Call +60 3-7490 2093 Email:

HRDF Approved Training Provider in Malaysia - Modular Fast Track Skill-Based Trainings

Basic Cyber Security Course

Cybersecurity refers to the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, related personnel, organizational infrastructure, applications, services, telecommunications systems and networks. It also includes transmitted and/or stored information in the cyber environment.

Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

Course Highlights

    • Introduction to Information Security Concepts and Principles
    • Introduction to Cryptography
    • Physical and Environmental Security
    • Security Management
    • Communications and Network Security
    • Digital Forensics


    All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.


    HRDF SBL Claimable for Employers Registered with HRDF

    HRDF claimable

    Course Code: M536

    Course Booking


    Course Date

    Course Time

    * Required Fields

    Course Cancellation/Reschedule Policy

    We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
    Note the venue of the training is subject to changes due to class size and availability of the classroom.
    Note the minimal class size to start a class is 3 Pax.

    Course Details

    Module 1: Introduction to Information Security Concepts and Principles

    • Definition of Security
    • Concept of Cyberspace
    • Concept of Cybercrime
    • Introduction to Cyber-security and its importance in today’s world.

    Module 2: Introduction to Cryptography

    • Public Key Cryptosystem
    • Private Key Cryptosystem
    • Hashing Functions
    • Popular Algorithms

    Module 3: Physical and Environmental Security

    • Identifying Assets, Threats and Vulnerabilities
    • Computer and Physical security
    • Firewalls
    • VPNs

    Module 4: Security Management

    • Security Governance
    • Risk Management
    • Business continuity Management
    • Laws and Regulations

    Module 5: Communications and Network Security

    • Types of Malware
    • Wireless/ Wired Network Attacks
    • IDS/IPS systems
    • Secure Network Protocols

    Module 6: Digital Forensics

    • Introduction to Digital Forensics
    • Gathering and Analyzing Evidence

    Course Admin



    Software Requirement:

    Who Should Attend

    • Cyber Security Stuff
    • Network Engineers
    • IT Administrators


    Cyber SecurityTrainerReza Adinehnia is an experienced Network Security Specialist with a demonstrated history of working in IT industry. He is skilled in Data mining, VMware ESX, Database Security, C, PHP, Computer networks and security. He possesses a strong information technology background with a Doctor of Philosophy (PhD) focused in Computer Security from Universiti Putra Malaysia.

    Cyber Security TrainerMuhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well.


    • Degrees in IT, Economics, Psychology. Currently pursuing his PhD in Computer Science (Security in Computing field)
    • Certified CEH, CHFI, Hardware repairs and maintenance.
    • Data mining, Office automation, filemaker, Fraud detection, Blockchain, Hardware repairs, Google Power Searcher, Drupal/Laravel/CakePHP developer.
    • Proficient in Python, Ruby, PHP, Java, Solidity, VBA, Google Apps Script, Javascript, HTML, CSS, SQL.

    Cyber Security TrainerDr. Meisam Eslahi is an information security and digital forensics researcher, consultant, and professional trainer with specialized expertise in organized cyber crimes (Botnets) detection and prevention. His domain of interests includes Cyber security Threats Detection, Mitigation and Response, Network and Mobile Behavioral Analysis, Secure BYOD, Cyber safety and Awareness. He has over 14 years of experience in the field of Information Technology mostly focused on Cyber Security, digital forensics, penetration testing and incident response. Meisam has been contributing in many projects, consultancies and developments as follows:

    • APT and Botnet Analysis and Detection (Communication Pattern Analysis)
    • Red/Blue teaming Design and Implantation
    • Digital Forensics with main focus on Memory Analysis
    • Telecommunication Fraud Investigation
    • Penetration Testing and Vulnerability Assessment
    • Cyber (Security) Maturity Assessment
    • Disaster Recovery and Incident Response Plan and Implantation
    • Creating and Managing an Incident Response Team and Frameworks

    Cyber Security TrainerTruman Ng graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

    Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

    Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philipines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.
    As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.
    Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.

    Cyber Security TrainerYaw Hon Sing started his IT training career back in 1996 attached to New Horizons Computer Learning Centre (NHCLC) Malaysia. Achieved his Microsoft Certified Trainer (MCT) status back in 1997 delivering Microsoft backend server trainings (Windows NT/2000/2003 & Exchange Server & ISA Server) for the enterprise deployment. Moving forward he achieved vendor neutral certification COMPTIA A+, Network+, Security+ and Server+ to endorse his knowledge in the relevant fields. After years with server-based trainings, Yaw moved onto network /internetworking and network storage solutions with Cisco Systems & Netapp training & certification. He was a Cisco Systems & NetApp certified system instructor. He was certified in CCNA and CCNP majoring in routing & switching, Wireless LAN, Network Security, and Service Provider internetworking. At the recent training career, he diversified into Huawei Technologies’ carrier network solutions. Attaining his full range of Huawei Technologies professional certification tracks: Huawei Certified HCNA, HCNP and HCIE in Routing & Switching series. At present, he is continuously pursuing his security practitioner certification CISSP.

    Customer Reviews (2)

    Might Consider Review by Course Participant/Trainee
    1. Do you find the course meet your expectation?
    2. Do you find the trainer knowledgeable in this subject?
    3. How do you find the training environment
    More content and elaboration on key topics. Currently very summarized and not easy to understand unless student has background

    More participants would help to stimulate discussion and learning from each other. Instructor is good and helpful (Posted on 10/10/2019)
    Will Recommend Review by Course Participant/Trainee
    1. Do you find the course meet your expectation?
    2. Do you find the trainer knowledgeable in this subject?
    3. How do you find the training environment
    . (Posted on 02/11/2018)

    Write Your Own Review

    You're reviewing: Basic Cyber Security Course

    How do you rate this product? *

      1 star 2 stars 3 stars 4 stars 5 stars
    1. Do you find the course meet your expectation?
    2. Do you find the trainer knowledgeable in this subject?
    3. How do you find the training environment
    • Reload captcha
      Attention: Captcha is case sensitive.

    Product Subjects

    Use spaces to separate Subjects. Use single quotes (') for phrases.

    You May Be Interested In These Courses

    Advanced Cyber Security Course

    Advanced Cyber Security Course

    3 Review(s)