top of page

CTDS-YN: Cybersecurity Threats, Defences and Security Best Practices

2 Days per class

Remarks

  • Fully claimable under HRDC

  • Up to 25 pax per class

  • On-site delivery at your company’s location (travel and accommodation charges apply for locations outside Klang Valley)

  • The fees stated are for 3 classes

  • Promo fee is billed upfront during the first class, whether with HRDC grant or not

CTDS-YN: Cybersecurity Threats, Defences and Security Best Practices

RM 18,900

Fees for 3 sessions

RM 6,300/class ONLY

Cybersecurity Threats, Defenses, and Security Best Practices is a 2-day advanced, hands-on course designed for individuals looking to deepen their cybersecurity knowledge beyond awareness and into practical defense strategies.


Participants will learn:

  • Core cybersecurity principles like the CIA Triad (Confidentiality, Integrity, Availability)

  • How cyberattacks happen across IT infrastructures (endpoints, cloud, applications, networks, IoT)

  • Types of attacks including phishing, ransomware, SQL Injection, DDoS, and business email compromise


Through extensive real-world labs and simulations, participants will:

  • Perform open-source intelligence (OSINT) reconnaissance like real attackers

  • Analyze phishing campaigns and malware behavior

  • Conduct basic web application exploitation (SQL Injection, Cross-Site Scripting - XSS)

  • Understand and implement defenses like firewalls, EDR, Zero Trust, and Multi-Factor Authentication (MFA)


Day 1 focuses on:

  • Cybersecurity foundations and frameworks (NIST, ISO 27001, CIS)

  • Threat identification and web application vulnerabilities

  • Malware analysis and ransomware simulation


Day 2 focuses on:

  • Implementing security controls (firewalls, EDR, MFA)

  • Strengthening user security awareness

  • Introduction to threat intelligence, forensics, and SOC operations

  • Final Red Team vs. Blue Team cyberattack and defense challenge


By the end of the course, participants will:

  • Identify and assess real-world cyber threats

  • Harden systems and networks using best practices

  • Recognize insider threats and external attacks

  • Understand the basics of incident response and digital forensics


This course is ideal for business IT users, security-minded professionals, junior SOC members, and aspiring cybersecurity defenders who want real-world skills to prevent, detect, and respond to attacks.

Get in touch with us

Fill in your details, and we’ll provide you with a customized quotation, detailed trainer profiles, and a comprehensive course outline. 

Successfully submitted. We will contact you soon.

bottom of page