Whatsapp Us


Visit Facebook


Visit Instagram


Visit TikTok

Training Promo Image

This program is HRD Corp Claimable!

Click below to pre-register and to learn more about this program.
We are here to guide you!

COURSE CONTENT


CYBERSECURITY AWARENESS TRAINING
Duration: 2 Days

MODULE 1: Cybersecurity Fundamentals

  • Content:
    • Overview of cybersecurity concepts, focusing on current trends and challenges.
    • Understanding Malaysia’s cybersecurity status and its global implications.
    • The importance of cybersecurity in protecting data, systems, and organizations in the digital age.
    • Challenges in cyberspace, including evolving threats and the need for proactive security measures.
  • Objectives & Outcomes:
    • Grasp fundamental cybersecurity concepts and their relevance in today’s context.
    • Analyze the challenges posed by cybercrime and identify proactive strategies to safeguard sensitive information.
    • Understand the implications of data breaches and the importance of protecting privacy.

MODULE 2: Social Media Security

  • Content:
    • Common cyberattacks targeting social media platforms such as phishing, scams, and malware.
    • Risks associated with data theft and privacy invasion through social networks.
    • Best practices for securing personal and organizational social media accounts.
  • Objectives & Outcomes:
    • Learn to recognize social media vulnerabilities, including scams and cyberbullying.
    • Develop strategies to mitigate risks, secure accounts, and protect sensitive information.
    • Enhance awareness of privacy and data security in the context of social platforms.

MODULE 3: Banking Scams

  • Content:
    • Examination of techniques hackers use to compromise banking systems, including phishing and account breaches.
    • Recognizing counterfeit domains and identifying phishing emails.
    • Best practices for safeguarding online banking credentials and transactions.
  • Objectives & Outcomes:
    • Understand the methods attackers use to exploit banking systems and prevent unauthorized access.
    • Develop skills to identify legitimate emails and protect against phishing attempts.
    • Enhance online banking security awareness to safeguard against fraud.

MODULE 4: WhatsApp Security

  • Content:
    • Exploration of cyber threats specific to WhatsApp, including phishing and data theft.
    • Overview of WhatsApp’s security features, such as two-factor authentication and encryption.
    • Identifying and mitigating scams designed to exploit users on WhatsApp.
  • Objectives & Outcomes:
    • Understand WhatsApp-related threats and scams.
    • Configure WhatsApp’s built-in security features for enhanced protection.
    • Identify and prevent potential risks while using the platform.

MODULE 5: Email Security and Scams

  • Content:
    • Insights into email-related threats, including phishing attacks and malware distribution.
    • Techniques for configuring security settings in popular email applications (e.g., Gmail, Yahoo).
    • Developing safe email usage habits to prevent scams and cyber threats.
  • Objectives & Outcomes:
    • Identify counterfeit emails and distinguish them from legitimate communications.
    • Avoid falling victim to email-based scams and phishing attempts.
    • Enhance email security by implementing best practices and advanced configurations.

MODULE 6: Hacking Wireless Networks

  • Content:
    • Basic concepts of wireless technology and its inherent vulnerabilities.
    • Encryption protocols used in wireless communication and their effectiveness.
    • Threats to wireless and Bluetooth networks, including hacking techniques.
    • Countermeasures to secure wireless networks against potential breaches.
  • Objectives & Outcomes:
    • Understand the risks associated with wireless and Bluetooth networks.
    • Learn how encryption protects data and recognize vulnerabilities.
    • Apply countermeasures to mitigate risks and secure wireless communications.

MODULE 7: Malware Threats

  • Content:
    • Types of malware (e.g., viruses, worms, Trojans) and their impact on systems.
    • Methods of malware propagation and infection.
    • Techniques for analyzing malware and implementing countermeasures.
  • Objectives & Outcomes:
    • Identify and classify different types of malware.
    • Understand how malware spreads and how to prevent infections.
    • Employ strategies to analyze and remove malware effectively.

MODULE 8: System Hacking

  • Content:
    • Methods used by hackers to gain unauthorized access to systems.
    • Password cracking, privilege escalation, and maintaining access within systems.
    • Techniques for hiding and clearing logs to prevent detection.
  • Objectives & Outcomes:
    • Understand system hacking methodologies and the risks they pose.
    • Learn to identify vulnerabilities and implement measures to prevent unauthorized access.
    • Strengthen system defenses against hacking attempts.

MODULE 9: Social Engineering

  • Content:
    • Social engineering tactics, such as impersonation, phishing, and identity theft.
    • Exploitation of trust and manipulation techniques used by attackers.
    • Countermeasures to protect personal and organizational data.
  • Objectives & Outcomes:
    • Recognize social engineering techniques and their potential impact.
    • Develop strategies to protect against these attacks.
    • Enhance overall data privacy awareness and resilience.

MODULE 10: Denial of Service (DoS) Attacks

  • Content:
    • Understanding the principles of DoS and DDoS attacks and their organizational impact.
    • Identifying botnets and attack patterns.
    • Tools and countermeasures to prevent and mitigate DoS/DDoS attacks.
  • Objectives & Outcomes:
    • Understand the different types of DoS/DDoS attacks and how they function.
    • Develop an effective response plan to mitigate the impact of such attacks.
    • Enhance organizational preparedness against DoS/DDoS threats.

 

FORM

PRE-REGISTRATION

Please Enter Full Name.
Please Enter Email.
Please Enter Contact No.
Please Enter Company Name.
Please Enter Subject.

How You Know Us: