INDUSTRY BACKGROUND

The demand for workers with expertise in cybersecurity will almost double in the next two years, according to communications and digital minister Fahmi Fadzil. Citing a new joint study by the department of skills development (JPK), The Centre for Instructor and Advanced Skill Training (CIAST) and CyberSecurity Malaysia, Fahmi said the country will need 27,000 such workers by the end of 2025, up from the 15,248 on the payroll now.

Malaysia should gear itself towards cyber resilience as the threat of a global Cybersecurity breach continues to pose a major risk. Cybersecurity expert Professor Dr Selvakumar Manickam from Universiti Sains Malaysia said the country should produce more cybersecurity engineers and invest in acquiring the latest technology while constantly evaluating all public portals and websites.

https://www.nst.com.my/news/nation/2021/06/697745/cybersecurity-threats-malaysia-must-bolster-systems-websites

His suggestions came following a global Internet outage on Tuesday that took down several major online platforms and sites, including Amazon, Target, The Guardian, Financial Times and New York Times and the United Kingdom government’s website — Gov.uk..

The Minister of Communications and Multimedia (KKMM), Datuk Saifuddin Abdullah said in today’s digital technology era, cybersecurity has become riskier and more complicated because the more technology evolves, the more complex and sophisticated the threats and cyberattacks become.

https://www.theedgemarkets.com/article/kkmm-cybersecurity-malaysia-%20committed-strengthening-national-cyberspace-security

In this age of super-connectivity, Information Security has become a hot-button issue for the modern organization. Instead of information breach due to external threat from the hackers; many organizations are facing internal risks from trusted sources within the organization itself at the same time. Malicious hacking, Trojans, backdoor and worm attacks on organizations lead to a loss of billions of dollars every year.

In general, the primary root that leads to information breach is the lack attention and effort of the organization towards its IT Security and insufficient up-to-date knowledge from IT Security workforce. A consistent IT Security Training for the IT Security workforce is the best solution for an organization to defend from information breach that never cost the amount in the statement.

DEMAND FOR EMPLOYMENT

Cybersecurity is one of the central pillars of the digital economy, recording more than twice the overall ICT spending growth in the country over the next five years, according to an IDC report. With the recently launched Malaysia Cyber Security Strategy (MCSS) and MyDIGITAL, 20,000 cyber security knowledge workers are needed by 2025 to support the cybersecurity workforce demand from the industry, according to Malaysia Digital Economy Corporation (MDEC) Chief Executive Officer Surina Shukri.

https://mdec.my/digital-economy-initiatives/for-the-industry/entrepreneurs/cybersecurity/

According to statistics shared by the Malaysia Digital Economy Corporation (MDEC), Malaysia is one of the best ranking countries in the Asean region based on potential in the cyber-security industry with an anticipated demand for 10,500 cyber-security talents in Malaysia by 2023

Talent in cybersecurity is scarce, not just in Malaysia. We should encourage more universities to conduct this kind of training. But threats keep evolving. The only people who can continue to stay in the cybersecurity profession are those who keep improving their skills to meet the ever-evolving threats.

https://www.theedgemarkets.com/article/cybersecurity-hiring-cope-cybersecurity-threats

There is a huge need globally for Certified Cybersecurity Professionals. The Certified Cybersecurity Professional program provides you an industry standard information security curriculum and is accompanied by a highly sought- after certification that helps establish to groom information security experts

THE PROGRAMME

This Certified Cybersecurity Professional certification program is a full stack programme that will immerse participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

Many courses have cropped up offering training in so-called “ethical hacking”. But these courses deal with only one half of the security equation. To build highly secure networks, professionals need to be aware of different methods of hacking and at the same time know how to make networks secure from these intrusions using firewalls, UTMs, antivirus, etc. This is the only course which teaches both hacking and countermeasure techniques.

The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed.

Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. Participants will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a participant leaves this intensive 10day class they will have hands on understanding and experience in Ethical Hacking.

The tools and techniques that you will learn are not confined to any particular vendor or platform. The aim of this program is to train the ethical hacker of tomorrow who is equally at ease in protecting the conventional or the latest cutting-edge network.

PROGRAMME OBJECTIVE

To equip one with the best knowledge to spot and understand threats at the point of risk and ensures that one will the first layer of cyber defence instead of being a company’s biggest risk. The programme will also create an understanding of ESG in cyber security

PROGRAMME OUTPUT

  • Explain the threat landscape and break down two (2) the types of threats and vulnerabilities.
  • Learn how attacks are identified and how defensive cybersecurity responses are established.
  • Discuss three (3) key components and sequences of incident response frameworks.
  • Respond and mitigate two (2) risks associated with Operational Technology (OT) and Internet of Things (IoT) devices.
  • Discuss artificial intelligence (AI) techniques and how they relate to the cyber environment.

PROGRAMME LEARNING OUTCOME

    • Able to manage hacking and penetration testing activities.
    • Understand the methodologies to defend any hacking as a front liner.
    • Able to build a virtual hacking environment, attack networks, and break passwords
    • To be more EMPLOYABLE with the current demand for cyber security personnel

Course Content

Module 1: Security Risk Assessment (Ethical Hacking)

  • Introduction To Ethical Hacking
  • Footprinting
  • Proxy
  • Hacking Web Servers & Web Applications
  • Session Hijacking
  • Denial Of Service
  • Sniffers
  • Phishing
  • Malware
  • Wireless Hacking
  • Kali Linux

Module 2: Proactive Defense And Countermeasures

  • Introduction To Security
  • Firewalls
  • Intrusion Prevention Systems
  • Virtual Private Networks
  • High Availability Virtual / Cloud Devices Security Host Security

Module 3: Incident Response and Management

  • Siem
  • Incident Response
  • Mobile Forensics

Module 4: Introduction to AI in Cybersecurity

  • AI-Powered Threat Detection and Prevention
  • AI-Driven Security Analytics
  • AI – Automated Incident Response
  • AI-Powered User Behavior Analysis
  • AI for Vulnerability Management
  • AI in Threat Intelligence
  • Future Trends and Opportunities

Module 5: Cyber Hygiene

Cyber Hygiene emphasizes the importance of maintaining secure online practices for individuals and organizations. Password Management covers creating strong passwords and utilizing management tools. Software Updates and Patch Management discuss risks of outdated software and methods for mitigation. Phishing Awareness and Secure Web Browsing highlight recognizing threats and safe practices. Social Engineering, Data Backup, and Mobile Device Security address defense strategies and risk mitigation

Module 6: Integrating ESG Into Cybersecurity

  • Understanding ESG and Cybersecurity
  • ESG – Centric Cyber Security Tools

Exam Preps

  • Participants will be grilled with 200 questions over a day
  • Mock Exams

Programme Delivery Methodology:

  • Face to Face or Online Training
  • Practical/ Lab Exercise

DURATION

  • 3 days

ENTRY REQUIREMENT

Basic understanding of IT

ASSESSMENT METHOD

Candidates will need to sit for computerized examination for 2 Hours

LEARNING MATERIALS

There will be a student manual and lab workbook for each participant developed by US Council

PASSING RATE

The Passing rate is 70%

For more information, please contact:

       Certified Cyber Security Professional: Pivot, Adapt & Plan For The Future

DATE, VENUE AND FEES

10-14 June 2024, 15-19 July 2024, 26-30 Aug 2024, 9-13 Sept 2024, 14-18 Oct 2024, 25-29 Nov 2024, 2-6 Dec 2024

  • All the programmes can be conducted in house.
  • For SEO programme (inhouse only) they will be given a free six-month SEO package worth MYR 9,000

    Your Name (required)

    Your Primary Email (required)

    Your Contact Number (required)

    Date

    Your Enquiry or Message