You are on page 1of 1

Best Child Online

Protection Website
CSM SECURITY
ESSENTIAL
FundamentaI
28-29 Jan 2014
28-29 May 2014
10-11 Sept 2014
22-23 Dec 2014
Program Overview
This course aims to provide general understanding
about the importance of information security, create
awareness on the growing cyber threats . t gives a
broad introduction of information security while comple-
menting with an understanding on the various types of
cyber threats, risks and vulnerabilities that exist within
our environment.
TerminaI Objectives
To increase awareness on the importance of
securing information efficiently.
To understand the different types of threats,
risks and vulnerabilities that exist in both
cyberspace and non-cyberspace environ
ments and learn effective ways to mitigate the
risks.
To learn more about the different type of
effective security management practices and
tools that can be used to increase information
security.
To create an in-depth culture of information
security among the Malaysian public inline
with the government's efforts to increase the
utilization of internet and intranet
To give an overview of incident response &
handling.
1) Fundamentals of nformation Security
ntroduction to nformation Security, Threats to nformation,
mportance of nformation Security, Concepts of CA
Definition of terms and terminologies in nformation
Security
Network Fundamentals
o Logical & Physical Topologies
o ntroduction to TCP/P
Hardware Architecture
o ntroduction to Host-Based Perimeter Detection
& Network-Based Perimeter Detection
Physical Security
Password Management
Access Control Techniques & Models

2) Fundamentals of nformation Security Management
nformation Assurance Foundations
Security Policies
Business Continuity Planning & Disaster Recovery
Planning
nformation Security Standards
BS7799 (SMS), GMTS, Common Criteria
Risk Assessment & Management

3) Fundamentals of Technical ssues in nformation Security
Host-based ntrusion Detection & Network-based ntrusion
Detection
Methods of Attacks
Honeypots and Honeynets
Firewalls and Perimeters
Anti-Viral Tools on Desktops
ntroduction to Security Tools
i. NMap, Sniffer, Snort

4) ssues in nformation Security
ntroduction to Useful Security Tools Part 2
o Cryptography & Steganography Tools
Cyber Laws
ntroduction to ncident Handling
ntroduction to Computer Forensics
nformation Security Certifications
Program OutIines
RM1,800
Contact us for more information :
EmaiI : training@cybersecurity.my
Nur DzaIifah : 03 8992 6850
Website : www.cyberguru.my
Who ShouId Attend
T and non-T managers and executives
Those who are new to nformation Security and are
seeking to learn and improve their knowledge and
skills in the field.
nformation Security Team leaders and critical
information custodians.
Anyone who has basic fundamentals of T and is
interested to learn more about information security.

You might also like