Click here to download 2023 Training Schedule


Information technology and security networks demand complex algorithms and cryptographic systems. This course covers cryptographic components such as policy, cryptography implementation, key management and security issues.

Fee: MYR3,600.00 | Duration: 3-days

Click here to find out more

Organizations are increasingly aware of the value of their business-critical information and the need to protect their information related assets. An Information Security Management System (ISMS) is based on risk management approach to maintain the confidentiality, integrity and availability of the organization’s information.

ISO/IEC 27001:2022 Information Security Management System (ISMS) - Requirements - specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of a management system for managing an organization’s information security risks.

This three-day course leads you through the requirements specified in ISO/IEC 27001:2022 for implementing ISMS. These include modules from understanding your organization, scoping your ISMS, assessing and evaluating risks and building security awareness program for your organization. You will also learn practical risk assessment guided by case study example in conducting a risk assessment.

Fee: MYR3,500.00 | Duration: 3-days

Click here to find out more

Attackers often take advantage of vulnerabilities in routers, wireless access point, firewalls, DNS, web and database servers, and other systems to gain access to the internal network of organization. Therefore, organization must secure their network infrastructure to mitigate risk from within and outside the network by conducting network security assessment.

Fee: MYR2,200.00 | Duration: 2-days

Click here to find out more

This training exposes participants with the relevant skills and knowledge in fundamentals of smart card and its devices, based on the smart card devices ecosystem. Participants will learn the skill and knowledge in smart card security, smart card devices security (reader, Software Development Kit (SDK), applications, etc.) and the fundamentals in cybersecurity (understanding the 3 pillars of IT security: Confidentiality, Integrity and Availability.

Participants will be able to understand the operations of smart card reader in forms of its components: hardware, firmware, Application Protocol Interface (API), biometric sensor, SDK, and applications. Participants will be exposed with the knowledge in performing IT security assessment using the methodology of Common Criteria, with reference to Common Evaluation Method (CEM).

This training will also include the knowledge in performing vulnerability assessment and penetration testing inclusive of reverse engineering applications and memory forensic. Participants will be able to produce technical report that highlights the test findings based on risk defined on the vulnerability found during the IT security testing. Lastly, participants will be able to provide recommendations and improvement based in the findings defined inside the test report.

Fee: MYR6,300.00 | Duration: 5-days

Click here to find out more



Marketing Partner: