We are a Registered Trainer under Pembangaunan Sumber Manusia Berhad.(HRDF)
We provide specialized training to increase the compendency level of your staff.

SBL-Khas Program

 

SBL-KHAS

Digital Threats & Cyber Security: The New Business Priority

Two-Day Course

Day 1 - Topics

a) Information Security: An Overview

b) Digital Threats & Cyber Crimes

c) Securing Information In The Digital Economy Age

d) Ransomware

e) PenTesting (Simplified)

f) Information Security Risk Management

 

Day 2 - Topics

a) Information Security & Cryptography

b) Computer Forensics

c) Micro Segmentation for Data Centers.

d) Secure Key Management System

 

Course Objective:

Explain the core information assurance principles

  • Identify the key components of cyber security network architecture
  • Apply cyber security architectural principles
  • Describe risk management processes and practices
  • Identify security tools and hardening techniques
  • Distinguish system and application security threats and vulnerabilities
  • Describe different classes of attacks
  • Define types of incidents including categories, responses and timelines for response
  • Describe new and emerging IT and IS technologies
  • Analyze threats and risks within context of the cyber security architecture
  • Appraise cyber security incidents to apply appropriate response
  • Evaluate decision-making outcomes of cyber security scenarios
  • Access additional external resources to supplement knowledge of cyber security

 

 

 

Learning Outcomes:

By the end of this course you should have developed an understanding of:

This course will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how to recognize the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you. With cyber security often in the news today, the course will also frame your online safety in the context of the wider world, introducing you to different types of malware, including viruses and trojans, as well as concepts such as network security, cryptography, identity theft and risk management.

The course will help you to recognize the importance of information security and its management how to planned, documented and compliance to industry standard.

It will also help you comprehend information security in the context of the mission of a business. How you select appropriate techniques to tackle and solve problems in the disciplinary organization.

Our Speaker

prof-magdy

Magdy Saeb received the BSEE. School of Engineering, Cairo University, in 1974, the MSEE, and Ph.D. Degrees in Electrical & Computer Engineering, University of California, Irvine, in 1981 and 1985, respectively. He was with Kaiser Aerospace and Electronics, Irvine California, and The Atomic Energy Establishment, Anshas, Egypt. He is a professor emeritus & former head of  the Department of Computer Engineering, Arab Academy of Science, Technology & Maritime Transport, Alexandria, Egypt.

He was on leave working as a principal researcher in the Malaysian Institute of Microelectronic Systems (MIMOS). Now he is the CTO of Great Wall Information Security, Kuala Lumpur, Malaysia. His current research interests include Cryptography, FPGA Implementations of Cryptography and Steganography Data Security Techniques, Encryption Processors, Mobile Agent Security.

He holds five US/Intellectual Property Patents in the area of Cryptography. He has published more than 70 technical peer-reviewed papers in the information security area.

www.magdysaeb.net

Who Should Attend:

 

  • Chief Information Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Chief Operating Officers
  • Heads of Department
  • Senior Managers
  • Manager of Information Security
  • Manager of Network Security
  • Information Technology Personnel
  • Management Information System  Operations
  • Computer Forensics Personnel
  • System Architecture Developers
  • IT Audit, Business Consultant & Risk Analyst
  • HR Manager
  • Lawyers
  • Consultants
  • Project Managers
  • Accountants
  • Information Security Students

 

 

SBL-KHAS

A Brief Introduction to Digital Threats & Cyber Security

One-Day Course

Day 1 - Topics

a) Information Security: An Overview

b) Digital Threats & Cyber Crimes

c) Ransomware & Computer Forensics

d) Information Security Risk Management

 

 

 

 

Course Objective:

Explain the core information assurance principles

  • Describe risk management processes and practices
  • Identify security tools and hardening techniques
  • Distinguish system and application security threats and vulnerabilities
  • Describe different classes of attacks
  • Define types of incidents including categories, responses and timelines for response
  • Describe new and emerging IT and IS technologies
  • Analyze threats and risks within context of the cyber security architecture
  • Appraise cyber security incidents to apply appropriate response

 

Learning Outcomes:

By the end of this course you should have developed an understanding of:

  • Learn about current Digital Threats & Cyber Crime
  • Learn about Cryptography as a counter measure
  • Learn about shortcoming of traditional firewalls
  • Learn about Basic Data Risk Management
  • Learn about Basic Computer Forensics

 

Our Speaker

prof-magdy

Magdy Saeb received the BSEE. School of Engineering, Cairo University, in 1974, the MSEE, and Ph.D. Degrees in Electrical & Computer Engineering, University of California, Irvine, in 1981 and 1985, respectively. He was with Kaiser Aerospace and Electronics, Irvine California, and The Atomic Energy Establishment, Anshas, Egypt. He is a professor emeritus & former head of  the Department of Computer Engineering, Arab Academy of Science, Technology & Maritime Transport, Alexandria, Egypt.

He was on leave working as a principal researcher in the Malaysian Institute of Microelectronic Systems (MIMOS). Now he is the CTO of Great Wall Information Security, Kuala Lumpur, Malaysia. His current research interests include Cryptography, FPGA Implementations of Cryptography and Steganography Data Security Techniques, Encryption Processors, Mobile Agent Security.

He holds five US/Intellectual Property Patents in the area of Cryptography. He has published more than 70 technical peer-reviewed papers in the information security area.

www.magdysaeb.net

Who Should Attend:

 

  • Chief Information Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Chief Operating Officers
  • Heads of Department
  • Senior Managers
  • Manager of Information Security
  • Manager of Network Security
  • Information Technology Personnel
  • Management Information System  Operations
  • Computer Forensics Personnel
  • System Architecture Developers
  • IT Audit, Business Consultant & Risk Analyst
  • HR Manager
  • Lawyers
  • Consultants
  • Project Managers
  • Accountants
  • Information Security Students

 

Mode of Payment

  • The fees will be paid by PSMB to the training providers concerned on behalf of the employers
  • PSMB will debit the fees claimed to employers’ levy accounts.
  • Employers are required to submit their claims to PSMB based on stipulated guidelines. Claims must be submitted upon completion of training.

 

Your investment:

Type Condition Price Per Pax
Regular Fee - RM850.00

 

Cancellation Policy:

 

a) Participant who are registered but did not attend will be invoiced accordingly.

b) Fees will only be refunded in full for cancellation received in writing for more than ten (10 ) working days prior to the commencement date.

c) Substitute attendee(s) will be accepted at no extra charge.

d) If written notice of  withdrawal is given less than ten (10) calendar days before course/program commencement, a 50% penalty charges will be levied.

Disclaimer:

IJCSCS Sdn. Bhd. reserves the right to change the instructors, date and to vary/cancel the program should unavoidable circumstances arise. All effort will be taken to inform participants of the changes. Upon sending the registration form, you are deemed to have read and accepted the terms.