Fundamental Of Cyber Security

by Iconic Training Solutions Claim Listing

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Iconic Training Solutions Logo

img Duration

2 Days

Course Details

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

 

Course Objectives:

Upon completion of this program, the participants will be able to:

  • Understand landscape of cyber security around the world

  • Recognize the trends of cyber security

  • Understand standards and legislative requirements with regards to data protection

  • Recognize cyber attacks and other risks

  • Protect and monitor against threats

  • Manage cyber security incidents

  • Develop good cyber security practices for your organization

 

Key Content:

  • Module 1: Landscape Cyber Security

    • What is cyber security?

    • Trends of cyber security

    • Importance of data protection

    • Recent and major data breaches

  • Module 2: Standards and Legislatures

    • Cyber security legislation

    • Data protection laws

    • Rules of background and words

  • Module 3: Types of Cyber Attack

    • Hardware vulnerabilities

    • Virus and malicious software

    • Spyware and ransomware

    • Attacks on mobile applications

    • IOT - Internet of Things

  • Module 4: Other Non-Technical Risks

    • Social engineering

    • Vishing - voice phising

    • Fake links

    • MITM attack

    • Identity theft

  • Module 5: Good Practices

    • Drafting policies and practices

    • Bring your own devices

    • Browsing safety

    • Use of social media

    • Passwords and 2FA

  • Module 6: Protect and Monitor Threats

    • 3 key principles of data protection

    • Obligations of cyber security

    • Audit and monitor

    • Digital hygiene

  • Module 7: Manage Incidents and Breaches

    • Definition of incident and breach

    • Reporting an incident

    • Recovering from an incident or breach

    • Public relations and response to the affected parties

  • Shah Alam Branch

    S1-30-12, D'sara Sentral, Jalan Welfare, Sungai Buloh, 40160, Shah Alam

Check out more Cybersecurity courses in Malaysia

Trainocate Malaysia Logo

CISM (Certified Information Security Manager)

ISACA’s Certified Information Security Manager (CISM) certification is designed for experienced IT security professionals who want to demonstrate their skills in information security management. CISM holders are recognized as experts in the field and are highly sought after by employers.

by Trainocate Malaysia [Claim Listing ]
Symphony Digest Logo

Cyber Security

Cyber Security course is offered by Symphony Digest. Whether you are looking for public courses or HR looking for in-house courses, Symphony has over 200 courses to suit your needs.

by Symphony Digest [Claim Listing ]
New Horizons Logo

CyberSecurity First Responder

CyberSecurity First Responder Training course is offered by New Horizons. We are the authorised learning partner to the top technology providers.

by New Horizons [Claim Listing ]
AA Knowledge Malaysia Sdn Bhd Logo

Certificate In Cyber Security

Certificate in Cyber Security is offered by AA Knowledge Malaysia Sdn Bhd. We fill needs creatively and seek new ways of looking at old problems. By promoting learning, research, and education, we contribute to the advancement of education and training.

by AA Knowledge Malaysia Sdn Bhd [Claim Listing ]
TD SYNNEX Malaysia Logo

Certified Information Security Manager (CISM) Certification (CISM)

This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice, and copious amounts of experience in the realm of inf...

by TD SYNNEX Malaysia [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy