We offer Training Programs in three levels:

Introductory Level, Intermediate Level and Advanced Level including Data Security, Cryptography, Data Communications, FPGA-based Digital Design and Hardware Description Language (HDL) Programming.

Trial Classes are free. 

Presently, we offer these programs in Malaysia and Singapore.

  • Basic Level:
    •  Digital Logic
    • Programming in C, C++
  • Advanced Level:
  • Specialized Client’s Training
    Depending on the client’s specific needs, we provide special training programs.

Courses presently offered in Malaysia:

We provide full range of IT courses with our experienced Prof. Magdy Saeb.Free Trial Class available.Please contact +6011-16618000 for more information.Early bird discount available.

Posted by Michelle Chan on Friday, May 20, 2016

Sample Training Courses

_________________________________________

 1. Digital Circuit Design with Field Programmable Gate Arrays (FPGA)

Moore’s Law, which observes that semiconductor technology advances exponentially has been valid for over three decades. To keep up with Moore’s Law, design techniques of digital circuits have changed dramatically. Now designers generate circuits from high-level descriptions. To introduce trainees to these concepts, the course is grounded in basic principles of digital design that do not change with technology. However, the course introduces students to new tools and practical techniques that teach how to design for today’s technology. The course introduces Verilog and VHDL design languages to implement Field Programmable Gate Arrays (FPGA) Circuits.

2. A Course in Cryptography and Information Security

The course introduces students to the theory and practice of cryptography and Information Security. Present day digital threats and risk management in information security are discussed. The viewpoint taken throughout the course is to emphasize the theory of cryptography as it can be applied in practice. This is an approach that is pursued in the state-of-the-art techniques in information security taking into consideration to be also a pedagogically desirable approach path.

_________________________________________________________

3. Data Breach and Defensive Measures

The course discusses present-day data breach threats. It demonstrates how ineffective a typical data breach prevention system can be and the typical delay time before discovering it. The students will be familiar with the concept that the attacker has to be successful only once while the company’s IT security personnel have to be successful every single time. This course introduces the students to what constitutes an advanced threat. The student will be able to learn how these advanced persistent threats (APT) work and how they can penetrate your system from any mobile end point.  In this respect, the course hashes out in what way or manner the knowledgeable attacker can circumvent traditional controls and avoid other security measures. 

_________________________________________________________

4. Encrypted Traffic Management

Preventing advanced digital threats is becoming more challenging every day. Cyber adversaries are hiding their attacks within Secure Sockets Layer (SSL) traffic to overcome porous perimeter security devices. The course discusses how to inspect SSL traffic for these threats while maintaining the privacy of user’s online security-critical activities.

The course demonstrates some of the difficulties of monitoring and enforcing compliance with internal and external standards for acceptable use of SSL. Implementation of weak encryption keys and below average cipher algorithms often contribute to the organizations’ delusive sense of security. The course discusses methods to equip the organization security devices to scrutinize SSL traffic while applying SSL‐usage standards and asserting user privacy. 

_________________________________________________________

5. PenTest

Pen Test to Avoid a Mess

Intelligently manage vulnerabilities through penetration testing.You can proactively identify the most exploitable vulnerabilities and eliminate false positives. This allows your organization to prioritize remediation efforts, apply needed security patches, and efficiently allocate security resources. Avoid the cost of network downtime. Recovering from a security breach can cost your organization big time–customer protection and retention, legal activities, discouraged business partners, lowered employee productivity, and reduced revenue–just to name a few pitfalls. Pen testing helps you avoid these financial drawbacks by identifying and addressing risks before attacks or security breaches occur. Meet regulatory requirements and avoid fines.

Penetration testing helps organizations address regulatory requirements such as PCIDSS. This can be a formidable task requiring a combination of resources, time, and a little bit of planning. Detailed reports showing test results and validating remediation efforts can help you avoid significant fines for non-compliance and allow you to illustrate ongoing due diligence to assessors. Preserve corporate image and customer loyalty. Even a single incident of compromised customer data can be costly in terms of lost revenue and a tarnished brand image. With customer retention costs higher than ever, no one wants to lose the loyal users that they’ve worked hard to earn, and data breaches are likely to impact new business efforts. Penetration testing helps you dodge these avoidable incidents that put your organization’s reputation and trustworthiness at stake. A pen test can be broadly carried out by following a six-phase methodology:

  • Planning and Preparation,
  • Discovery,
  • Penetration Attempt,
  • Analysis and Reporting,
  • Clean Up, and
  • Finally Remediation

_________________________________________________________

6. Computer Forensics

Computer Forensics can be defined simply, as a process of applying scientific and analytical techniques to computer Operating Systems and File Structures in determining the potential for Legal Evidence. Evidence might be required for a wide range of computer crimes and misuses. Methods of Computer Forensics: •Discovering data on computer system •Recovering deleted, encrypted, or damaged file information •Monitoring live activity •Detecting violations of corporate policy •Information collected assists in arrests, prosecution, termination of employment, and preventing future illegal activity

_________________________________________________________

7. Insider Threat

Careless, negligent  or malicious employees constitute one of the main causes of data breaches. Using cryptography jargon, this type of behvior is called  “Evil Bob”. 

Insiders are the new threat and managers have to learn what to do to avoid these issues. Having a secure data is similar to having a healthy established custom. However, new maladies can strike even if your organization is in the best “health”. Managers need to be ready. The course provides the contingents to avoid these threats.

Depending on the client’s specific needs, we provide special training programs.

Information Security Training