"An investment in knowledge 
pays the best interest."

Benjamin Franklin
Great Wall Information Security

 Study for Personal and Professional Gain

The journey of a lifelong  further study is a repaying experience.  It exposes you to the trends and knowledge in your field of interest and offers you the opportunity to gain the skills necessary for the competitive job market.  It also contributes to your sense of self-worth. Supported by career experience, a relevant qualification gives you a competitive edge and will surely assist your advancement  opportunities. 

A further study will create an opportunity to spend time doing something you really love and to explore a subject area that has always fascinated you. This will enrich your life and boost your self-confidence and sense of self-worth.

Employer surveys indicate that the conveyable and improved skills are imperative for survival and success in the competitive job market. These skills include the developing of:

  • Update computer literacy
  • Understanding of Information Security
  • Practical and logical thinking
  • Understanding of Data Networking
  • Willingness to learn
  • Resourcefulness
  • Interpersonal skills
  • Commitment

 

IJCSCS Knowledge
Training

Training 


We offer Training Programs in three levels:


Introductory Level, Intermediate Level and Advanced Level including Data Security, Cryptography, Data Communications, FPGA-based Digital Design and Hardware Description Language (HDL) Programming.


Trial Classes are free. 

Presently, we offer these programs in Malaysia and Singapore.



  • Basic Level:

            Digital Logic

            Programming in C, C++


  • Intermediate Level:

                Digital Design

                Data Communications

                Computer Architecture

                 Hardware Description Language Programming( HDL) inVerilog, VHDL


  • Advanced Level:

                Data Security

                Advanced Computer Architecture

                Advanced Data Communications

       Wavelets and Transforms for Security Biometrics

       Data Compression


  • Specialized Client's Training
                  Depending on the client's specific needs, we provide special training programs.

Sample Training Courses


_________________________________________ 
1. Digital Circuit Design with Field Programmable Gate Arrays (FPGA)


Moore’s Law, which observes that semiconductor technology advances exponentially has been valid for over three decades. To keep up with Moore’s Law, design techniques of digital circuits have changed dramatically. Now designers generate circuits from high-level descriptions. To introduce trainees to these concepts, the course is grounded in basic principles of digital design that do not change with technology. However, the course introduces students to new tools and practical techniques that teach how to design for today’s technology. The course introduces Verilog and VHDL design languages to implement Field Programmable Gate Arrays (FPGA) Circuits.

_________________________________________________________

Digital Circuit Design with Field Programmable Gate Arrays (FPGA)
Course Objectives:
Moore’s Law, which observes that semiconductor technology advances exponentially has been valid for over three decades. To keep up with Moore’s Law, design techniques of digital circuits have changed dramatically. Now designers generate circuits from high-level descriptions. To introduce trainees to these concepts, the course is grounded in basic principles of digital design that do not change with technology. However, the course introduces students to new tools and practical techniques that teach how to design for today’s technology. The course introduces Verilog and VHDL design languages to implement Field Programmable Gate Arrays (FPGA) Circuits.
2. A Course in Cryptography and Information Security

The course introduces students to the theory and practice of cryptography and Information Security. Present day digital threats and risk management in information security are discussed. The viewpoint taken throughout the course is to emphasize the theory of cryptography as it can be applied in practice. This is an approach that is pursued in the state-of-the-art techniques in information security taking into consideration to be also a pedagogically desirable approach path.

_________________________________________________________

3. Data Breach and Defensive Measures

 

The course discusses present-day data breach threats. It demonstrates how ineffective a typical data breach prevention system can be and the typical delay time before discovering it. The students will be familiar with the concept that the attacker has to be successful only once while the company’s IT security personnel have to be successful every single time. This course introduces the students to what constitutes an advanced threat. The student will be able to learn how these advanced persistent threats (APT) work and how they can penetrate your system from any mobile end point.  In this respect, the course hashes out in what way or manner the knowledgeable attacker can circumvent traditional controls and avoid other security measures. 

_________________________________________________________

4. Encrypted Traffic Management


 

Preventing advanced digital threats is becoming more challenging every day. Cyber adversaries are hiding their attacks within Secure Sockets Layer (SSL) traffic to overcome porous perimeter security devices. The course discusses how to inspect SSL traffic for these threats while maintaining the privacy of user’s online security-critical activities.

The course demonstrates some of the difficulties of monitoring and enforcing compliance with internal and external standards for acceptable use of SSL. Implementation of weak encryption keys and below average cipher algorithms often contribute to the organizations’ delusive sense of security. The course discusses methods to equip the organization security devices to scrutinize SSL traffic while applying SSL‐usage standards and asserting user privacy. 

_________________________________________________________

5. PenTest


Pen Test to Avoid a Mess

Intelligently manage vulnerabilities through penetration testing.You can proactively identify the most exploitable vulnerabilities and eliminate false positives. This allows your organization to prioritize remediation efforts, apply needed security patches, and efficiently allocate security resources. Avoid the cost of network downtime. Recovering from a security breach can cost your organization big time–customer protection and retention, legal activities, discouraged business partners, lowered employee productivity, and reduced revenue–just to name a few pitfalls. Pen testing helps you avoid these financial drawbacks by identifying and addressing risks before attacks or security breaches occur. Meet regulatory requirements and avoid fines.

Penetration testing helps organizations address regulatory requirements such as PCIDSS. This can be a formidable task requiring a combination of resources, time, and a little bit of planning. Detailed reports showing test results and validating remediation efforts can help you avoid significant fines for non-compliance and allow you to illustrate ongoing due diligence to assessors. Preserve corporate image and customer loyalty. Even a single incident of compromised customer data can be costly in terms of lost revenue and a tarnished brand image. With customer retention costs higher than ever, no one wants to lose the loyal users that they’ve worked hard to earn, and data breaches are likely to impact new business efforts. Penetration testing helps you dodge these avoidable incidents that put your organization’s reputation and trustworthiness at stake. A pen test can be broadly carried out by following a six-phase methodology:

  • Planning and Preparation,
  • Discovery,
  • Penetration Attempt,
  • Analysis and Reporting,
  • Clean Up, and
  • Finally Remediation

_________________________________________________________

6. Computer Forensics


Computer Forensics can be defined simply, as a process of applying scientific and analytical techniques to computer Operating Systems and File Structures in determining the potential for Legal Evidence. Evidence might be required for a wide range of computer crimes and misuses.

Methods of Computer Forensics:
•Discovering data on computer system
•Recovering deleted, encrypted, or damaged file information
•Monitoring live activity
•Detecting violations of corporate policy
•Information collected assists in arrests, prosecution, termination of employment, and preventing future illegal activity

_________________________________________________________

7. Insider Threat


Careless, negligent  or malicious employees constitute one of the main causes of data breaches. Using cryptography jargon, this type of behvior is called  "Evil Bob". 

Insiders are the new threat and managers have to learn what to do to avoid these issues. Having a secure data is similar to having a healthy established custom. However, new maladies can strike even if your organization is in the best "health". Managers need to be ready. The course provides the contingents to avoid these threats.


Pen Test to Avoid a Mess
Intelligently manage vulnerabilities
Through penetration testing, you can proactively identify the most exploitable vulnerabilities and eliminate false positives. This allows your organization to prioritize remediation efforts, apply needed security patches, and efficiently allocate security resources.
Avoid the cost of network downtime
Recovering from a security breach can cost your organization big time–customer protection and retention, legal activities, discouraged business partners, lowered employee productivity, and reduced revenue–just to name a few pitfalls. 
Pen testing helps you avoid these financial drawbacks by identifying and addressing risks before attacks or security breaches occur.
Meet regulatory requirements and avoid fines
Penetration testing helps organizations address regulatory requirements such as PCIDSS.
This can be a formidable task requiring a combination of resources, time, and a little bit of planning. Detailed reports showing test results and validating remediation efforts can help you avoid significant fines for non-compliance and allow you to illustrate ongoing due diligence to assessors.
Preserve corporate image and customer loyalty
Even a single incident of compromised customer data can be costly in terms of lost revenue and a tarnished brand image. With customer retention costs higher than ever, no one wants to lose the loyal users that they’ve worked hard to earn, and data breaches are likely to impact new business efforts. Penetration testing helps you dodge these avoidable incidents that put your organization’s reputation and trustworthiness at stake.
A pen test can be broadly carried out
by following a six-phase methodology:
Planning and Preparation,
Discovery,
Penetration Attempt,
Analysis and Reporting,
Clean Up, and
Finally Remediation
Pen Test to Avoid a Mess
Intelligently manage vulnerabilities
Through penetration testing, you can proactively identify the most exploitable vulnerabilities and eliminate false positives. This allows your organization to prioritize remediation efforts, apply needed security patches, and efficiently allocate security resources.
Avoid the cost of network downtime
Recovering from a security breach can cost your organization big time–customer protection and retention, legal activities, discouraged business partners, lowered employee productivity, and reduced revenue–just to name a few pitfalls. 
Pen testing helps you avoid these financial drawbacks by identifying and addressing risks before attacks or security breaches occur.
Meet regulatory requirements and avoid fines
Penetration testing helps organizations address regulatory requirements such as PCIDSS.
This can be a formidable task requiring a combination of resources, time, and a little bit of planning. Detailed reports showing test results and validating remediation efforts can help you avoid significant fines for non-compliance and allow you to illustrate ongoing due diligence to assessors.
Preserve corporate image and customer loyalty
Even a single incident of compromised customer data can be costly in terms of lost revenue and a tarnished brand image. With customer retention costs higher than ever, no one wants to lose the loyal users that they’ve worked hard to earn, and data breaches are likely to impact new business efforts. Penetration testing helps you dodge these avoidable incidents that put your organization’s reputation and trustworthiness at stake.
A pen test can be broadly carried out
by following a six-phase methodology:
Planning and Preparation,
Discovery,
Penetration Attempt,
Analysis and Reporting,
Clean Up, and
Finally Remediation
Pen Test to Avoid a Mess
Intelligently manage vulnerabilities
Through penetration testing, you can proactively identify the most exploitable vulnerabilities and eliminate false positives. This allows your organization to prioritize remediation efforts, apply needed security patches, and efficiently allocate security resources.
Avoid the cost of network downtime
Recovering from a security breach can cost your organization big time–customer protection and retention, legal activities, discouraged business partners, lowered employee productivity, and reduced revenue–just to name a few pitfalls. 
Pen testing helps you avoid these financial drawbacks by identifying and addressing risks before attacks or security breaches occur.
Meet regulatory requirements and avoid fines
Penetration testing helps organizations address regulatory requirements such as PCIDSS.
This can be a formidable task requiring a combination of resources, time, and a little bit of planning. Detailed reports showing test results and validating remediation efforts can help you avoid significant fines for non-compliance and allow you to illustrate ongoing due diligence to assessors.
Preserve corporate image and customer loyalty
Even a single incident of compromised customer data can be costly in terms of lost revenue and a tarnished brand image. With customer retention costs higher than ever, no one wants to lose the loyal users that they’ve worked hard to earn, and data breaches are likely to impact new business efforts. Penetration testing helps you dodge these avoidable incidents that put your organization’s reputation and trustworthiness at stake.
A pen test can be broadly carried out
by following a six-phase methodology:
Planning and Preparation,
Discovery,
Penetration Attempt,
Analysis and Reporting,
Clean Up, and
Finally Remediation

Digital Circuit Design with Field Programmable Gate Arrays (FPGA)
Course Objectives:
Moore’s Law, which observes that semiconductor technology advances exponentially has been valid for over three decades. To keep up with Moore’s Law, design techniques of digital circuits have changed dramatically. Now designers generate circuits from high-level descriptions. To introduce trainees to these concepts, the course is grounded in basic principles of digital design that do not change with technology. However, the course introduces students to new tools and practical techniques that teach how to design for today’s technology. The course introduces Verilog and VHDL design languages to implement Field Programmable Gate Arrays (FPGA) Circuits.
Digital Circuit Design with Field Programmable Gate Arrays (FPGA)
Course Objectives:
Moore’s Law, which observes that semiconductor technology advances exponentially has been valid for over three decades. To keep up with Moore’s Law, design techniques of digital circuits have changed dramatically. Now designers generate circuits from high-level descriptions. To introduce trainees to these concepts, the course is grounded in basic principles of digital design that do not change with technology. However, the course introduces students to new tools and practical techniques that teach how to design for today’s technology. The course introduces Verilog and VHDL design languages to implement Field Programmable Gate Arrays (FPGA) Circuits.
Depending on the client's specific needs, 
we provide special training programs.

Information Security Training