Program Overview

Cybersecurity is a top concern in Malaysia right now. Majority of Malaysian organizations fear of cyber- attacks in the nearest future. Based on Cyber Risk Index (CRI), top five cyber threats in Asia-Pacific are; Phishing and Social Engineering, Botnets, Fileless attacks, Ransomware, Denial of Service. Malaysia has lost over RM2.23 billion to Cybercrime. And most importantly, Malaysia stands as the eleventh most breached country on the year 2022 itself.


So, what are the underlying factor behind such a number of cybercrimes reported in Malaysia?


This course has been designed specially based on recent cybercrime issues in Malaysia. The topics are compiled accordingly for easier understanding and adaptation.


Various topics will be covered ranging from Cybercrime in Malaysia, and ways to prevent the attacks.


Objective

At the end of the programme, the participants will be able to:

Understand better on the awareness of the security impact associated with a significant cyber incident

Develop an understanding of both physical and online security requirements

Examine the processes of identification, authorization and access of individual users to specific information.

Develop skills and understanding of the actions associated with responding to cyber-attack through malware.

To familiarize the participants with cyber incident handling experience

To reduce the risk of loss, unauthorized disclosure, or unauthorized modification of information and information systems.


Learning Outcomes

At the end of this programme, you will have gained the following knowledge and learning, and be able to:

Identify and manage cyber security risks at an organisational level

Analyse cyber security threats for specific case studies

Apply strategies for threat prevention and incident handling including organisational risk management of cyber threats

Evaluate and communicate the human role in security systems with an emphasis on ethics, social engineering vulnerabilities and training

Identify and explain current trends and developments in cyber threats and mitigation


Learning Approach

Four fundamental principles which will be used in the program:

Highly engaging

Interactive

Interactive

Encourage participation


Program Outline

Module 1: Cybersecurity Landscape “Malaysia”

Module 2: Social Engineering

Module 3: Cyber Threat Intelligence

Module 4: Architecture & Design

Module 5: Advanced Persistent Threat

Module 6: Cloud Security

Module 7: Security Operations Centre

Module 8: Cybersecurity Incidence Response


Who Should Attend:

Whoever would like to understand and apply Cybersecurity. Minimum education requirement (SPM)


Methodology

Lectures; interactive discussions; case studies; video presentations, group discussions, and scenario simulations (in groups); and debriefing sessions will be used to enhance learning and understanding Cybersecurity in depth.