Call +60 3-2711 7241 Email:

HRDF Approved Training Provider in Malaysia - Modular Fast Track Skill-Based Trainings

Advanced Cyber Security Course

In today’s world, it is of utmost importance that organizations be prepared to protect themselves from threats in cyberspace.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

In the earlier session, we had focused on introducing important fundamental concepts related to cybersecurity. Introduction to cryptography, types of firewalls, different types of malware attacks and security managements were key topics discussed along with use of basic security administrator tools.

In this module, we will focus on advanced skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and build secure systems and infrastructures.

This course will give you a more detailed look at cybersecurity concepts and will focus on the following areas:

  • Advanced Information and Network Security
  • Exploit Programming
  • Mobile Security
  • Wireless Security
  • Web Applications Security
  • Security in a Nutshell

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

HRDF SBL Claimable for Employers Registered with HRDF

HRDF claimable

Course Code: M549

Course Booking


Course Date

Course Time

* Required Fields

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.

Course Details

Module 1: Advanced Information and Network Security

  • Advanced Cryptography
  • Denial of Service attacks
  • Interception attacks
  • DNS Poisoning
  • ARP Poisoning
  • Network Devices related Security

Module 2: Exploit Programming

  • Introduction to Exploit Programming
  • Popular Malware Attacks
  • Buffer overflow attacks
  • Integer overflow attacks

Module 3: Mobile Security

  • Mobile Malware
  • Phishing, SMishing
  • Operating System and Device Vulnerabilities
  • Forensic Analysis of Mobile Malware

Module 4: Wireless Security

  • Scanning 802.11 Networks
  • Attacking 802.11 Wireless Networks
  • Exploiting Bluetooth
  • Other Wireless Networks

Module 5: Web Applications Security

  • Types of Application Attacks
  • Cross-site scripting (XSS)
  • XML injection
  • SQL injection
  • Directory Traversal
  • Cookies
  • Session Hijacking

Module six: Security in a Nutshell

  • Advanced Digital Forensics
  • Linux Security
  • Windows Server Security
  • Access Control Mechanisms
  • Cloud Security
  • Email Security

Who Should Attend

  • Cyber Security Stuff
  • Network Engineers
  • IT Administrators




Cyber Security TrainerMuhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well.


  • Degrees in IT, Economics, Psychology. Currently pursuing his PhD in Computer Science (Security in Computing field)
  • Certified CEH, CHFI, Hardware repairs and maintenance.
  • Data mining, Office automation, filemaker, Fraud detection, Blockchain, Hardware repairs, Google Power Searcher, Drupal/Laravel/CakePHP developer.
  • Proficient in Python, Ruby, PHP, Java, Solidity, VBA, Google Apps Script, Javascript, HTML, CSS, SQL.

Cyber Security TrainerDr. Meisam Eslahi is an information security and digital forensics researcher, consultant, and professional trainer with specialized expertise in organized cyber crimes (Botnets) detection and prevention. His domain of interests includes Cyber security Threats Detection, Mitigation and Response, Network and Mobile Behavioral Analysis, Secure BYOD, Cyber safety and Awareness. He has over 14 years of experience in the field of Information Technology mostly focused on Cyber Security, digital forensics, penetration testing and incident response. Meisam has been contributing in many projects, consultancies and developments as follows:

  • APT and Botnet Analysis and Detection (Communication Pattern Analysis)
  • Red/Blue teaming Design and Implantation
  • Digital Forensics with main focus on Memory Analysis
  • Telecommunication Fraud Investigation
  • Penetration Testing and Vulnerability Assessment
  • Cyber (Security) Maturity Assessment
  • Disaster Recovery and Incident Response Plan and Implantation
  • Creating and Managing an Incident Response Team and Frameworks

Cyber Security TrainerTruman Ng graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philipines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.
As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.
Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.

Cyber Security TrainerYaw Hon Sing started his IT training career back in 1996 attached to New Horizons Computer Learning Centre (NHCLC) Malaysia. Achieved his Microsoft Certified Trainer (MCT) status back in 1997 delivering Microsoft backend server trainings (Windows NT/2000/2003 & Exchange Server & ISA Server) for the enterprise deployment. Moving forward he achieved vendor neutral certification COMPTIA A+, Network+, Security+ and Server+ to endorse his knowledge in the relevant fields. After years with server-based trainings, Yaw moved onto network /internetworking and network storage solutions with Cisco Systems & Netapp training & certification. He was a Cisco Systems & NetApp certified system instructor. He was certified in CCNA and CCNP majoring in routing & switching, Wireless LAN, Network Security, and Service Provider internetworking. At the recent training career, he diversified into Huawei Technologies’ carrier network solutions. Attaining his full range of Huawei Technologies professional certification tracks: Huawei Certified HCNA, HCNP and HCIE in Routing & Switching series. At present, he is continuously pursuing his security practitioner certification CISSP.

Cyber SecurityTrainerReza Adinehnia is an experienced Network Security Specialist with a demonstrated history of working in IT industry. He is skilled in Data mining, VMware ESX, Database Security, C, PHP, Computer networks and security. He possesses a strong information technology background with a Doctor of Philosophy (PhD) focused in Computer Security from Universiti Putra Malaysia.

Customer Reviews (1)

Will RecommendReview by Kugan
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 11/4/2018)

Write Your Own Review

You're reviewing: Advanced Cyber Security Course

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha


Use spaces to separate Subjects. Use single quotes (') for phrases.

You May Be Interested In These Courses

Basic Cyber Security Course

Basic Cyber Security Course

1 Review(s)