Loading ...

0
Instructor Name

Ts. Lee Hwee Hsiung

Category

Fundamental

Reviews

0 (0 Rating)

Preview this course

Course Requirements

  1. IT and non-IT managers and executives
  2. Individuals who are new to cyber security and are seeking to learn and improve their knowledge and skills in the field
  3. Cyber security Team leaders and critical information custodians
  4. Individual with basic IT fundamentals and is interested to learn more about information security and cyber terrorism

Course Description

This course provides general understanding about the importance of cyber security; create awareness on the growing cyber threats and trends and its impact towards cyber terrorism and internet radicalization. It also explains cyber terrorism framework and describes the core aspects of cyber terrorism.

This 2-days comprehensive course is tailored according to Malaysian perspective. 

Course Outcomes

  1. Nurture participants on the importance of cyber security
  2. Increase awareness on the use of internet in radicalization
  3. Raise the adoption of cyber security in creating a safer cyberspace and a better place to live and work
  4. Identify different types of threats, risks and vulnerabilities that exist in both cyberspace and non-cyberspace environment
  5. Learn different type of security management practices
  6. Learn various components of cyber terrorism
  7. Understand cyber terrorism framework
  8. Develop thorough understanding on cyber security by analysing case studies



Agenda

Cyber Security - The New Frontier

  1. Training & Capacity Building
  2. Introduction to Cyber Security
  3. Cyber Security Landscape in Malaysia
  4. The Human Factors & Motivations
  5. The Needs of Cyber Security Capacity Building
  6. The Cyber Security Education Framework


Fundamental of Cyber Security
  1. Cyber Security Guiding Principles
  2. Vulnerabilities & Threats
  3. Stages of Cyber Security Mitigation
  4. Cyber Security at Workplace
  5. Cyber Crimes
  6. Common Cyber Threats
  7. Anatomy of Cyber Attacks
  8. Cyber Security Issues and Challenges


Breaches, Attacks and Cyber Crimes
  1. Cyber Space Challenges
  2. Cyber Crimes
  3. Real Cyber Incidents
  4. Case Studies in Handling High Technology Crimes
  5. Mitigation


Malaysia Initiatives
  1. Defense-in-Depth in Summary
  2. Malaysia Initiatives
  3. CNII Sectors
  4. NCSP
  5. Cyber Related Laws
  6. Cyber Security Issues and Challenges


Introduction to Cyber Terrorism
  1. Definition of Cyber Threats
  2. Concept of Cyber Terrorism


Internet Radicalization
  1. Internet Radicalization and Terms
  2. The Internet as Enabler of Cyber Terrorism


Terrorist Use of the Internet
1. Conceptualizing Use of the Internet for Terrorist Purposes & Type of Activities

Cyber Terrorism Framework
  1. Existing Models
  2. Framework Components
  3. Analysis of Cyber Terrorism Incidents (case study)


Course Curriculum

1 Course Modules

Cyber Security Essential - Course Details


2 CSE - The New Frontier


1 Chapter 2
1 Min


1 Chapter 3
1 Min


2 test video iframe
9 Min


1 Chapter 4
1 Min


1 Chapter 5
5 Min


1 Chapter 6
5 Min


2 Chapter 6
5 Min


1 Chapter 7
5 Min


1 Chapter 8
1 Min


1. CSE Exercise

Instructor

Ts. Lee Hwee Hsiung

0 Rating
0 Reviews
17 Students
4 Courses

Head of Department
Cyber Security Professional Development
CyberSecurity Malaysia

Mr. Lee has more than 25 years of experience in the Technopreneur environment, involved in the setup and commissioning of technology-based organizations in the area of multimedia development, training, e-learning and strategy business development.

Graduated with a Bachelor’s Degree in Computer Science and Microelectronics from the University College of Tunku Abdul Rahman, Kuala Lumpur and Campbell University, North Carolina USA. He obtained a Master in Business Administration from the Malaysia Multimedia University in the year 2008.

He is currently a Fellow with the National University of Malaysia (UKM), an Associate in Business Continuity Professional (ABCP) by the Disaster Recovery Institute International (DRII), Certified Ethical Hacker (CEH) and a certified ISO/IEC 27001 ISMS Lead Auditor.

He was awarded as Honouree for Asia-Pacific Information Security Leadership Achievements (ISLA) in the category of Managerial Professional for Information Security Project(s) on July 26 2012 in Tokyo, Japan and the recipient of “One of the Most Outstanding Chief Security Officers (CSO) in the ASEAN region 2012” by the CSO ASEAN Awards 2012 organized by IDG.

Participant Feedback

Cyber Security Essential


4

Course Rating
0.00%
0.00%
0.00%
0.00%
0.00%

No Review found

Sign In or Sign Up as student to post a review

Reviews

Cart

Loading...