We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?


Cybersecurity refers to the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, related personnel, organizational infrastructure, applications, services, telecommunications systems and networks. It also includes transmitted and/or stored information in the cyber environment.

Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

This course will give you a broad introduction to information security knowledge and will focus on the following areas:

  • Introduction to Information Security Concepts and Principles
  • Introduction to Cryptography
  • Physical and Environmental Security
  • Security Management
  • Communications and Network Security
  • Digital Forensics
                  HRDF SBL Claimable for Employers Registered with HRDF
For more information regarding this course please visit : 


Module 1: Introduction to Information Security Concepts and Principles

  • Definition of Security
  • Concept of Cyberspace
  • Concept of Cybercrime
  • Introduction to Cyber-security and its importance in today’s world.

Module 2: Introduction to Cryptography

  • Public Key Cryptosystem
  • Private Key Cryptosystem
  • Hashing Functions
  • Popular Algorithms

Module 3: Physical and Environmental Security

  • Identifying Assets, Threats and Vulnerabilities
  • Computer and Physical security
  • Firewalls
  • VPNs

Module 4: Security Management

  • Security Governance
  • Risk Management
  • Business Continuity Management
  • Laws and Regulations

Module 5: Communications and Network Security

  • Types of Malware
  • Wireless/ Wired Network Attacks
  • IDS/IPS systems
  • Secure Network Protocols

Module 6: Digital Forensics

  • Introduction to Digital Forensics
  • Gathering and Analyzing Evidence


Dr Reza has Experienced Network Security Specialist with a demonstrated history of working in IT industry. Skilled in Data mining, VMware ESX, Database Security, C, PHP, Computer networks and security. Strong information technology background with a Doctor of Philosophy (PhD) focused in Computer Science from Universiti Putra Malaysia.
Be the first to write a review about this course.
Write a Review
Tertiary Courses Malaysia is a HRDF Approved Training Provider in Malaysia. We offers wide range of classroom instructor-led technical training courses for working professionals and executives in Malaysia.

All our courses and trainings are funded by HRDF (Human Resources Development Fund Malaysia). Our courses include Infocomm, Digital Media, Robotics, Semiconductor,Telecommunication, Life Science, Horticulture Industries , and Business Administration . Below are some of our popular courses

  1. Python Programming
  2. R Programming
  3. Tableau
  4. Machine Learning
  5. Raspberry Pi
  6. Arduino
  7. 3D Printing
  8. iOS Apps Development
  9. Android Apps Development
  10. Magento eCommerce
  11. Wordpress
  12. Joomla
  13. Search Engine Optimizatoin
  14. Web Design
  15. Google Analytics
  16. Facebook Marketing
Tertiary Infotech Sdn Bhd
Level 29, Tower A, Vertical Business Suite, Avenue 3, Bangsar South, No.8, Jalan Kerinchi, Kuala Lumpur, Malaysia 59200
+60 3-7490 2093
Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.