TRAINING PROGRAMME

Click here to download 2023 Training Schedule

Fundamental

This course is designed specifically to create understanding on basics of cryptography and presenting main ideas in simple language. It highlights Important components such as Stream Cipher, block ciphers, public key algorithms, digital signatures, and applications as well as a historical look at the field.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

Moving toward the digital economy, digital transformation is the first and most critical step in which everyone must be involved. In the process, we are exposing more vulnerabilities and threats that will incessantly challenge our economies and societies. Cyberattacks on digital assets are the most critical as they will harm assets, reputation, competitiveness and businesses and threaten human safety unless mitigated appropriately.

This course provides an essential understanding of digital security and its associations with the digital economy and digital transformation. The course will highlight the importance of cyber security and its impact on the digital economy, digital assets of concerned, capacity building and awareness of the growing cyber threats. It also explains the capacity-building framework and describes the core component of digital security domains.

Fee: MYR1,800.00 | Duration: 2-days

Click here to find out more

This training is designed specifically to help you understand the importance of data protection; presenting the main ideas in simple language. This training will explain what data encryption is and how it can help you to protect confidential files and other data that is critical for your organization, business and/or personal.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

This course is intended for managers, government officers or researcher/educators who are interested to understand high level information about digital forensic. Participants are encouraged to participate in decision making to manage evidence, forensics team, tools and resources.

Fee: MYR1,950.00 | Duration: 2-days

Click here to find out more

Organisations are increasingly aware of the value of their business-critical information and the need to protect their information related assets.

An Information Security Management System (ISMS) is based on risk management approach to maintain the confidentiality, integrity and availability of the organization’s information. ISMS is a systematic approach in managing an organisation’s information security.

ISO/IEC 27001:2013 Information Security Management System (ISMS) - Requirements - specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of a management system to manage an organization’s information security risks.

This one-day course aims to spread knowledge on the objectives and benefits of information security; the requirements specified in ISO/IEC 27001:2013 ISMS - Requirements; the controls provided in ISO/IEC 27002:2013 Code of Practice for Information Security Controls; and an insight into the emerging ISO 27000 series of standards.

Fee: MYR1,000.00 | Duration: 1-day

Click here to find out more

This course provides a basic introduction to the services delivered by the MyCC Scheme, Common Criteria evaluation and certification concepts and benefits of product/IT system security evaluation. It also serves as a basic guidelines in understanding documents such as Security Targets and Protection Profiles, understanding the role of the sponsor/ developer and what is needed as requirements to participating in Common Criteria evaluation and certification processes.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

This training exposes participants with the relevant skills and knowledge in Cloud Computing Security (also known as Cloud Security) supported with the fundamental of understanding the cloud computing technology and its deployment ecosystem. Participants will have the understanding on cloud computing services (IaaS, PaaS, and SaaS) and the understanding of cloud deployment models consist of Public Cloud, Private Cloud and Hybrid Cloud.

Participants will be able to understand the security aspect, requirements, and ecosystems of cloud computing operations from the perspectives of cloud service provider and cloud service subscribers. Understanding the cloud architecture and cloud operations through the views of cloud computing security are crucial in ensuring assurance of secure cloud ecosystem in the cloud operations.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

 

 

Marketing Partner: