• Individuals with Information Technology (IT) background
  • Affected by the Covid-19 pandemic 
  • Loss of job and source of income 
  • Unemployed graduates

  • Professional Cybersecurity Training and Certification
  • On-the-job Training
  • Job Opportunity
  • Training Allowance RM1,200/month

    July - December 2021

 

PROGRAM IMPLEMENTATION

Selection & Offering of Target Group

(July 2021 - September 2021)

Implementation of Professional Training

(September 2021 - October 2021)

Job Placement

(October 2021 - December 2021)

 

 

 

Compulsory

This course provides general understanding about the importance of cyber security; create awareness on the growing cyber threats and trends and its impact towards cyber terrorism and internet radicalization. It also explains cyber terrorism framework and describes the core aspects of cyber terrorism.

Click here for more information
Click here for trainer profile

 

Specialized

Certified Information Security Awareness Manager (CISAM) is a 2-days hands-on training and certification programme that provides the essential know-how, enabling information security professionals to develop and manage an effective security awareness programme for their organization.

Click here for more information
Click here for trainer profile

Certified Penetration Tester is 5 days hands-on training and certification programmes that enable the participants handle the vulnerability assessment and penetration test for their customers.

Click here for more information
Click here for trainer profile

This training is a practical qualification for those that work in the fields of data protection and privacy. It is fully up to date with the requirements of the Personal Data Protection Act (PDPA) as well as giving an understanding to the General Data Protection Regulation (GDPR).

Successful completion of the program demonstrates to employers and others that the candidate possesses a solid knowledge of requirements of data protection law, able to identify all components of data control process, translate the rules set out in PDPA to their own work environment, apply the translated concept in their own work practices and implement data security technologies to protect the data within the organization.

Click here for more information
Click here for trainer profile

These four days program is to initiate the development of business continuity plan and will take the participant through the steps necessary to accomplish Business Continuity Plan at their organization targeting the critical business functions and its capability to recover in the event of a disaster.

Each participant from their respective business unit will understand the technique to identify their critical infrastructure, prioritizing their key business functions then analyzing the impact of various disruptions on these business functions. From there they will learn understand the steps to develop their business recovery with strategic recovery solution, improved on their current emergency response procedures as well as their IT disaster recovery plans.

Click here for more information
Click here for trainer profile

This training aims to provide insight on security analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

Click here for more information
Click here for trainer profile

Over these 4 days course, we will be going over how to protect the organization's data from any internal threats, whether this be from a technological or a human point of view.

Topics on the course:

  • Data Leakage Protection (DLP) and an insider threat
  • Rules - keyword, regular expression, file type and fingerprint
  • More on regular expression
  • SecureMi Administration Console
  • Rules testing
  • SecureMi Pre-Investigation Report
  • SecureMi Dashboard
  • Behaviour Analysis in Data Leakage
  • Data Leakage on the dark web
Also included are some real-world examples of situations where you might encounter the topics on the course, to help you identify these within organisation, and be able to resolve them appropriately.

Click here for more information
Click here for trainer profile

 

Insecure web application is one of the biggest causes of organizational data breaches. The number of attacks against web applications increase year by year.

Start securing your web applications by integrating secure coding practices into the software development lifecycle (SDLC). In general, it is much less expensive to develop secure applications than to remediate security vulnerabilities inherent in completed and deployed applications which could be the cause of data breaches.

LGMS’ OWASP Top 10 & Secure Coding Practices training will cover technology agnostic secure coding practices that, if implemented, will mitigate at least the top 10 most common web application vulnerabilities. Additionally, with our unique and extensive penetration testing experience, we will guide you through hacking and securing your web application from a hacker’s perspective.

Click here for more information
Click here for trainer profile

 

Applications for SiberKASA - Cyber Security Upskilling Program is now CLOSED

 

For more information, please contact pemulih-siberkasa@cybersecurity.my

 

Training Partners: