Program Overview
A major concern in Malaysia is “Cybersecurity”. Many companies are experiencing loss due to cyber-attacks. Research shows, in the past year alone, 22.5 million people’s data was compromised. Cyber-attacks not only pose a serious threat to businesses, but also impact revenue, brand reputation, and consumer trust.
Malaysia is currently facing three major issues when it comes to Cybersecurity; Increased Digital Transactions, Unsecured IOT devices connected to the network, and Wider array of cybersecurity solutions are needed. More than 20,000 cybercrimes cases were reported on the 2021 itself with the loss of RM560 million.
In order to reduce the issues, it is advisable for people to get themselves trained on the precautions method in order to prevent threats, mitigate risks, and protect its cyber systems.
Topics which will be covered are from to the range of Introduction to Cybersecurity World up to Incidence Response.
Objective
At the end of the programme, the participants will be able to:
Understand about the different types of cybersecurity threats to individuals
Understanding cybersecurity risks and challenges for individuals
Able to know how to mitigate cybersecurity risks for individuals
Aware about cybersecurity best practices for individuals
Learning Outcomes
At the end of this programme, you will have gained the following knowledge and learning, and be able to:
Identify and manage cyber security risks at an organisational level
Analyse cyber security threats for specific case studies
Apply strategies for threat prevention and incident handling including organisational risk management of cyber threats
Identify and explain current trends and developments in cyber threats and mitigation
Learning Approach
Four fundamental principles which will be used in the program:
Highly engaging
Interactive
Innovative
Encourage participation
Program Outline
Module1: Foundation of Security Mindset: Cybersecurity
Module 2: World of Cybersecurity
Module 3: Network Segmentation & Isolation
Module 4: Network Security
Module 5: Penetration Testing
Who Should Attend:
Owners, Helpdesk, Administrators, Technicians and IT Generalists
Methodology
Lectures; interactive discussions; case studies; video presentations, group discussions, and scenario simulations (in groups); and debriefing sessions will be used to enhance learning and understanding Cybersecurity in depth.