You never know how vulnerable you are during your day to day internet usage.
Get to learn all there is to know about cyber security and stay one step ahead of potential threats online.
Duration
6 days / 48 hours
Level
Beginner to Intermediate
Delivery
100% Online - Instructor Led
- Course Code:CYSEC101
- Who Should Join:This course is beneficial to beginners in online marketing.
- Language:English
- Certification:Awarded by ICTC
Key Features
- Personalized Study Resources
- Real-world workshop based learning
- Quality self-paced videos
- Interactive Learning
- Sharable digital badge
Pre-Requisites
- Analytical Mindset
- Willingness to self learn online
- No prior experience is required
- We will start from the very basics
- Committed to complete all tasks
Who Should Join
- Professional switching careers
- Business Analysts
- Students
- New Programmers
- Anyone interested in Python
Program Curriculum
Module 1 - Introduction To Ethical Hacking
Introduction To Ethical Hacking
- What is Hacking
- What is Ethical Hacking
- What is Penetration Testing
- What is Vulnerability Auditing
Module 2 - Footprinting
Footprinting
- What is FootPrinting
- Footprinting Techniques
- Footprinting Website & Tools
Module 3 - Scanning
Scanning
- What is Network scanning
- Types of Scanners
- Vulnerability Scanner Tools
Module 4 - Proxy
Proxy
- What is a proxy server
- Types of proxies
- What is a Darkweb
- Why hackers prefer to use Darkweb
Module 5 - Hacking Web Servers & Web Applications
Hacking Web Servers & Web Applications
- What is a web server
- Types of web attacks
Module 6 - Session Hijacking
Session Hijacking
- What is session hijacking
- Session hijacking Techniques
- Session hijacking Tools
Module 7 - Denial Of Service
Session Hijacking
- What is a DoS and DDoS attack
- DoS attack techniques
- DoS attack Tools
Module 8 - System Hacking
System Hacking
- What is System Hacking
- What is Password Cracking
- Password Cracking techniques Password Cracking Website & Tools
Module 9 - Sniffers
Sniffers
- What is a sniffer
- Sniffing Techniques
- Sniffing Tools
Module 10 - Phising
Phising
- What is Phishing
- Phishing Techniques
- Sniffing Tools
Module 11 - Malware
Malware
- What is malware
- Types of malware
- Malware creation Tools
- USB password stealers
Module 12 - Wireless Hacking
Wireless Hacking
- Types of wireless networks
- Wireless Hacking Techniques
- Wireless Hacking Tools
Module 13 - Kali Linux
Kali Linux
- What is Kali Linux
- Kali Linux Tools
Module 14 - Introduction To Security
Introduction To Security
- What is security?
- Layer 1 Security
- Layer 2 Security
- Layer 3 Security
Module 15 - Firewalls
Firewalls
- What is a Firewall?
- Types of firewalls
- Designing Security with Firewalls NAT
- Security Policy
- Logs Management
- Application Security
- Content / Web Security
- Authentication
Module 16 - Virtual Private Networks
Virtual Private Networks
- What is VPNs
- Type of VPNs
- GRE
- IPSEC
- SSL
Module 17 - Intrusion Prevention Systems
Intrusion Prevention Systems
- What is an Intrusion Detection System?
- What is an Intrusion Prevention System?
Module 18 - High Availability Virtual / Cloud Devices Security Host Security
High Availability Virtual / Cloud Devices Security Host Security
- OS Hardening
- Patch management
- Antivirus
- Endpoint Security
Module 19 - SIEM
SIEM
- Introduction to SIEM
- SIEM Architecture
- Events and Logs
- Event Correlation and Event Collection Correlation Rules
- Forensic Data
- SIEM Deployment
Module 20 - Incident Response
Incident Response
- Introduction Incident Response Incident Response Policy
- Incident Handling
- Forensics of Incident response
- Inside Threat
- Incident Recovery
- Malware Analysis
Module 21 - Mobile Forensics
Mobile Forensics
- Forensic Acquisition of Smartphones
- -Logical Acquisition
- -File System Acquisition
- -Physical Acquisition
- Android Forensics
- Retrieving User Activity Information from Android Devices
- iOS (iPhone) Forensics
- Retrieving User Activity Information iOS Devices
Our Training Methodology
Practical Assignments
We provide hands-on assignments that requires practical implementation.
Virtual Coaching Sessions
Online coaching sessions that happen over the phone, via video, or on a web platform.
1 Year Access to LMS
Get access to learning resources upto 1 year of class completion.
Live Project Experience
Hands-on learning and training gives participants the opportunity to experience real world situations.
Online Assessments
Participants can assess reflect on their own learning and their level/skills.
Free Industry Webinars
Stay current on market research trends, learn best practices through our webinar sessions.
Key Features
- 40 hours of instructor led training
- Fully Online
- Class recording available
- Interactive Learning
- 8 hour Coaching Session
- 100% HRDF SBL-KHAS Claimable!
Pre-Requisites
- General programming experience and knowledge of HTML, CSS and JavaScript.
- Analytical Mindset
- Willingness to self learn online
- We will start from the very basics
- Committed to complete all tasks
Who Should Join
- Professional switching careers
- Web Developers
- IT Engineers
- Students
- New Programmers
Program Key Highlights

40 hours of Remote Online Learning

80 Additional Self Learning Hours

12 Live Hands-on Projects

Certified by International Body

Mentorship with Industry Experts

Designed for Beginners & Professionals
Request for more Information
Your Instructor

Thayanithy Jegan
CTO & Co-Founder of Thulija Technologies,
Certified Trainer and Consultant
Certified Trainer and Consultant
A seasoned technology professional with over 17 years of industry experience as a software developer, solutions architect and technology consultant for major organizations.
Thayanithy Jegan has trained executives and developers in companies such as Maxis, IFCA, SWIFT, PSDC, DHL, Standard Chartered, Infineon Technologies, Siemens and Bank Negara to name a few to break into various technology stacks and as well as data science, big data, and artificial intelligence.
He has led major projects with clients such as Suruhanjaya Syarikat Malaysia (SSM), MYCOID, Kementerian Kerja Raya, Ministry of Education (MOE), Universiti Malaya, Perfisio Solutions, Kementerian Perdagangan Antarabangsa dan Industri, amongst others. He has also served as a Consultant for MIMOS Berhad, a Research and Development organisation that functions as an advisor to the Malaysian Government on technologies, policies and strategies relating to IT.

Get Professionally Certified
Upon successfully completing this program, participants will be awarded the Professional Certification in Python Data Science by International Council for Technology Certifications (ICTC).
This award is a validation to the efforts taken to master the domain expertise that will set you apart from your competition.
Be a part of the global network of data science professionals and join the community across sectors.
Get in Touch With Us Today!
This training program is suitable for anyone who intends to enter into the field of Cybersecurity. This program is being conducted in Malaysia and can be joined by anyone, anywhere in the world remotely.
Program Fee
RM 3,700.00
One-time fee. One year access to course materials.
READY TO STEP UP YOUR CYBERSECURITY CAREER?
Please fill in the form and a Program Advisor will reach out to you. You can also reach out to us at yenita@thulija.com or +6281268456997
Contact us on Whatsapp for more enquiries