Cart RM0.00
0
0
Subtotal: RM0.00

No products in the cart.

[Online / Physical] Introduction To Cyber Security

About Course

This introductory course is the fastest way to get up to speed in cyber security. Written and taught by battle-scarred security veterans, this course covers a broad spectrum of security topics and is liberally sprinkled with real life examples. A balanced mix of technical and managerial issues makes this course appeal to attendees who need to understand the salient facets of cyber security basics.


Objectives:
This course provides a basic level of cyber security. You will learn to protect your organization from social engineering attacks and cyber threats through disaster recovery methods that ensure continuity of operations. In this cyber security awareness course, you will learn how to establish security in your organization by assessing your environment, identifying needs and deficits, and enumerating critical elements of security awareness.


Learning Outcome:
On completion of this course, each delegate will be able to:
-Achieve the goals of cyber security
-Promote user responsibility and data security
-Examine malicious insider threats
-Fortify the organization against outside attacks


Course Outline:

Day1
M1: Cyber Security Essentials (The guiding principles behind information security are that information be only read by the right people, only changed by authorised people or processes and be available to read and use whenever required)
-Introduction to cyber security
-Cyber security management
-Cyber terrorism

M2: Understanding the Current Threat Landscape (Threats can take many different forms, including unauthorised access to data with the intent of committing fraud against individuals and businesses. At its most extreme, there is the potential for the systematic disruption of computer networks and services, putting cyber security threats on a par with those associated with terrorism)
-Threat landscape
-Securing digital information
-Next gen firewalls and controls

M3: New Age Threat (With the advancement of information technology in the 21st century, major threats to users online like malware and phishing becomes more evident. As these threats evolve, the prowess by individual programmers to sophisticated technologies developed by organised crimes, the boundaries between the different categories are beginning to blur)
-Malware
-Phishing
-Data theft

M4: Cryptography (There have been many applications of cryptography throughout history to be more sophisticated medieval ciphers that withstood most attacks until the late
19th century and the famous Enigma codes of World War II. Encryption has become a key ingredient in today’s computing scenario)
-Plaintext and ciphertext
-Email encryption – using cryptography to prove identity
-Encrypted network connections

Day 2

M5: Networking & Communications (The internet is not a single entity with a single owner; instead it comprises a hierarchy of individual networks that have been connected to one another. These networks range from local area networks (LANs) that can be found in
many businesses to the telephone and data networks that link cities and countries by fibre optic cables and satellite links)
-How does the internet work
-Network security challenges
-Role of standards

M6: Network Security (This module explores different ways of protecting the underlying communication networks and computers we use from attack)
-Protecting your data on the network
-Keeping your secrets on the network
-Detecting attacks

M7: Managing Security Risks (In today’s digital world, it is increasingly apparent that information is the most important asset, for both businesses or individuals. – just think of the value of music to a media company or a games program to a video game company. Digital information and data assets covers everything that can be stored, processed or transmitted through digital systems. Considering information as an asset allows us to create strategies for protecting information and minimizing the consequences of any disaster)
-Analyzing security risks
-Managing and mitigating cyber risks
-Approaches to risk management, cyber incident response and business continuity
-Why ISO 22301 is essential to achieving cyber resilience


Who Should Attend This Course?
-IT professionals who are interested in learning the main principles of cybersecurity and computer-based attacks.
-Team leaders and managers interested in understanding the terminology and possibilities in cybersecurity.
-System administrators requested to integrate security components in their networks.
-Individuals that would like to get a better understanding of cybersecurity fundamentals acquired previously.
-Consultants looking for solutions in security assessments for organizations.

Pre-Requisites:

  • Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices.
  • Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Mac).

Duration:

  • This is a two (2) days course from 0900-1700 (Face to Face or Remote Online Training is available upon arrangement).

Training With Sincera Mayle Consulting Means:

  • Delegates will be trained by experienced tutors who are passionate to share their knowledge.
  • Reliable and trusted experts with years of hands-on experience to enhance delegates’ learning curve.
  • Sincera Mayle Consulting is recognized training provider by Exemplar Global.

Find Out More With Us:

  • If want to learn more, please contact us for following training courses:
  • Root Cause Analysis
  • Risk Management
  • Effective Project Management
  • Transforming Business for Resilience
  • Engaging Leadership
  • Strategic Thinking for Leaders
  • Improving Performance Through Effective Delegation
  • Exemplar Global Certified ISO 9001 (Quality Management Systems) Lead Auditor Course.

[Online / Physical] Introduction To Cyber Security

RM1,700.00
0
Intermediate

About Course

This introductory course is the fastest way to get up to speed in cyber security. Written and taught by battle-scarred security veterans, this course covers a broad spectrum of security topics and is liberally sprinkled with real life examples. A balanced mix of technical and managerial issues makes this course appeal to attendees who need to understand the salient facets of cyber security basics.


Objectives:
This course provides a basic level of cyber security. You will learn to protect your organization from social engineering attacks and cyber threats through disaster recovery methods that ensure continuity of operations. In this cyber security awareness course, you will learn how to establish security in your organization by assessing your environment, identifying needs and deficits, and enumerating critical elements of security awareness.


Learning Outcome:
On completion of this course, each delegate will be able to:
-Achieve the goals of cyber security
-Promote user responsibility and data security
-Examine malicious insider threats
-Fortify the organization against outside attacks


Course Outline:

Day1
M1: Cyber Security Essentials (The guiding principles behind information security are that information be only read by the right people, only changed by authorised people or processes and be available to read and use whenever required)
-Introduction to cyber security
-Cyber security management
-Cyber terrorism

M2: Understanding the Current Threat Landscape (Threats can take many different forms, including unauthorised access to data with the intent of committing fraud against individuals and businesses. At its most extreme, there is the potential for the systematic disruption of computer networks and services, putting cyber security threats on a par with those associated with terrorism)
-Threat landscape
-Securing digital information
-Next gen firewalls and controls

M3: New Age Threat (With the advancement of information technology in the 21st century, major threats to users online like malware and phishing becomes more evident. As these threats evolve, the prowess by individual programmers to sophisticated technologies developed by organised crimes, the boundaries between the different categories are beginning to blur)
-Malware
-Phishing
-Data theft

M4: Cryptography (There have been many applications of cryptography throughout history to be more sophisticated medieval ciphers that withstood most attacks until the late
19th century and the famous Enigma codes of World War II. Encryption has become a key ingredient in today’s computing scenario)
-Plaintext and ciphertext
-Email encryption – using cryptography to prove identity
-Encrypted network connections

Day 2

M5: Networking & Communications (The internet is not a single entity with a single owner; instead it comprises a hierarchy of individual networks that have been connected to one another. These networks range from local area networks (LANs) that can be found in
many businesses to the telephone and data networks that link cities and countries by fibre optic cables and satellite links)
-How does the internet work
-Network security challenges
-Role of standards

M6: Network Security (This module explores different ways of protecting the underlying communication networks and computers we use from attack)
-Protecting your data on the network
-Keeping your secrets on the network
-Detecting attacks

M7: Managing Security Risks (In today’s digital world, it is increasingly apparent that information is the most important asset, for both businesses or individuals. – just think of the value of music to a media company or a games program to a video game company. Digital information and data assets covers everything that can be stored, processed or transmitted through digital systems. Considering information as an asset allows us to create strategies for protecting information and minimizing the consequences of any disaster)
-Analyzing security risks
-Managing and mitigating cyber risks
-Approaches to risk management, cyber incident response and business continuity
-Why ISO 22301 is essential to achieving cyber resilience


Who Should Attend This Course?
-IT professionals who are interested in learning the main principles of cybersecurity and computer-based attacks.
-Team leaders and managers interested in understanding the terminology and possibilities in cybersecurity.
-System administrators requested to integrate security components in their networks.
-Individuals that would like to get a better understanding of cybersecurity fundamentals acquired previously.
-Consultants looking for solutions in security assessments for organizations.

Pre-Requisites:

  • Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices.
  • Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Mac).

Duration:

  • This is a two (2) days course from 0900-1700 (Face to Face or Remote Online Training is available upon arrangement).

Training With Sincera Mayle Consulting Means:

  • Delegates will be trained by experienced tutors who are passionate to share their knowledge.
  • Reliable and trusted experts with years of hands-on experience to enhance delegates’ learning curve.
  • Sincera Mayle Consulting is recognized training provider by Exemplar Global.

Find Out More With Us:

  • If want to learn more, please contact us for following training courses:
  • Root Cause Analysis
  • Risk Management
  • Effective Project Management
  • Transforming Business for Resilience
  • Engaging Leadership
  • Strategic Thinking for Leaders
  • Improving Performance Through Effective Delegation
  • Exemplar Global Certified ISO 9001 (Quality Management Systems) Lead Auditor Course.

Request For Training

Fill in the form below , and we will contact you soon!