CTDS-YN: Cybersecurity Threats, Defences and Security Best Practices
2 Days per class
Remarks
Fully claimable under HRDC
Up to 25 pax per class
On-site delivery at your company’s location (travel and accommodation charges apply for locations outside Klang Valley)
The fees stated are for 3 classes
Promo fee is billed upfront during the first class, whether with HRDC grant or not

RM 18,900
Fees for 3 sessions
RM 6,300/class ONLY
Cybersecurity Threats, Defenses, and Security Best Practices is a 2-day advanced, hands-on course designed for individuals looking to deepen their cybersecurity knowledge beyond awareness and into practical defense strategies.
Participants will learn:
Core cybersecurity principles like the CIA Triad (Confidentiality, Integrity, Availability)
How cyberattacks happen across IT infrastructures (endpoints, cloud, applications, networks, IoT)
Types of attacks including phishing, ransomware, SQL Injection, DDoS, and business email compromise
Through extensive real-world labs and simulations, participants will:
Perform open-source intelligence (OSINT) reconnaissance like real attackers
Analyze phishing campaigns and malware behavior
Conduct basic web application exploitation (SQL Injection, Cross-Site Scripting - XSS)
Understand and implement defenses like firewalls, EDR, Zero Trust, and Multi-Factor Authentication (MFA)
Day 1 focuses on:
Cybersecurity foundations and frameworks (NIST, ISO 27001, CIS)
Threat identification and web application vulnerabilities
Malware analysis and ransomware simulation
Day 2 focuses on:
Implementing security controls (firewalls, EDR, MFA)
Strengthening user security awareness
Introduction to threat intelligence, forensics, and SOC operations
Final Red Team vs. Blue Team cyberattack and defense challenge
By the end of the course, participants will:
Identify and assess real-world cyber threats
Harden systems and networks using best practices
Recognize insider threats and external attacks
Understand the basics of incident response and digital forensics
This course is ideal for business IT users, security-minded professionals, junior SOC members, and aspiring cybersecurity defenders who want real-world skills to prevent, detect, and respond to attacks.
Get in touch with us
Fill in your details, and we’ll provide you with a customized quotation, detailed trainer profiles, and a comprehensive course outline.