loader image

#InspiringCareerDreams:e-learning, Hospitality, IR4.0, Digital Marketing, Leadership, Retail Management, Entrepreneurship and Talent Placement #RiseAboveChallengers

#InspiringCareerDreams:e-learning, Hospitality, IR4.0, Digital Marketing, Leadership, Retail Management, Entrepreneurship and Talent Placement #RiseAboveChallengers

Cyber Security Professional

Cyber Security course is designed to increase the awareness of various cyber security threats and the best practices to protect from cyber attacks and online scams. It aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

Cyber Security Professional

Cybersecurity is constantly evolving and growing – currently, there are more than 768,000 IT pros employed in Cybersecurity in the United States. And there are more than 300,000 current U.S. job openings in Cybersecurity that need talented IT pros like you. Keep reading to learn about the different types of Cybersecurity jobs and salaries and how to start your Cybersecurity career.
  • Overview
  • Course Modules
  • Learning Outcome
  • Funding

Cyber Security Professional

Overview

Cybersecurity is constantly evolving and growing – currently, there are more than 768,000 IT pros employed in Cybersecurity in the United States. And there are more than 300,000 current U.S. job openings in Cybersecurity that need talented IT pros like you. Keep reading to learn about the different types of Cybersecurity jobs and salaries and how to start your Cybersecurity career.

Cyber Security Professional

Course Modules

DEFINITION AND BASIC

  • Introduction to Cyber Security
  • What is “Cyber”?
  • Cyber Threats
  • How Cyber Attacks Spill over into Business
  • Layers of Security (The Onion)
  • Internet Economy
  • Hacking & Criminal Hackers
  • The Hacker Profiling Project (HPP)
  • Incident Response
  • Risk Management
  • “Critical Infrastructure”
  • Encryption
  • Awareness
  • The Challenge of who is responsible
  • The Human Factor
  • Social Engineering

 

MODERN COMPONENTS OF CYBER

  • Cyber Strategy
  • “The Kill Chain”
  • Cyber Warfare
  • Cyber Espionage
  • Cyber Crime
  • Cyber Defense
  • Cyber Offense
  • Cyber Units

 

DEFENDING IN THE “CYBER WORLD”

  • Firewalls
  • IDS (Intrusion Detection System)
  • IPS (Intrusion Prevention System)
  • OSINT (Open Source Intelligence)
  • Actionable Data (so all those alerts help me how?)
  • SIEM (Security Incident and Event Monitoring)
  • Malware Analysis and Reverse Engineering
  • The Proactive Security Team
  • Cyber Security for Home Users
  • Cyber Security for Corporations / Businesses
  • NOC (Network Operations Center)
  • SOC (Security Operations Center)

 

 

 

Cyber Security Professional

Learning Outcome
  • Understand components of Cyber Security (i.e. Cyber Warfare, Espionage and Crime)
  • Understand how IT-Security has “morphed” into cyber security
  • Review latest research into attacks, defenses and reasons for various areas of cybersecurity
  • Discuss (briefly) common core concepts of cybersecurity.

Cyber Security Professional

Funding

Self Pay: RM4,000
Fully sponsored by Perkeso under EIS for retrenched,
Fully sponsored by PenjanaKerjaya (HIT5153)

Check Out Our Other Courses

REGISTRATION

Leap Campus team will contact you to advise and plan your upskilling or reskilling program enrollment/intake/course details.

Private Policy:
By clicking submit, you agree to send your info to Leap Campus who agrees to use it according to their private policy.

REGISTRATION

Leap Campus team will contact you to advise and plan your upskilling or reskilling program enrollment/intake/course details.

Private Policy:
By clicking submit, you agree to send your info to Leap Campus who agrees to use it according to their private policy.