{"id":1273,"date":"2020-12-02T06:50:09","date_gmt":"2020-12-02T06:50:09","guid":{"rendered":"http:\/\/people.utm.my\/azhari\/?p=1273"},"modified":"2020-12-02T06:50:10","modified_gmt":"2020-12-02T06:50:10","slug":"it-security-certification","status":"publish","type":"post","link":"https:\/\/people.utm.my\/azhari\/2020\/12\/02\/it-security-certification\/","title":{"rendered":"IT Security Certification"},"content":{"rendered":"\n<p><strong><em><u>GIAC Penetration Tester (GPEN)<\/u><\/em><\/strong><\/p>\n\n\n\n<p>The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>Module 1 :&nbsp;Advanced Password Attacks<\/p>\n\n\n\n<p>Module 2 :&nbsp;Attacking Password Hashes<\/p>\n\n\n\n<p>Module 3 :&nbsp;Enumerating Users<\/p>\n\n\n\n<p>Module 4 :&nbsp;Exploitation Fundamentals<\/p>\n\n\n\n<p>Module 5 : Initial Target Scanning<\/p>\n\n\n\n<p>Module 6 :&nbsp;Metasploit<\/p>\n\n\n\n<p>Module 7 :&nbsp;Moving Files with Exploits<\/p>\n\n\n\n<p>Module 8 :&nbsp;Password Attacks<\/p>\n\n\n\n<p>Module 9 : Pen-testing Foundations<\/p>\n\n\n\n<p>Module 10 :&nbsp;Pen-testing Process<\/p>\n\n\n\n<p>Module 11 :&nbsp;Penetration Testing using Power Shell<\/p>\n\n\n\n<p>Module 12 :&nbsp;Penetration Testing using the Windows Command Line<\/p>\n\n\n\n<p>Module 13 : Reconnaissance<\/p>\n\n\n\n<p>Module 14 : Scanning for Targets<\/p>\n\n\n\n<p>Module 15 : Vulnerability Scanning<\/p>\n\n\n\n<p>Module 16 :&nbsp;Web Application Attacks<\/p>\n\n\n\n<p>Module 17 :&nbsp;Web Application Reconnaissance<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>4 Days<\/p>\n\n\n\n<p><strong><em><u>ISACA CISM Boot Camp<\/u><\/em><\/strong><\/p>\n\n\n\n<p>CISM certification Boot Camp from OSI Technology, aligned to ISACA, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise to manage, design, oversee and\/or assess an enterprise\u2019s information security.<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>Domain&nbsp;1 : Information Security Governance &amp; Strategy<\/p>\n\n\n\n<p>Domain 2 :&nbsp;Information Risk Management &amp; Compliance<\/p>\n\n\n\n<p>Domain 3 :&nbsp;Information Security Program Development and Management<\/p>\n\n\n\n<p>Domain 4 :&nbsp;Information Security Incident Management<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>4 Days<\/p>\n\n\n\n<p><strong><em><u>OSCP &#8211; Penetration Testing with Kali<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 :&nbsp;Getting Comfortable with Kali Linux<\/p>\n\n\n\n<p>Module 2 :&nbsp;The Essential Tools<\/p>\n\n\n\n<p>Module 3 :&nbsp;Passive Information Gathering<\/p>\n\n\n\n<p>Module 4&nbsp;:&nbsp;Active Information Gathering<\/p>\n\n\n\n<p>Module 5&nbsp;:&nbsp;Vulnerability Scanning<\/p>\n\n\n\n<p>Module 6&nbsp;:&nbsp;Buffer Overflows<\/p>\n\n\n\n<p>Module 7&nbsp;:&nbsp;Win32 Buffer Overflow Exploitation<\/p>\n\n\n\n<p>Module 8&nbsp;:&nbsp;Linux Buffer Overflow Exploitation<\/p>\n\n\n\n<p>Module 9&nbsp;:&nbsp;Working with Exploits<\/p>\n\n\n\n<p>Module 10&nbsp;: File Transfer<\/p>\n\n\n\n<p>Module 11&nbsp;: Privilege Escalation<\/p>\n\n\n\n<p>Module 12&nbsp;: Client Side Attacks<\/p>\n\n\n\n<p>Module 13&nbsp;: Web Application Attacks<\/p>\n\n\n\n<p>Module 14&nbsp;: Password Attacks<\/p>\n\n\n\n<p>Module 15&nbsp;: Port Redirection and Tunneling<\/p>\n\n\n\n<p>Module 16&nbsp;: The Metasploit Framework<\/p>\n\n\n\n<p>Module 17&nbsp;: Bypassing Antivirus Software<\/p>\n\n\n\n<p>Module 18&nbsp;: Assembling the Pieces : Penetration Test Breakdown<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>4 Days<\/p>\n\n\n\n<p><strong><em><u>Mile2 &#8211; Certified Professional Ethical Hacking (CPEH)<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 :&nbsp;Security Fundamentals<\/p>\n\n\n\n<p>Module 2 :&nbsp;Access Controls<\/p>\n\n\n\n<p>Module 3 :&nbsp;Protocols<\/p>\n\n\n\n<p>Module 4 : Cryptography<\/p>\n\n\n\n<p>Module 5 :&nbsp;Why Vulnerability Assessments<\/p>\n\n\n\n<p>Module 6 :&nbsp;Vulnerability Tools of the Trade Overview<\/p>\n\n\n\n<p>Module 7 :&nbsp;Output Analysis and Reports<\/p>\n\n\n\n<p>Module 8 :&nbsp;Reconnaissance, Enumeration and Scanning<\/p>\n\n\n\n<p>Module 9 :&nbsp;Gaining Access<\/p>\n\n\n\n<p>Module 10 :&nbsp;Maintaining Access<\/p>\n\n\n\n<p>Module 11 :&nbsp;Covering Tracks<\/p>\n\n\n\n<p>Module 12 :&nbsp;Malware<\/p>\n\n\n\n<p>Module 13 :&nbsp;Buffer Overflows<\/p>\n\n\n\n<p>Module 14 :&nbsp;Password Cracking<\/p>\n\n\n\n<p>4 Days<\/p>\n\n\n\n<p><strong><em><u>Mile2 &#8211; Certified Digital Forensic Examiner (CDFE)<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 :&nbsp;Introduction<\/p>\n\n\n\n<p>Module 2 :&nbsp;Computer Forensic Incidents<\/p>\n\n\n\n<p>Module 3 :&nbsp;Investigation Process<\/p>\n\n\n\n<p>Module 4 :&nbsp;OS Disk Storage Concepts<\/p>\n\n\n\n<p>Module 5 :&nbsp;Digital Acquisition and Analysis<\/p>\n\n\n\n<p>Module 6 :&nbsp;Forensic Examination Protocols<\/p>\n\n\n\n<p>Module 7 :&nbsp;Digital Evidence Protocols<\/p>\n\n\n\n<p>Module 8 :&nbsp;CFI Theory<\/p>\n\n\n\n<p>Module 9 :&nbsp;Digital Evidence Presentation<\/p>\n\n\n\n<p>Module 10 : Computer Forensics Lab Protocols<\/p>\n\n\n\n<p>Module 11 : CF Processing Techniques<\/p>\n\n\n\n<p>Module 12 :&nbsp;Digital Forensics Reporting<\/p>\n\n\n\n<p>Module 13 :&nbsp;Specialized Artifact Recovery<\/p>\n\n\n\n<p>Module 14 :&nbsp;eDiscovery and ESI<\/p>\n\n\n\n<p>Module 15 :&nbsp;Cell Phone Forensics<\/p>\n\n\n\n<p>Module 16 :&nbsp;USB Forensics<\/p>\n\n\n\n<p>Module 17 :&nbsp;Incident Handling<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>4 Days<\/p>\n\n\n\n<p><strong><em><u>Mile2 &#8211; Certified Penetration Testing Consultant ( CPTC)<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : Pen Testing Team Formation&nbsp;<\/p>\n\n\n\n<p>Module 2 : NMAP Automation&nbsp;<\/p>\n\n\n\n<p>Module 3 : Exploitation Process&nbsp;<\/p>\n\n\n\n<p>Module 4 : Fuzzing with Spike&nbsp;<\/p>\n\n\n\n<p>Module 5 : Simple Buffer Overflow&nbsp;<\/p>\n\n\n\n<p>Module 6 : Stack Based Windows Buffer Overflow&nbsp;<\/p>\n\n\n\n<p>Module 7 : Web Application Security and Exploitation&nbsp;<\/p>\n\n\n\n<p>Module 8 : Linux Stack Smashing<\/p>\n\n\n\n<p>Module 9 : Linux Address Space Layout Randomization<\/p>\n\n\n\n<p>Module 10 : Windows Exploit Protection<\/p>\n\n\n\n<p>Module 11 : Getting Around SEH and ASLR&nbsp;<\/p>\n\n\n\n<p>Module 12 : Penetration Testing Report Writing&nbsp;<\/p>\n\n\n\n<p>4 Days<\/p>\n\n\n\n<p><strong><em><u>Mile2 &#8211; Certified Penetration Testing Engineer 2018 ( CPTE)<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : Business and Technical Logistics of Penetration Testing<\/p>\n\n\n\n<p>Module 2 : Linux Fundamentals<\/p>\n\n\n\n<p>Module 3 : Information Gathering<\/p>\n\n\n\n<p>Module 4 : Detecting Live System<\/p>\n\n\n\n<p>Module 5 : Enumeration<\/p>\n\n\n\n<p>Module 6 : Vulnerability Assessments<\/p>\n\n\n\n<p>Module 7 : Malware Goes Undercover<\/p>\n\n\n\n<p>Module 8 : Windows Hacking<\/p>\n\n\n\n<p>Module 9 : Hacking UNIX\/Linux<\/p>\n\n\n\n<p>Module 10 : Advanced Exploitation Techniques<\/p>\n\n\n\n<p>Module 11 : Pen Testing Wireless Networks<\/p>\n\n\n\n<p>Module 12 : Networks, Sniffing, IDS<\/p>\n\n\n\n<p>Module 13 : Injecting the Database<\/p>\n\n\n\n<p>Module 14 : Attacking Web Technologies<\/p>\n\n\n\n<p>Module 15 : Project Documentation<\/p>\n\n\n\n<p>4 Days<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IT Security Non- Certification&nbsp;<\/h2>\n\n\n\n<p><strong><em><u>Security Posture Assessment (SPA) Penetration Testing (High-Level)<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Security Posture Assessment (SPA)will certify the successful candidate has the knowledge and skills required to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Plan and scope an assessment<\/li><li>Understand legal and compliance requirements<\/li><li>Perform vulnerability scanning and penetration testing using appropriate tools and techniques<\/li><li>Analyze the results<\/li><li>Produce a written report containing proposed remediation techniques<\/li><li>Effectively communicate results to management<\/li><li>Provide practical recommendations<\/li><\/ul>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>Module 1 : Planning and Scoping<\/p>\n\n\n\n<p>Module 2 : Information Gathering and Vulnerability Identification<\/p>\n\n\n\n<p>Module 3 : Attacks and Exploits<\/p>\n\n\n\n<p>Module 4 : Penetration Testing Tools<\/p>\n\n\n\n<p>Module 5 : Reporting and Communication<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>3 Days<\/p>\n\n\n\n<p><strong><em><u>Certified Information Security Awareness Manager (CISAM)<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Certified Information Security Awareness Manager (CISAM) is a 2 days hands-on training and certification programme that provides the essential know-how, enabling information security professionals to develop and manage an effective security awareness programme for their organization.<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>Module 1 : Introduction<\/p>\n\n\n\n<p>Module 2 : Designing an Awareness and Competence Programme<\/p>\n\n\n\n<p>Module 3 : Developing Awareness and Competence Material<\/p>\n\n\n\n<p>Module 4 : Implementing the Awareness and Competence Programme<\/p>\n\n\n\n<p>Module 5 : Post-Implementation<\/p>\n\n\n\n<p>Module 6 : Overcome Obstacles to Success<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Cybersecurity for Beginner- Silver Edition<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Data breaches. Ransomware. State-of-the-art attacks,&nbsp;advanced persistent threat (APT)&nbsp;targeting big organization and small businesses alike. Rarely a day goes by without another reminder in the headlines that improving security should be a top priority.<\/p>\n\n\n\n<p>Of course, there&#8217;s a big difference between knowing you&nbsp;should&nbsp;improve security and knowing&nbsp;how&nbsp;to get started.<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>Module 1 : know Yourself &#8211; The Threat and Vulnerability Landscape<\/p>\n\n\n\n<p>Module 2 : Know Your Enemy &#8211; The Current Threat and Vulnerability Landscape<\/p>\n\n\n\n<p>Module 3 : Encryption Crash Course<\/p>\n\n\n\n<p>Module 4 : Setting up a Testing Environment Using Virtual Machines (Lab)<\/p>\n\n\n\n<p>Module 5 : Operating System Security &amp; Privacy (Windows vs Mac OS X vs Linux)<\/p>\n\n\n\n<p>Module 6 : Security Bugs and Vulnerabilities<\/p>\n\n\n\n<p>Module 7 : Social Engineering and Social Media Offence and Defence<\/p>\n\n\n\n<p>Module 8 : Security Through Isolation and Compartmentalization<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Cyber Defense for Network Administrator<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1: Network Security Threats, Vulnerabilities, and Attacks<\/p>\n\n\n\n<p>Module 2: Network Security Controls, Protocols, and Devices<\/p>\n\n\n\n<p>Module 3 : Network Security Policy Design and Implementation<\/p>\n\n\n\n<p>Module 4 :&nbsp;Physical Security<\/p>\n\n\n\n<p>Module 5: Host Security<\/p>\n\n\n\n<p>Module 6 : Secure Firewall Configuration and Management<\/p>\n\n\n\n<p>Module 7 : Secure IDS Configuration and Management<\/p>\n\n\n\n<p>Module 8 : Secure VPN Configuration and Management<\/p>\n\n\n\n<p>Module 9 : Wireless Network Defence<\/p>\n\n\n\n<p>Module 10 : Network Traffic Monitoring and Analysis<\/p>\n\n\n\n<p>Module 11 : Network Risk and Vulnerability Management<\/p>\n\n\n\n<p>Module 12 : Data Backup and Recovery<\/p>\n\n\n\n<p>Module 13 : Network Incident Response and Management<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>3 Days<\/p>\n\n\n\n<p><strong><em><u>Cybersecurity Attack &amp; Countermeasures 2018<\/u><\/em><\/strong><\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>Module 1 : Cyber Security Fundamentals<\/p>\n\n\n\n<p>Module 2 : Security Threats<\/p>\n\n\n\n<p>Module&nbsp; 3 : Securing Network Communications<\/p>\n\n\n\n<p>Module 4 : Securing Web Applications<\/p>\n\n\n\n<p>Module 5 : Managing Public Key Infrastructure (PKI)<\/p>\n\n\n\n<p>Module 6 : Managing Certificates<\/p>\n\n\n\n<p>Module 7 : Monitoring &amp; Managing Security Incident in Infrastructure Environment<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>2 days<\/p>\n\n\n\n<p><strong><em><u>Cybersecurity Hacker Exposed<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 :&nbsp;Security Fundamentals<\/p>\n\n\n\n<p>Module 2 :&nbsp;Access Controls<\/p>\n\n\n\n<p>Module 3 :&nbsp;Protocols<\/p>\n\n\n\n<p>Module 4 :&nbsp;Cryptography<\/p>\n\n\n\n<p>Module 5 :&nbsp;Why Vulnerability Assessments?<\/p>\n\n\n\n<p>Module 6 :&nbsp;Vulnerability Tools of the Trade<\/p>\n\n\n\n<p>Module 7 :&nbsp;Output Analysis and Reports<\/p>\n\n\n\n<p>Module 8 :&nbsp;Reconnaissance, Enumeration &amp; Scanning<\/p>\n\n\n\n<p>Module 9 :&nbsp;Gaining Access<\/p>\n\n\n\n<p>Module 10 :&nbsp;Maintaining Access<\/p>\n\n\n\n<p>Module 11 :&nbsp;Covering Tracks<\/p>\n\n\n\n<p>Module 12 :&nbsp;Malware<\/p>\n\n\n\n<p>Module 13 :&nbsp;Buffer Overflows<\/p>\n\n\n\n<p>Module 14 :&nbsp;Password Cracking<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>3 days<\/p>\n\n\n\n<p><strong><em><u>Cyberhacker &#8211; Penetration Testing The Right Way<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : Information Gathering<\/p>\n\n\n\n<p>Module 2 : Detecting Live System<\/p>\n\n\n\n<p>Module 3 : Enumeration<\/p>\n\n\n\n<p>Module 4 : Vulnerability Assessments<\/p>\n\n\n\n<p>Module 5 : Malware Goes Undercover<\/p>\n\n\n\n<p>Module 6 : Windows Hacking<\/p>\n\n\n\n<p>Module 7 : Hacking UNIX\/Linux<\/p>\n\n\n\n<p>Module 8 : Pen Testing Wireless Networks<\/p>\n\n\n\n<p>Module 9 : Networks, Sniffing, IDS<\/p>\n\n\n\n<p>Module 10 : Injecting the Database<\/p>\n\n\n\n<p>Module 11 : Attacking Web Technologies<\/p>\n\n\n\n<p>Module 12 : Project Documentation<\/p>\n\n\n\n<p>3 Days<\/p>\n\n\n\n<p><strong><em><u>End User Security Awareness Training Management<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : What Is Cybersecurity?<\/p>\n\n\n\n<p>Module 2 : What is Social Engineering?<\/p>\n\n\n\n<p>Module 3 : Emails and Links<\/p>\n\n\n\n<p>Module 4 : Basics of Online Security<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>1 Day<\/p>\n\n\n\n<p><strong><em><u>Ethical Hacking &amp; Pentest For IT Professional<\/u><\/em><\/strong><\/p>\n\n\n\n<p>&nbsp;This intensive 3 days Technical Session aimed at people who are new to the world of hacking and penetration testing, for those with little or no previous experience, for those who are frustrated by the inability to see the big picture (how the various tools and phases fit together), for a person who wants to quickly get up-to-speed on with the seminal tools and methods for penetration testing, or for anyone looking to expand their knowledge of offensive security.&nbsp;<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>&nbsp;Module 1 :&nbsp;What is Penetration Testing?&nbsp;<\/p>\n\n\n\n<p>&nbsp;Module 2 :&nbsp;Reconnaissance&nbsp;<\/p>\n\n\n\n<p>&nbsp;Module 3 :&nbsp;Scanning&nbsp;<\/p>\n\n\n\n<p>&nbsp;Module 4 :&nbsp;Exploitation&nbsp;<\/p>\n\n\n\n<p>Module 5 :&nbsp;Social Engineering&nbsp;<\/p>\n\n\n\n<p>Module 6 :&nbsp;Web-Based Exploitation&nbsp;<\/p>\n\n\n\n<p>Module 7 :&nbsp;Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter&nbsp;<\/p>\n\n\n\n<p>Module 8 :&nbsp;Wrapping Up the Penetration&nbsp;<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>3 Days<\/p>\n\n\n\n<p><strong><em><u>Hacking With Kali Linux 2018.2<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 &#8211; Penetration Testing Lifecycle<\/p>\n\n\n\n<p>Module 2 \u2013 Kali Linux Toolkits<\/p>\n\n\n\n<p>Module 3 &#8211; Software, Patches, And Upgrades<\/p>\n\n\n\n<p>Module 4 &#8211; Configuring Kali Linux<\/p>\n\n\n\n<p>Module 5 &#8211; Building a Penetration Testing Lab<\/p>\n\n\n\n<p>Module 6 \u2013 PenTest Lifecycle<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>IoT Security &#8211; FREE IoT Device : Raspberry Pi 3<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : A look at the Raspberry Pi 3 and Kali Linux 2016.2<\/p>\n\n\n\n<p>Module 2 : Step by Step &#8211; Combining a Raspberry Pi with Kali Linux<\/p>\n\n\n\n<p>Module 3 : Powering up the Raspberry Pi 3<\/p>\n\n\n\n<p>Module 4 : A look at Kali Linux 2018.2 most popular Penetration Tools (Wireless Tech)<\/p>\n\n\n\n<p>\u200bModule 5 : Advanced Tweaks and Recommended Settings<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Internet of Things (IoT) Practitioner<\/u><\/em><\/strong><\/p>\n\n\n\n<p>IT professionals often have little or no experience working with embedded systems, sensor networks, actuators, realtime systems, and other components that are common to IoT, so this course provides a foundation for understanding how these components work with other systems that IT professionals typically have more experience working with\u2014such as networks, cloud computing, and applications running on servers, desktop computers, and mobile devices.<\/p>\n\n\n\n<p>In this training, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network.<\/p>\n\n\n\n<p>Students will create an IoT device based on an Raspberry Pi 4, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption.<\/p>\n\n\n\n<p>Module 1 :&nbsp;Planning an IoT Implementation<\/p>\n\n\n\n<p>Module 2 :&nbsp;Constructing and Programming an IoT Device<\/p>\n\n\n\n<p>Module 3 : Communicating with an IoT Device<\/p>\n\n\n\n<p>Module 4 : Processing IoT Data<\/p>\n\n\n\n<p>Module 5 : Managing Risks on IoT Projects<\/p>\n\n\n\n<p>\u200bModule 6: Undertaking an IoT Project<\/p>\n\n\n\n<p>5 Days<\/p>\n\n\n\n<p><strong><em><u>Log File Analysis<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : Analysing Cisco and Apache logs using Linux Commands<\/p>\n\n\n\n<p>Module 2 : Using cat and grep to get important information<\/p>\n\n\n\n<p>Module 3 : How to use awk to analyse logs<\/p>\n\n\n\n<p>Module 4 : Using sed, sort and uniq to extract important metrics<\/p>\n\n\n\n<p>Module 5 : Using Python for Log Analysis<\/p>\n\n\n\n<p>Module 6 : Basics of Python<\/p>\n\n\n\n<p>Module 7 : Reading logs using Python<\/p>\n\n\n\n<p>Module 8 : Parsing read logs.<\/p>\n\n\n\n<p>Module 9 : Utilising Powershell for Windows Log Analysis<\/p>\n\n\n\n<p>Module 10 : Basics of Powershell<\/p>\n\n\n\n<p>Module 11 : Dumping Event Logs with Powershell<\/p>\n\n\n\n<p>Module 12 : Log Analysis with Powershell<\/p>\n\n\n\n<p>Module 13 : Intrusion Analysis using Powershell<\/p>\n\n\n\n<p>Module 14 : Looking for suspicious data in logs<\/p>\n\n\n\n<p>Module 15 : Searching for important keywords in event logs<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Network Penetration Testing &amp; Ethical Hacking<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 :&nbsp;Ethical Hacking &amp; Penetration Testing<\/p>\n\n\n\n<p>Module 2 : Methodology Overview<\/p>\n\n\n\n<p>Module 3 :&nbsp;Reconnaissance (Footprinting)<\/p>\n\n\n\n<p>Module 4 :&nbsp;Scanning<\/p>\n\n\n\n<p>Module 5 :&nbsp;Port &amp; Service Enumeration<\/p>\n\n\n\n<p>Module 6 :&nbsp;Data Enumeration<\/p>\n\n\n\n<p>Module 7 :&nbsp;Vulnerability Assessment<\/p>\n\n\n\n<p>Module 8 :&nbsp;Penetration\/Access\/Compromise<\/p>\n\n\n\n<p>Module 9 :&nbsp;Evading Defenses &amp; Erasing Tracks<\/p>\n\n\n\n<p>Module 10 :&nbsp;Hacking Techniques<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Network Security Fundamentals Workshop<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : Introduction to Security<\/p>\n\n\n\n<p>Module 2 : Malware and Social Engineering Attacks<\/p>\n\n\n\n<p>Module 3 : Application and Network Attacks<\/p>\n\n\n\n<p>Module 4 : Vulnerability Assessment and Mitigating Attacks<\/p>\n\n\n\n<p>Module 5 : Host, Application, and Data Security<\/p>\n\n\n\n<p>Module 6 : Network Security<\/p>\n\n\n\n<p>Module 7 : Administering a Secure Network<\/p>\n\n\n\n<p>Module 8 : Wireless Network Security<\/p>\n\n\n\n<p>\u200bModule 9 : Basic Cryptography<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Technical Security Audit and Assessment Workshop<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1 : Overview of Technical Security Assessments<\/p>\n\n\n\n<p>Module 2&nbsp;: Identify and Analyze Targets<\/p>\n\n\n\n<p>Module 3&nbsp;: Validate Target Vulnerabilities<\/p>\n\n\n\n<p>Module 4&nbsp;: Planning Technical Security Assessments<\/p>\n\n\n\n<p>Module 5&nbsp;: Executing the Technical Security Assessment<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Web Application Pentesting 2018<\/u><\/em><\/strong><\/p>\n\n\n\n<p>This is a very technical hands-on and somewhat cover basic. Intermediate and advanced course that will require that you set up your own pentesting environment. You\u2019re also expected to have a basic understanding of Linux and be comfortable working with the command line.<\/p>\n\n\n\n<p>In addition, you should have familiarity with virtualized environments such as VMWare or VirtualBox and also understand how to configure a browser\u2019s proxy settings. But don\u2019t let these requirements deter you. Rolling up your sleeves and getting down and dirty with the tools of the trade will make you a better web application pentester!<\/p>\n\n\n\n<p>3 Days<\/p>\n\n\n\n<p><strong><em><u>Web Pentest &amp; Network Defense<\/u><\/em><\/strong><\/p>\n\n\n\n<p>Module 1: Introduction to Penetration Testing &amp; Setup<\/p>\n\n\n\n<p>Module 2 : Reconnaissance<\/p>\n\n\n\n<p>Module 3 : Server-side-Attacks<\/p>\n\n\n\n<p>Module 4 : Client Side Attacks<\/p>\n\n\n\n<p>Module 5 : Attacking Authentication<\/p>\n\n\n\n<p>Module 6 : Web Attacks<\/p>\n\n\n\n<p>Module 7 : Web Application Firewalls &amp; IDS<\/p>\n\n\n\n<p>\u200bModule 8 : Defensive Countermeasures<\/p>\n\n\n\n<p>2 Days<\/p>\n\n\n\n<p><strong><em><u>Cybersecurity Awareness For Non IT<\/u><\/em><\/strong><\/p>\n\n\n\n<p>This Cyber Security Awareness Training for end user covers today\u2019s key security best practices that end users should follow so that they can PREVENT, DETECT, and RESPOND to information security threats.&nbsp; The biggest ASSETS are people and the biggest RISKS are people too. In addition our training is roles based as Executives will need to be aware of different risk to an IT Administrator.<\/p>\n\n\n\n<p>No matter the level of staff it\u2019s proven that a trained end user\/staff will be able to make security minded decisions every day. This training can also be used as part of the orientation for new staff.<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>1 Day<\/p>\n\n\n\n<p><strong><em><u>Cybersecurity Fundamentals<\/u><\/em><\/strong><\/p>\n\n\n\n<p>&nbsp;Investigate cybersecurity threats and master techniques needed to protect your network.&nbsp;<\/p>\n\n\n\n<p>When you consider just a few of the consequences of a security breach &#8211; your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company&#8217;s security breach, it becomes obvious: An in-depth and thorough understanding of cyber security fundamentals and best practices is absolutely necessary.&nbsp;<\/p>\n\n\n\n<p>In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.&nbsp;<\/p>\n\n\n\n<p>You will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained Workshop environment, you will work with live viruses, including botnets, worms, and Trojans.&nbsp;<\/p>\n\n\n\n<p>\u200b<\/p>\n\n\n\n<p>&nbsp;Workshop 1: Workshop Setup&nbsp;<\/p>\n\n\n\n<p>&nbsp;Workshop 2: Understanding TCP\/IP&nbsp;<\/p>\n\n\n\n<p>&nbsp;Workshop 3: Vulnerability Assessment&nbsp;<\/p>\n\n\n\n<p>&nbsp;Workshop 4: Cyber Awareness&nbsp;<\/p>\n\n\n\n<p>Workshop 5: Cyber Scanning&nbsp;<\/p>\n\n\n\n<p>Workshop 6: Cyber Attacks and Passwords&nbsp;<\/p>\n\n\n\n<p>Workshop 7: Cyber Attacks and Backdoors&nbsp;<\/p>\n\n\n\n<p>Workshop 8: Risk Assessment&nbsp;<\/p>\n\n\n\n<p>Workshop 9: Security Policies&nbsp;<\/p>\n\n\n\n<p>Workshop 10: Host Security&nbsp;<\/p>\n\n\n\n<p>Workshop 11: Covert Communications&nbsp;<\/p>\n\n\n\n<p>Workshop 12: Authentication and Cryptography&nbsp;<\/p>\n\n\n\n<p>Workshop 13: Snort IDS&nbsp;<\/p>\n\n\n\n<p>Workshop 14: Forensic Analysis&nbsp;<\/p>\n\n\n\n<p>Workshop 15: Business Continuity Plan&nbsp;<\/p>\n\n\n\n<p>2 Days<\/p>\n","protected":false},"excerpt":{"rendered":"<p>GIAC Penetration Tester (GPEN) The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct [&hellip;]<\/p>\n","protected":false},"author":14428,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[10,3],"tags":[],"class_list":["post-1273","post","type-post","status-publish","format-standard","hentry","category-gallery","category-news"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/posts\/1273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/users\/14428"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/comments?post=1273"}],"version-history":[{"count":1,"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/posts\/1273\/revisions"}],"predecessor-version":[{"id":1274,"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/posts\/1273\/revisions\/1274"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/media?parent=1273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/categories?post=1273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/azhari\/wp-json\/wp\/v2\/tags?post=1273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}