Program Overview

A major concern in Malaysia is “Cybersecurity”. Many companies are experiencing loss due to cyber-attacks. Research shows, in the past year alone, 22.5 million people’s data was compromised. Cyber-attacks not only pose a serious threat to businesses, but also impact revenue, brand reputation, and consumer trust.


Malaysia is currently facing three major issues when it comes to Cybersecurity; Increased Digital Transactions, Unsecured IOT devices connected to the network, and Wider array of cybersecurity solutions are needed. More than 20,000 cybercrimes cases were reported on the 2021 itself with the loss of RM560 million.


In order to reduce the issues, it is advisable for people to get themselves trained on the precautions method in order to prevent threats, mitigate risks, and protect its cyber systems.


Topics which will be covered are from to the range of Introduction to Cybersecurity World up to Incidence Response.


Objective

At the end of the programme, the participants will be able to:

Understand about the different types of cybersecurity threats to individuals

Understanding cybersecurity risks and challenges for individuals

Able to know how to mitigate cybersecurity risks for individuals

Aware about cybersecurity best practices for individuals


Learning Outcomes

At the end of this programme, you will have gained the following knowledge and learning, and be able to:

Identify and manage cyber security risks at an organisational level

Analyse cyber security threats for specific case studies

Apply strategies for threat prevention and incident handling including organisational risk management of cyber threats

Identify and explain current trends and developments in cyber threats and mitigation


Learning Approach

Four fundamental principles which will be used in the program:

Highly engaging

Interactive

Innovative

Encourage participation


Program Outline

Module1: Foundation of Security Mindset: Cybersecurity

Module 2: World of Cybersecurity

Module 3: Network Segmentation & Isolation

Module 4: Network Security

Module 5: Penetration Testing


Who Should Attend:

Owners, Helpdesk, Administrators, Technicians and IT Generalists


Methodology

Lectures; interactive discussions; case studies; video presentations, group discussions, and scenario simulations (in groups); and debriefing sessions will be used to enhance learning and understanding Cybersecurity in depth.