top of page

CTDS-YN: Cybersecurity Threats, Defences and Security Best Practices

2 Days per class

Remarks

  • Fully claimable under HRDC

  • Up to 25 pax per class

  • On-site delivery at your company’s location (travel and accommodation charges apply for locations outside Klang Valley)

  • The fees stated are for 3 classes

  • Promo fee is billed upfront during the first class, whether with HRDC grant or not

CTDS-YN: Cybersecurity Threats, Defences and Security Best Practices

RM 18,900

Fees for 3 sessions

RM 6,300/class ONLY

Cybersecurity Threats, Defenses, and Security Best Practices is a 2-day advanced, hands-on course designed for individuals looking to deepen their cybersecurity knowledge beyond awareness and into practical defense strategies.


Participants will learn:

  • Core cybersecurity principles like the CIA Triad (Confidentiality, Integrity, Availability)

  • How cyberattacks happen across IT infrastructures (endpoints, cloud, applications, networks, IoT)

  • Types of attacks including phishing, ransomware, SQL Injection, DDoS, and business email compromise


Through extensive real-world labs and simulations, participants will:

  • Perform open-source intelligence (OSINT) reconnaissance like real attackers

  • Analyze phishing campaigns and malware behavior

  • Conduct basic web application exploitation (SQL Injection, Cross-Site Scripting - XSS)

  • Understand and implement defenses like firewalls, EDR, Zero Trust, and Multi-Factor Authentication (MFA)


Day 1 focuses on:

  • Cybersecurity foundations and frameworks (NIST, ISO 27001, CIS)

  • Threat identification and web application vulnerabilities

  • Malware analysis and ransomware simulation


Day 2 focuses on:

  • Implementing security controls (firewalls, EDR, MFA)

  • Strengthening user security awareness

  • Introduction to threat intelligence, forensics, and SOC operations

  • Final Red Team vs. Blue Team cyberattack and defense challenge


By the end of the course, participants will:

  • Identify and assess real-world cyber threats

  • Harden systems and networks using best practices

  • Recognize insider threats and external attacks

  • Understand the basics of incident response and digital forensics


This course is ideal for business IT users, security-minded professionals, junior SOC members, and aspiring cybersecurity defenders who want real-world skills to prevent, detect, and respond to attacks.

Check Out Triple Treat.jpg

Check out the rest of Triple Treat courses

Get in touch with us

Fill in your details, and we’ll provide you with a customized quotation, detailed trainer profiles, and a comprehensive course outline. 

Successfully submitted. We will contact you soon.

bottom of page