TRAINING PROGRAMME

Click here to download 2021 Training Schedule

Fundamental

This course is designed specifically to create understanding on basics of cryptography and presenting main ideas in simple language. It highlights Important components such as Stream Cipher, block ciphers, public key algorithms, digital signatures, and applications as well as a historical look at the field.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

This course provides general understanding about the importance of cyber security; create awareness on the growing cyber threats and trends and its impact towards cyber terrorism and internet radicalization. It also explains cyber terrorism framework and describes the core aspects of cyber terrorism.

This 2-days comprehensive course is tailored according to Malaysian perspective.

Fee: MYR1,800.00 | Duration: 2-days

Click here to find out more

Cyber Terrorism primarily focuses on the framework that consist of motivation, target, impact, method of action, domain, and tools of attack. This course provides overview of cyber terrorism framework as well as distinction between cyber terrorism and other types of cyber incidents. It covers existing cyber terrorism frameworks, terrorist use of the Internet and Internet radicalization as well as initiatives in protecting Critical National Information Infrastructure (CNII) against cyber threats in Malaysia. In addition, this course provides a practical hands-on training on cyber-attack lifecycle model.

Fee: MYR2,400.00 | Duration: 3-days

Click here to find out more

This training is designed specifically to help you understand the importance of data protection; presenting the main ideas in simple language. This training will explain what data encryption is and how it can help you to protect confidential files and other data that is critical for your organization, business and/or personal.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

This course is intended for managers, government officers or researcher/educators who are interested to understand high level information about digital forensic. Participants are encouraged to participate in decision making to manage evidence, forensics team, tools and resources.

Fee: MYR1,950.00 | Duration: 2-days

Click here to find out more

The implementation of Business Continuity Management (BCM) is crucial in all organizations regardless of the size and nature of business.

For a company to remain resilient and competitive, a robust BCM system must be in place. This can be achieved through experience, implementation of best practices or standards, specifically the ISO 22301 Business Continuity Management System.

ISO 22301 helps establish a business continuity management system within the organization and clarify roles and responsibilities as well as action plans during disruption. It is also a standard for audit that determines whether an organization is certified. BCMS certification ensures organizational resilience as well as competitive advantage.

Fee: MYR1,800.00 | Duration: 2-days

Click here to find out more

Organisations are increasingly aware of the value of their business-critical information and the need to protect their information related assets.

An Information Security Management System (ISMS) is based on risk management approach to maintain the confidentiality, integrity and availability of the organization’s information. ISMS is a systematic approach in managing an organisation’s information security.

ISO/IEC 27001:2013 Information Security Management System (ISMS) - Requirements - specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of a management system to manage an organization’s information security risks.

This one-day course aims to spread knowledge on the objectives and benefits of information security; the requirements specified in ISO/IEC 27001:2013 ISMS - Requirements; the controls provided in ISO/IEC 27002:2013 Code of Practice for Information Security Controls; and an insight into the emerging ISO 27000 series of standards.

Fee: MYR1,000.00 | Duration: 1-day

Click here to find out more

This course provides a basic introduction to the services delivered by the MyCC Scheme, Common Criteria evaluation and certification concepts and benefits of product/IT system security evaluation. It also serves as a basic guidelines in understanding documents such as Security Targets and Protection Profiles, understanding the role of the sponsor/ developer and what is needed as requirements to participating in Common Criteria evaluation and certification processes.

Fee: MYR1,200.00 | Duration: 1-day

Click here to find out more

Search-Fu - Power Search Techniques is a 2-days hands-on workshop which aims to educate Internet users to search information effectively using various search engines.

Internet users often use only one or two search engines such as Google, Yahoo or Bing and do not leverage on the built-in features in the search engines

There are tons of information on the Internet. Without effective information searching techniques, Internet users will suffer information overload.

There are two different techniques for information searching: recall and precision. In this course participants are able to learn 3 crucial elements that are information searching mindset, various search engines and search-fu skills.

Fee: MYR1,600.00 | Duration: 2-days

Click here to find out more

This training exposes participants with the relevant skills and knowledge in Cloud Computing Security (also known as Cloud Security) supported with the fundamental of understanding the cloud computing technology and its deployment ecosystem. Participants will have the understanding on cloud computing services (IaaS, PaaS, and SaaS) and the understanding of cloud deployment models consist of Public Cloud, Private Cloud and Hybrid Cloud.

Participants will be able to understand the security aspect, requirements, and ecosystems of cloud computing operations from the perspectives of cloud service provider and cloud service subscribers. Understanding the cloud architecture and cloud operations through the views of cloud computing security are crucial in ensuring assurance of secure cloud ecosystem in the cloud operations.

Fee: MYR3,780.00 | Duration: 3-days

Click here to find out more

 

 

Marketing Partner: