TRAINING PROGRAMME

Click here to download 2021 Training Schedule

Fundamental

This course is designed specifically to create understanding on basics of cryptography and presenting main ideas in simple language. It highlights Important components such as Stream Cipher, block ciphers, public key algorithms, digital signatures, and applications as well as a historical look at the field.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

This course provides general understanding about the importance of cyber security; create awareness on the growing cyber threats and trends and its impact towards cyber terrorism and internet radicalization. It also explains cyber terrorism framework and describes the core aspects of cyber terrorism.

This 2-days comprehensive course is tailored according to Malaysian perspective.

Fee: MYR1,800.00 | Duration: 2-days

Click here to find out more

Cyber Terrorism primarily focuses on the framework that consist of motivation, target, impact, method of action, domain, and tools of attack. This course provides overview of cyber terrorism framework as well as distinction between cyber terrorism and other types of cyber incidents. It covers existing cyber terrorism frameworks, terrorist use of the Internet and Internet radicalization as well as initiatives in protecting Critical National Information Infrastructure (CNII) against cyber threats in Malaysia. In addition, this course provides a practical hands-on training on cyber-attack lifecycle model.

Fee: MYR2,400.00 | Duration: 3-days

Click here to find out more

This training is designed specifically to help you understand the importance of data protection; presenting the main ideas in simple language. This training will explain what data encryption is and how it can help you to protect confidential files and other data that is critical for your organization, business and/or personal.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

This course is intended for managers, government officers or researcher/educators who are interested to understand high level information about digital forensic. Participants are encouraged to participate in decision making to manage evidence, forensics team, tools and resources.

Fee: MYR1,950.00 | Duration: 2-days

Click here to find out more

The implementation of Business Continuity Management (BCM) is crucial in all organizations regardless of the size and nature of business.

For a company to remain resilient and competitive, a robust BCM implementation must be in place. This can be achieved through experience or best practice or standards specifically the ISO 22301 Business Continuity Management System.

ISO 22301 helps establish a business continuity management system within the organization and clarify roles and responsibilities as well as action plans during disruption. It is also a standard for audit that determines whether an organization is certified. BCMS certification ensures organizational resilient as well as competitive advantage.

Fee: MYR1,800.00 | Duration: 2-days

Click here to find out more

Organisations are increasingly aware of the value of their business-critical information and the need to protect their information related assets.

An Information Security Management System (ISMS) is based on risk management approach to maintain the confidentiality, integrity and availability of the organization’s information.

ISO/IEC 27001:2013 Information Security Management System (ISMS) - Requirements - specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of a management system to manage an organization’s information security risks.

This one-day course aims to spread knowledge on the objectives and benefits of information security; the requirements specified in ISO/IEC 27001:2013 ISMS - Requirements; the controls provided in ISO/IEC 27002:2013 Code of Practice for Information Security Controls; and an insight into the emerging ISO 27000 series of standards.

Fee: MYR1,000.00 | Duration: 1-day

Click here to find out more

This course provides a basic introduction to the services delivered by the MyCC Scheme, Common Criteria evaluation and certification concepts and benefits of product/IT system security evaluation. It also serves as a basic guidelines in understanding documents such as Security Targets and Protection Profiles, understanding the role of the sponsor/ developer and what is needed as requirements to participating in Common Criteria evaluation and certification processes.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

Search-Fu - Power Search Techniques is a 2-days hands-on workshop which aims to educate Internet users to search information effectively using various search engines.

Internet users often use only one or two search engines such as Google, Yahoo or Bing and do not leverage on the built-in features in the search engines

There are tons of information on the Internet. Without effective information searching techniques, Internet users will suffer information overload.

There are two different techniques for information searching: recall and precision. In this course participants are able to learn 3 crucial elements that are information searching mindset, various search engines and search-fu skills.

Fee: MYR1,600.00 | Duration: 2-days

Click here to find out more

This training exposes participants with the relevant skills and knowledge in Cloud Computing Security (also known as Cloud Security) supported with the fundamental of understanding the cloud computing technology and its deployment ecosystem. Participants will have the understanding on cloud computing services (IaaS, PaaS, and SaaS) and the understanding of cloud deployment models consist of Public Cloud, Private Cloud and Hybrid Cloud.

Participants will be able to understand the security aspect, requirements, and ecosystems of cloud computing operations from the perspectives of cloud service provider and cloud service subscribers. Understanding the cloud architecture and cloud operations through the views of cloud computing security are crucial in ensuring assurance of secure cloud ecosystem in the cloud operations.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

 

Intermediate

Information technology and security networks demand complex algorithms and cryptographic systems. This course covers cryptographic components such as policy, cryptography implementation, key management and security issues.

Fee: MYR3,600.00 | Duration: 3-days

Click here to find out more

Organizations are increasingly aware of the value of their business-critical information and the need to protect their information related assets. An Information Security Management System (ISMS) is based on risk management approach to maintain the confidentiality, integrity and availability of the organization’s information.

ISO/IEC 27001:2013 Information Security Management System (ISMS) - Requirements - specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of a management system for managing an organization’s information security risks.

This three-day course leads you through the requirements specified in ISO/IEC 27001:2013 for implementing ISMS. These include modules from understanding your organization, scoping your ISMS, assessing and evaluating risks and building security awareness program for your organization. You will also learn practical risk assessment guided by case study example in conducting a risk assessment.

Fee: MYR3,500.00 | Duration: 3-days

Click here to find out more

Attackers often take advantage of vulnerabilities in routers, wireless access point, firewalls, DNS, web and database servers, and other systems to gain access to the internal network of organization. Therefore, organization must secure their network infrastructure to mitigate risk from within and outside the network by conducting network security assessment.

Fee: MYR2,200.00 | Duration: 2-days

Click here to find out more

Servers and desktops are found in all organizations and they are crucial to business operations. Servers typically host business data that if lost, may cost the business it’s customer trust. Desktops (and laptops) are the tools used by the organization’s employees to do their work. In order to achieve the organization’s mission, it is important to prevent security incidents such as hacking or ransomware from disrupting the servers and desktops operations.

A key component of the defense-in-depth philosophy in security is to know your vulnerabilities and fix them before they are discovered and exploited by hackers. This course will introduce the participants to techniques of conducting vulnerability assessment thoroughly and in a safe manner.

Participants will learn about the security role operating systems play and how they can be compromised. The course will cover common vulnerabilities found on servers and desktops and how to conduct assessment to discover them. After vulnerabilities are discovered it is important to fix them and this course will discuss some mitigation techniques.

The course format will be a combination of lecture and hands-on exercise to solidify understanding. At the end of the course the participant will understand and will be able to conduct server and security assessment for their organization.

Fee: MYR2,200.00 | Duration: 2-days

Click here to find out more

The outcome of this training is to perform penetration testing, assess identified web applications and find security vulnerabilities in-line with industry best practices. Participants will be able to apply both technical techniques and security best practices to conduct a web application penetration test, document vulnerabilities and produce comprehensive reports with recommended solutions.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

This training exposes participants with the relevant skills and knowledge in fundamentals of smart card and its devices, based on the smart card devices ecosystem. Participants will learn the skill and knowledge in smart card security, smart card devices security (reader, Software Development Kit (SDK), applications, etc.) and the fundamentals in cybersecurity (understanding the 3 pillars of IT security: Confidentiality, Integrity and Availability.

Participants will be able to understand the operations of smart card reader in forms of its components: hardware, firmware, Application Protocol Interface (API), biometric sensor, SDK, and applications. Participants will be exposed with the knowledge in performing IT security assessment using the methodology of Common Criteria, with reference to Common Evaluation Method (CEM).

This training will also include the knowledge in performing vulnerability assessment and penetration testing inclusive of reverse engineering applications and memory forensic. Participants will be able to produce technical report that highlights the test findings based on risk defined on the vulnerability found during the IT security testing. Lastly, participants will be able to provide recommendations and improvement based in the findings defined inside the test report.

Fee: MYR6,300.00 | Duration: 5-days

Click here to find out more

 

Specialization

It is critical for an organization to secure and protect their information system. Security posture assessment exposed potential threats to the information assets and it is a comprehensive evaluation of organization’s enterprise-wide networks environment with objective to mitigate risks and to establish ‘Defense-in-Depth’.

Information security is implemented by systems; policies and procedures in comply with ISO/IEC 27001:2013 Information Security Management System (ISMS). Therefore, the security posture assessment provides a thorough understanding on information security, follows with technical knowledge and skill sets.

Fee: MYR4,000.00 | Duration: 5-days

Click here to find out more

An advanced training program focusing on the knowledge transfer for real-life scenarios and handling of incidents.

Participants will be guided on the mechanism to analyse malwares originating from various sources.

Fee: MYR3,800.00 | Duration: 4-days

Click here to find out more

As you are reading this document, more than 100 successful hacking has occurred in the world per minute. With all the news stories about hackers, botnets, and breaches involving personal information, it's easy for the security message to sound over-used and tired. It's easy for people to say, "It won't happen here."

Currently, Security Operation Centre (SOC) Analyst role is being only used in Security Operation Centers (SOC) that are monitoring financial institutions. Instead, we can upscale every IT person in an organization by equipping them with the skillset of a SOC Analyst so that they have the ability to review logs and identify attacks that are happening in their own organization and enable their organization to respond to them effectively.

Fee: MYR6,300.00 | Duration: 5-days

Click here to find out more

 

Professional Certification

This training is specially conducted for the participating agencies and Sector Leads to equip them with the intermediate knowledge in Incident handling and Network Security.

Participants will be exposed to the security environment through practitioners’ experience sharing, case studies and hands on exercises by doing relevant analysis with the related tools. Participants will be exposed to the actual drill environment where the previous drill scenario will be simulated.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

This training expose participants with skills in Industrial Control System (ICS) Security. Participants will be able to apply the concepts of ICS Cybersecurity and provide technical instruction on the protection of ICS using offensive and defensive methods. Participants will be able to recognize how cyber-attacks are launched, why they work, how to perform ICS security assessment and mitigation strategies to increase the cybersecurity posture of their control system networks.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

This course provides working level competency for personnel who will be employed as MySEF Evaluator/MyCC Certifier. It is also applicable for IT security consultants who have potential interest in understanding Common Criteria Evaluation and Certification processes.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

This training exposes participants with skills to assess IoT environment which includes robotic technology, web application, wireless network, and cloud. Participants will be able to identify, perform and mitigate security issues as part of securing IoT environment.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

This course explores on the application of secure software development life cycle framework focusing in PHP programming specifically in developing, testing, managing, or securing PHP based applications. Participants will be able to identify possible security issues, perform code reviews, and review application logs.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

This training is a practical qualification for those that work in the fields of data protection and privacy. It is fully up to date with the requirements of the Personal Data Protection Act (PDPA) as well as giving an understanding to the General Data Protection Regulation (GDPR).

Successful completion of the program demonstrates to employers and others that the candidate possesses a solid knowledge of requirements of data protection law, able to identify all components of data control process, translate the rules set out in PDPA to their own work environment, apply the translated concept in their own work practices and implement data security technologies to protect the data within the organization.

Fee: MYR5,040.00 | Duration: 4-days

Click here to find out more

Everyday cybercriminals are looking for ways to penetrate the systems for their evil intentions. The recent rising trend of ransomware is also exploiting the unsecured systems to infect many other users or organizations. Therefore, the need for Malaysia to develop secure coding has become an important and urgent issue to protect organizations in Malaysia.

Fee: MYR5,040.00 | Duration: 4-days

Click here to find out more

Certified Information Security Awareness Manager (CISAM) is a 2-days hands-on training and certification programme that provides the essential know-how, enabling information security professionals to develop and manage an effective security awareness programme for their organization.

Fee: MYR2,520.00 | Duration: 2-days

Click here to find out more

This course explores the objectives of ISMS Audit and explains the roles and responsibilities of an Auditor to ensure the effectiveness of controls; and improvement of the management system in ISO/IEC 27001:2013.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

Certified Digital Forensic for First Responder (CDFFR) is a 4-days hands-on training and certification programme that intended for officers who identify and seize digital evidence at crime scene. This course will teach in-depth, with hands-on practices in class, on the methods of seizing and acquiring digital evidence.

Fee: MYR5,040.00 | Duration: 4-days

Click here to find out more

Certified Penetration Tester is 5 days hands-on training and certification programmes that enable the participants handle the vulnerability assessment and penetration test for their customers.

Fee: MYR6,300.00 | Duration: 5-days

Click here to find out more

The BCLE 2000 course is designed for professionals experienced in the business continuity profession. Experience in business environment and BCM & ERM is a key criterion in selecting this course because of the rapid pace and extensive materials covered during the class. The curriculum is designed in compliance with the Professional Practices for Business Continuity Planners. The course does vary from the ordering of these practices with the objective of serving the BCM planner to understand the applicability of these practices within their job responsibilities.

The course is designed to expose the participants to all aspects of a holistic BCM program and to determine the most appropriate requirements for their organization. This is a fast paced interactive course offering that has ten lessons and is completed in four days. In each lesson, the planner’s role, tasks and objectives, planning requirements, tools, techniques, and validation are designed to assist the planner to move through this course and to directly apply these materials to their working environment. The DRI International BCM Qualifying Examination is held at the completion of the course on day 5.

Fee: MYR9,500.00 | Duration: 5-days

Click here to find out more

Auditing is crucial to the success of any management system. As a result, it carries with it heavy responsibilities, tough challenges and complex problems. This five-day intensive course trains ISMS auditors to lead, plan, manage and implement an Audit Plan. It also empowers them to give practical help and information to those who are working towards certification and also provides the knowledge and skill required to carry out 2nd party auditing (suppliers and subcontractors).

Fee: MYR7,200.00 | Duration: 5-days

Click here to find out more

 

Certification Partner:

 

Training Partners:

  

 

Marketing Partner: