Call +60 3-7490 2093 Email:

HRDF Approved Training Provider in Malaysia - Modular Fast Track Skill-Based Trainings

Basic Cyber Security Course

Cyber attack is one of the biggest risk to organizations as organizations  increasingly pursue digitization to drive efficiency, reduce costs and build data-driven businesses, they simultaneously move into the “target zone” of cyber attacks

Cyber Security is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

This basic course on Cyber Security will increase the awareness of various cyber security threats and the best practices to protect from cyber attacks and online scams.

Course Highlights:

  • Cyber Security Threats such as Malware, Phishing, Network Security
  • Protection Against Cyber Security Threats
  • Cryptography
  • Digital Forensics


All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.


HRDF SBL Claimable for Employers Registered with HRDF

HRDF claimable

Course Code: M536

Course Booking


Course Date

Course Time

* Required Fields

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.

Course Details

Topic 1 - Cyber Security Threats

  • Introduction to Cyber Security
  • Computer Viruses and Worms
  • Trojan Horse and Spyware
  • Hoaxes and Phishing Scams
  • Mobile and Wireless Security Threats
  • Remote Access Threats
  • Social Media and Social Engineering Threats
  • Online Scams

Topic 2 - Protection Against Cyber Security Threats

  • User ID and Passwords Protection
  • Home Computer and Information Protection with Firewalls
  • Best Practices Against Malware, Computer Viruses and Worms
  • Trojans and Spyware Protection
  • Protection from Hoaxes and Phishing
  • Mobile Devices and Wireless Protection
  • Remote Access Protection with SSL
  • Social Media and Online Scams Protection

Topic 3 - Security Management for Businesses

  • Identify Organizations Assets from Cyber Attacks
  • Secure Personal Data
  • Secure Sockets Layer
  • Security Governance
  • Business Continuity Planning
  • IDS/IPS Systems & Penetration Testing

Topic 4 - Introduction to Cryptography

  • What is Cryptography
  • Types of Cryptography
  • Secret Key Cryptography
  • Public Key Cryptography
  • Hashing Functions
  • Digital Signature and Certificate

Topic 5 - Introduction to Digital Forensics

  • What is Digital Forensics
  • Gathering Evidence
  • Analyzing Evidence

Course Admin



Software Requirement:

Who Should Attend

  • Cyber Security Stuff
  • Network Engineers
  • IT Administrators


Cyber Security TrainerMuhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well.


  • Degrees in IT, Economics, Psychology. Currently pursuing his PhD in Computer Science (Security in Computing field)
  • Certified CEH, CHFI, Hardware repairs and maintenance.
  • Data mining, Office automation, filemaker, Fraud detection, Blockchain, Hardware repairs, Google Power Searcher, Drupal/Laravel/CakePHP developer.
  • Proficient in Python, Ruby, PHP, Java, Solidity, VBA, Google Apps Script, Javascript, HTML, CSS, SQL.

Cyber Security TrainerDr. Meisam Eslahi is an information security and digital forensics researcher, consultant, and professional trainer with specialized expertise in organized cyber crimes (Botnets) detection and prevention. His domain of interests includes Cyber security Threats Detection, Mitigation and Response, Network and Mobile Behavioral Analysis, Secure BYOD, Cyber safety and Awareness. He has over 14 years of experience in the field of Information Technology mostly focused on Cyber Security, digital forensics, penetration testing and incident response. Meisam has been contributing in many projects, consultancies and developments as follows:

  • APT and Botnet Analysis and Detection (Communication Pattern Analysis)
  • Red/Blue teaming Design and Implantation
  • Digital Forensics with main focus on Memory Analysis
  • Telecommunication Fraud Investigation
  • Penetration Testing and Vulnerability Assessment
  • Cyber (Security) Maturity Assessment
  • Disaster Recovery and Incident Response Plan and Implantation
  • Creating and Managing an Incident Response Team and Frameworks

Cyber SecurityTrainerReza Adinehnia is an experienced Network Security Specialist with a demonstrated history of working in IT industry. He is skilled in Data mining, VMware ESX, Database Security, C, PHP, Computer networks and security. He possesses a strong information technology background with a Doctor of Philosophy (PhD) focused in Computer Security from Universiti Putra Malaysia.

Cyber Security TrainerDr. Touraj Khodadadi is currently an assistant professor of cyber security. Touraj has more than 10 years of experience in IT industry, Touraj has huge experience in (Cyber Security - Consultation - Risk Management – Security Training - Incident Handling - PCI Implementation -Penetration Tester – Security assessment - Develop security policies- Auditing - Code reviewing – Digital Transformation). In addition, he authored and co-authored 30 international journals and conference papers concerning various aspects of computer, information and network security. His main research interests include authentication systems, network security, cryptography, graphical passwords, authentication systems and cloud computing security. Apart from teaching and research activities at the university, he has served as an editor and reviewer for several international journals and conferences. He is also members of several review panels for master and doctoral research defense.

IoT TrainerNavid has 3 years of teaching and 8 years of industry experience in Networking, Internet Of Things and Cyber Security. His research interests include network communication, IoT and Cybersecurity. His experiences in the IoT field and product developments include:

  1. Wireless communications
  2. Smart Agriculture
  3. Micro Controllers
  4. Arduino
  5. Raspberry Pi
  6. Edison Robotic
  7. AWS
  8. Node-red
  9. GPS Tracking
  10. RFID and NFC
  11. Advertising TVs
  12. Smart house

Customer Reviews (2)

Might Consider Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More content and elaboration on key topics. Currently very summarized and not easy to understand unless student has background

More participants would help to stimulate discussion and learning from each other. Instructor is good and helpful (Posted on 10/10/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 02/11/2018)

Write Your Own Review

You're reviewing: Basic Cyber Security Course

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

Product Subjects

Use spaces to separate Subjects. Use single quotes (') for phrases.

You May Be Interested In These Courses