1st Competency-Based Educational Institution in Malaysia

Industry Certificate in Cyber Security

  • Course Level Beginner
  • Course Type Virtual
  • Course Duration 60 Days/240 Hours
  • Course Language English
  • Upcoming Intakes August, October, December
  • Job Guaranteed Yes

Program Overview

“A secure system is one that does what it is supposed to.” – Eugene Spafford

Technology is advancing at an increasing rate and this applies to cyber-attacks within the current cyber world. Everyone is susceptible to cyber-attacks and cybersecurity is getting more important to everyone for safeguarding information regardless of personal or commercial usage.

Whether you’re interested in protecting yourself online and in social media or attracted to kick start your career within the cyber world. Our course will be the best option for you.

Equipped with Ethical Hacking knowledge within the lesson, we strive to provide our students different perspective towards information security system as a hacker and an IT specialist. The integration of cybersecurity and ethical hacking will enhance our student experience within the cyber world.


  • 16 years and above
  • Basic digital literacy with or without programming experience

Course Objectives

  • Help students become a Cyber Security Specialist
  • Learn the fundamental of ethical hacking and cyber security
  • Understand the cyber threats, attacks and vulnerabilities
  • Earn powerful knowledge of cyber security protection, countermeasures towards cyber threats and cyber crime.
  • Build an effective system for safeguard the personal/ organization information
  • Become a master of information technology in cyber security field and keep up to the current trend

Learning Activities

  • Classroom Lecturing
  • Quiz & Test
  • Practical Exercise Case Studies Learning Activities
  • Group or Individual Work
  • Self-evaluation Training
  • Contest

Career Options

  • Chief Information Security Officer (CISO)
  • Cyber Security Architect
  • Cyber Security Consultant
  • Cyber Security Engineer
  • Cyber Security Governance & Compliance Manager
  • Cyber Security Incident Response Analyst
  • Cyber Threat Intelligence Advisor
  • Ethical Hacker
  • Information Security Analyst
  • Information Security Engineer
  • Information Security Technical Specialist
  • Intrusion Detection Analyst
  • Penetration Tester
  • Secure Applications Engineer
  • Security Operations Center (SOC) Analyst

Technology Requirements

  • PC Desktop / Laptop
  • Stable Internet Connection

Why Study Cyber Security?

Better Employability

To enable the development of new skills and earn a better employment opportunity

Be a Master

Understanding the definition, structure, and principles of cybersecurity and ethical hacking 

Safeguard the information

Protect the business information with cybersecurity theory and technique and enhance the information security system

Catch up with cyber trend

Keep yourself updated with the current cyber trend in the cyber world 

Course Outline

Module 1: Introduction to Cyber Security

– Introduction to Cyber Security
– Computer Viruses and Worms
– Trojan Horse and Spyware
– Hoaxes and Phishing Scams
– Type of Cyber Threats
– Online Scams

Module 2: C Programming

– Introduction to C Programming
– >Types, Operators, and Expressions
– Branching and Iteration
– C Programming Functions
– Scope and Extent
– Software Design with C
– C Programming Pointers
– C Programming Arrays
– C Programming Strings
– Structure And Union
– C Programming Files

Module 3: Network & System Administration

– Basics of Network
– Networking Technology
– Network Security
– Network Management
– Linux Administration
– Window Server 2012
– Window Server 2019

Module 4: Cyber Laws

– Cyber Law Fundamental
– Cyber Crime
– Use of Cyber Laws
– Computer Crime Act 1997
– Communications and Multimedia Act 1998 [Act 588]
– Digital Signature Act 1997
– Copyright Act (Amendment) 1997
– Telemedicine Act 1997
– Optical Disc Act 2000
– Electronic Transactions Act 2006
– International Cybercrime
– International Cyber Laws

Module 5: Ethical Hacking

– Hacking Fundamental
– Ethical Hacking Concept
– Ethical Hacking and Hacking – Similarities and Differences
– Information Security Overview
– Information Security Management
– Penetration Testing Fundamentals

Module 6: Cryptography

– Cryptography Fundamentals
– Encryption Algorithms
– Cryptography Tools
– Public Key Infrastructure (PKI)
– Email Encryption
– Disk Encryption
– Cryptanalysis
– Cryptographic Attacks Countermeasures and Preventions

Module 7: Footprinting and Reconnaissance

– Competitive Intelligence
– Footprinting Concepts
– Website Footprinting
– Footprinting with Web Services
– Footprinting with Social Networking Platforms
– Footprinting with Social Engineering
– Footprinting with Search Engines
– Email Footprinting
– Whois Footprinting
– DNS Footprinting
– Network Footprinting
– Footprinting Tools
– Footprinting Countermeasures
– Footprinting Penetration Testing

Module 8: Network Scanning

– Introduction to Network Scanning
– Scanning Tools
– Scanning Techniques
– Scanning Beyond IDS and Firewall
– Banner Grabbing
– Network Diagrams
– Network Scanning Penetration Testing

Module 9: Social Engineering

– Social Engineering Fundamentals
– Social Engineering Techniques
– Insider Threats
– Impersonation on Social Networking Sites
– Identity Theft
– Social Engineering Countermeasures
– Social Engineering Penetration Testing

Module 10: Enumeration

– Enumeration Fundamentals
– NTP Enumeration
– LDAP Enumeration
– SNMP Enumeration
– NetBIOS Enumeration
– SMTP Enumeration and DNS Enumeration
– IPsec Enumeration
– VoIP Enumeration
– RPC Enumeration
– Unix/Linux User Enumeration
– Enumeration Countermeasures
– Enumeration Penetration Testing

Module 11: Vulnerability Analysis

– Vulnerability Assessment Fundamentals
– Vulnerability Assessment Tools
– Vulnerability Assessment Solutions
– Vulnerability Scoring Systems
– Vulnerability Assessment Reports

Module 12: System Hacking

– System Hacking Concepts
– Cracking Passwords
– Escalating Privileges
– Executing Applications
– Hiding Files
– Covering Tracks
– Penetration Testing

Module 13: Malware

– Introduction to Malware
– Introduction to Trojan
– Introduction to Virus and Worm
– Malware Analysis
– Trojan Countermeasures
– Backdoor Countermeasures
– Virus and Worms Countermeasures
– Anti-Malware Software
– Malware Penetration Testing

Module 14: Sniffing

– Sniffing Fundamentals
– Sniffing: MAC Attacks
– Sniffing: DHCP Attacks
– Sniffing: ARP Poisoning
– Sniffing: Spoofing Attacks
– Sniffing: DNS Poisoning
– Sniffing Tools
– Sniffing Countermeasures
– Sniffing Detection Techniques
– Sniffing Penetration Testing

Module 15: IDS, Firewall and Honeypot

– Introduction of IDS, Firewall and Honeypot
– IDS, Firewall and Honeypot Solutions
– Evading IDS
– Evading Firewalls
– IDS/Firewall Evading Tools
– Detecting and Defeating Honeypots Honeypots
– IDS/Firewall Evasion Countermeasures
– Firewall/IDS Penetration Testing

Module 16: Web Server

– Web Server Fundamentals
– Web Server Attacks
– Web Server Attack Tools
– Web Server Attacks Countermeasures
– Patch Management
– Web Server Security Tools
– Web Server Penetration Testing

Module 17: SQL Injection

– What is SQL Injection
– Types of SQL Injection
– SQL Injection Methodology
– SQL Injection Tools for difference devices
– Evasion Techniques
– SQL Injection Attacks Countermeasures

Module 18: Security Technologies

– Firewall and Network Security Technologies
– Security Incident & Event Management (SIEM)
– Wireless Technology
– Cloud Computing
– Mobile Security
– Internet of Things (IoT)

Apply now or speak with our Career Advisors

Find out more on how to apply for our courses or perhaps inquire about our scholarships by booking a slot with our Career Advisors.