TRAINING PROGRAMME

Click here to download 2023 Training Schedule

Intermediate

Information technology and security networks demand complex algorithms and cryptographic systems. This course covers cryptographic components such as policy, cryptography implementation, key management and security issues.

Fee: MYR3,600.00 | Duration: 3-days

Click here to find out more

Organizations are increasingly aware of the value of their business-critical information and the need to protect their information related assets. An Information Security Management System (ISMS) is based on risk management approach to maintain the confidentiality, integrity and availability of the organization’s information.

ISO/IEC 27001:2013 Information Security Management System (ISMS) - Requirements - specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of a management system for managing an organization’s information security risks.

This three-day course leads you through the requirements specified in ISO/IEC 27001:2013 for implementing ISMS. These include modules from understanding your organization, scoping your ISMS, assessing and evaluating risks and building security awareness program for your organization. You will also learn practical risk assessment guided by case study example in conducting a risk assessment.

Fee: MYR3,500.00 | Duration: 3-days

Click here to find out more

Attackers often take advantage of vulnerabilities in routers, wireless access point, firewalls, DNS, web and database servers, and other systems to gain access to the internal network of organization. Therefore, organization must secure their network infrastructure to mitigate risk from within and outside the network by conducting network security assessment.

Fee: MYR2,200.00 | Duration: 2-days

Click here to find out more

Servers and desktops are found in all organizations and they are crucial to business operations. Servers typically host business data that if lost, may cost the business it’s customer trust. Desktops (and laptops) are the tools used by the organization’s employees to do their work. In order to achieve the organization’s mission, it is important to prevent security incidents such as hacking or ransomware from disrupting the servers and desktops operations.

A key component of the defense-in-depth philosophy in security is to know your vulnerabilities and fix them before they are discovered and exploited by hackers. This course will introduce the participants to techniques of conducting vulnerability assessment thoroughly and in a safe manner.

Participants will learn about the security role operating systems play and how they can be compromised. The course will cover common vulnerabilities found on servers and desktops and how to conduct assessment to discover them. After vulnerabilities are discovered it is important to fix them and this course will discuss some mitigation techniques.

The course format will be a combination of lecture and hands-on exercise to solidify understanding. At the end of the course the participant will understand and will be able to conduct server and security assessment for their organization.

Fee: MYR2,200.00 | Duration: 2-days

Click here to find out more

The outcome of this training is to perform penetration testing, assess identified web applications and find security vulnerabilities in-line with industry best practices. Participants will be able to apply both technical techniques and security best practices to conduct a web application penetration test, document vulnerabilities and produce comprehensive reports with recommended solutions.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

This training exposes participants with the relevant skills and knowledge in fundamentals of smart card and its devices, based on the smart card devices ecosystem. Participants will learn the skill and knowledge in smart card security, smart card devices security (reader, Software Development Kit (SDK), applications, etc.) and the fundamentals in cybersecurity (understanding the 3 pillars of IT security: Confidentiality, Integrity and Availability.

Participants will be able to understand the operations of smart card reader in forms of its components: hardware, firmware, Application Protocol Interface (API), biometric sensor, SDK, and applications. Participants will be exposed with the knowledge in performing IT security assessment using the methodology of Common Criteria, with reference to Common Evaluation Method (CEM).

This training will also include the knowledge in performing vulnerability assessment and penetration testing inclusive of reverse engineering applications and memory forensic. Participants will be able to produce technical report that highlights the test findings based on risk defined on the vulnerability found during the IT security testing. Lastly, participants will be able to provide recommendations and improvement based in the findings defined inside the test report.

Fee: MYR6,300.00 | Duration: 5-days

Click here to find out more

 

 

Marketing Partner: