrorism framework as well as distinction between cyber terrorism and other types of cyber incidents. It covers existing cyber terrorism frameworks, terrorist use of the Internet and Internet radicalization as well as initiatives in protecting Critical National Information Infrastructure (CNII) against cyber threats in Malaysia. In addition, this course provides a practical hands-on training on cyber-attack lifecycle model.

 

  1. To introduce cyber terrorism framework
  2. To provide understanding of various components of cyber terrorism
  3. To apply cyber terrorism framework in analysing potential incidents related to cyber terrorism
  4. To provide practical hands-on training on cyber-attack lifecycle model

All level of participants interested to know about cyber terrorism.

Introduction to Cyber Terrorism

  1. Definition of cyber threats/incidents
  2. Cyber threats landscape
  3. Concept of cyber terrorism
  4. National Cyber Security Policy (NCSP) and CNII protection against cyber threats
Internet Radicalization
  1. Internet radicalization and terms
  2. Internet as enabler of cyber terrorism
Terrorist Use of the Internet
  1. Conceptualizing use of the Internet for terrorist purposes
  2. Types of activities
Cyber Terrorism Framework
  1. Existing models
  2. Framework components
  3. Analysis of cyber terrorism incidents (case study)
Introduction to Cyber-attack Lifecycle Model
  1. How Cyber Criminals Operate
  2. Identify and Prevent Intrusions
Reconnaissance
  1. Identify possible entry
  2. Planning for an attack
Weaponization & Delivery
  1. Crafting the attack
  2. Delivering attack
Exploitation & Persistency
  1. Sending crafted attack
  2. Maintaining access
  3. Backdooring
Pivoting
  1. Credential harvesting
  2. Attacking other end-point
Exfiltration
  1. Tunnelling
  2. Data exfiltration

 

Ts. Dr. Zahri Bin Yunos
Chief Operating Officer
CyberSecurity Malaysia

Ts. DR. ZAHRI HJ YUNOS is the Chief Operating Officer of CyberSecurity Malaysia, an agency under the Ministry of Science, Technology and Innovation, Malaysia. Zahri holds a PhD in Information Security from the Universiti Teknikal Malaysia Melaka (UTeM), Melaka, Malaysia. Zahri also holds a Master’s degree in Electrical Engineering from the Universiti Teknologi Malaysia, Malaysia and a Bachelor’s degree in Computer Science from the Fairleigh Dickinson University, New Jersey, USA.

He is a certified Associate Business Continuity Professional by the Disaster Recovery Institute International, USA. Zahri has been awarded Senior Information Security Professional Honouree in July 2010 by the (ISC)2, USA. He has contributed various publications and presented papers on topics related to cyber security, cyber terrorism and business continuity management.

coming soon

*dates are tentative, unless specified

MYR2,400.00 (subject to 6% SST)

Please click here to register


Contact us to request for a quotation

18 CPD Point

Please submit the Certificate of Completion to Global ACE Certification at www.globalace.org

 

Have any inquiries? Check out the FAQ