CYBERSECURITY bootcamp

FOR ENGINEERS

(EARLY CAREERS | RE-SKILLING | UP-SKILLING PROGRAMME)

THIS BOOTCAMP IS CONDUCTED AND JOINTLY CERTIFIED WITH UNIVERSITI KUALA LUMPUR

20 DAYS | 140 HOURS TRAINING PROGRAMME

ONLINE OR FACE-TO-FACE TRAINING

INTRODUCTION

Cyber security is the practice of protecting computer systems and networks from unauthorised access, use, disclosure, disruption, modification, or destruction. It is a broad field that includes a variety of security measures, such as:



Cyber security is an essential part of protecting businesses and individuals from the ever-growing threat of cyber attacks. By implementing appropriate security measures, organisations can help to protect their data, systems, and networks from unauthorised access and attack.



EXAMPLES OF CYBER SECURITY

Some of the skills that you will gain from this course for a UX engineer role:


WHAT YOU WILL LEARN

In this bootcamp, you will learn the following:


WHO THIS BOOTCAMP IS FOR

This bootcamp focuses towards engineers from various fields and are:


WHAT YOU WILL NEED


HOW THIS COURSE WILL BENEFIT YOU


JOB OPPORTUNITIES 


GENERAL COURSE GUIDE

The bootcamp will be taught by experienced engineers who will help students learn the skills they need to be successful in the technology/engineering industry. It is divided into 5 sections which are outlined below. Breakdown schedule of each section:


 COURSE OUTLINE 

(THIS IS A 20 DAYs BOOTCAMP PROGrAMME)

COURSE OUTLINE

1. CYBER SECURITY: THE NEW FRONTIER

Course Objective:

The objective of this course is to provide participants with a comprehensive understanding of the evolving landscape of cyber-security and its relationship to cybercrime and cyber terrorism. Participants will gain knowledge about cyber-security management, the impact of cybercrime, the threat of cyber terrorism, and real-world case studies to develop a solid foundation in addressing cyber-security challenges.


Learning Outcomes:

By the end of this course, students will be able to:


Prerequisites:

This course does not have any specific prerequisites. However, a basic understanding of information technology and familiarity with general security concepts would be beneficial. Participants with a background in computer science, information security, law enforcement, or related fields may find the content more accessible. It is recommended that participants have a keen interest in cybersecurity and a willingness to explore the complexities of cybercrime and cyber terrorism.


Course Outline:

The course will be divided into the following modules:


2. CYBER SECURITY ESSENTIALS 

Course Objective:

The objective of this course is to provide participants with a solid understanding of essential concepts and practices in cybersecurity. Participants will explore key topics such as the CIS Top 20 Critical Controls, next-generation firewalls, malware, zero-day attacks, social engineering, and more. The course aims to equip participants with foundational knowledge to identify, prevent, and respond to common cybersecurity threats and vulnerabilities.


Learning Outcomes:

By the end of this course, students will be able to:


Prerequisites:

Have completed the previous section


Course Outline:

The course will be divided into the following modules:

Assessment:

The course will be assessed through a combination of quizzes and exercises.


3. ETHICAL HACKING AND VULNERABILITY ASSESSMENT

Course Objective:

The objective of this course is to provide participants with practical knowledge and skills in ethical hacking and vulnerability assessment. Participants will learn about various techniques and tools used in assessing and securing computer systems and networks. The course aims to equip participants with the ability to identify vulnerabilities, perform scans and assessments, and implement appropriate defensive measures to protect against attacks.


Learning Outcomes:

By the end of this course, students will be able to:


Prerequisites:

Have completed the previous sections


Course Outline:

The course will be divided into the following modules:

Assessment:

The course will be assessed through a combination of quizzes and exercises.


4. ADVANCED CYBER DEFENCE STRATEGIES

Course Objective:

The objective of this course is to provide participants with advanced knowledge and skills in cyber defence strategies. Participants will gain a deep understanding of various cybersecurity threats and techniques for defending against them. The course focuses on topics such as Splunk as a SIEM monitoring tool, defending against different types of DDoS attacks, malware blocking, URL filtering, data leak prevention, and more. The goal is to equip participants with practical skills to enhance the security posture of their organisations and effectively mitigate cyber threats.


Learning Outcomes:

By the end of this course, students will be able to:


Prerequisites:

Have completed the previous sections


Course Outline:

The course will be divided into the following modules:

Assessment:

The course will be assessed through a combination of quizzes and exercises.


5. SECURITY INCIDENT HANDLING AND LOG ANALYSIS

Course Objective:

The objective of this course is to provide participants with knowledge and skills in security incident handling and log analysis. Participants will learn about incident response processes, incident prioritisation, handling various types of security incidents including intrusion, malware, phishing, and spam incidents. The course also covers log analysis techniques, log management, and log visualisation. The goal is to equip participants with the necessary tools and techniques to effectively respond to security incidents and analyse logs for proactive threat detection and response.


Learning Outcomes:

By the end of this course, students will be able to:


Prerequisites:

Have completed the previous sections


Course Outline:

The course will be divided into the following modules:

Assessment:

The course will be assessed through a combination of quizzes and exercises.


NOTE FOR PROFESSIONAL CERTIFICATION IN CONTINUING EDUCATION

Upon completion of this MASTERCLASS, students may embark further on cyber security professional certification such as ISC2 or EC | Council certification


YOUR TRAINERS

Dr Harjinthar Singh -  is a Principal Trainer at Marc & Zed. He has over 25 years of experience in the IT industry, and has worked as a trainer, lecturer, and consultant for software development, product design, user interface, user experience, data analysis, RDBMS, video and image editing, and mobile development.

Dr. Singh has taught in Singapore, the United Kingdom, Malaysia, and Australia. He started his teaching career in 2001 as a lecturer for software engineering at London South Bank University. In 2012, he joined a Malaysian government agency, MIMOS Berhad. From 2016 to 2017, he taught Software & Mobile Development for undergraduates, staff re-training programmes, and post-graduates intending to pursue a career as programmers and developers.

Since 2017, Dr. Singh has conducted training and workshops in UI/UX, Interaction Design, Design Thinking, DevOps, MERN FullStack, Agile, JIRA, Git/GitLab, MySQL, MS SQL Server 2016, Infographics, Graphics/Video, and mobile/web development. He is also a certified Scrum Master and Product Owner.

Dr. Singh is a highly experienced and qualified trainer, and has a wealth of knowledge and experience in the IT industry. He is passionate about teaching and helping others to learn, and is committed to providing high-quality training that meets the needs of his clients.

Dr Khairul Anuar Abd Wahid is a Senior Trainer at Marc & Zed. He has over 15 years of experience in the IT industry, and has worked as a trainer, lecturer, and consultant for software development, data science, machine learning, artificial intelligence, and cloud computing.

He has taught in Singapore, Malaysia, and the United States. He started his teaching career in 2007 as a lecturer for software engineering at the National University of Malaysia. In 2012, he joined a Silicon Valley startup, where he worked on developing machine learning algorithms for fraud detection.

Since 2017, Dr. Khairul has conducted training and workshops in Python, R, Machine Learning, Artificial Intelligence, Cloud Computing, and Data Science. He is also a certified Data Scientist and Machine Learning Engineer. He is a highly experienced and qualified trainer, and has a wealth of knowledge and experience in the IT industry. He is passionate about teaching and helping others to learn, and is committed to providing high-quality training that meets the needs of his clients.

Dr. Khairul is a valuable asset to the Marc & Zed Training team, and his expertise in data science and machine learning is highly sought after by businesses in Singapore and Malaysia. He is a passionate educator who is committed to helping others learn and grow.


Djoshkun Diko - has been working as a developer, trainer, coach, and consultant in software engineering since 2008. His expertise includes FullStack, DevOps, Cloud Computing (Amazon Web Services & Google Cloud Platform), PHP, JavaScript, C++, Laravel, Docker, Kubernetes, Golang, VueJS, Python, Shell scripting, HTML5/CSS, MySQL, MariaDB, PostgreSQL, MSSQL Server, Cassandra, and MongoDB.

Throughout his career as a Software Architect/developer/trainer, he has been involved in designing and executing distributed system architecture principles and patterns for applied machine learning products. He has contributed to various projects involving technologies such as Laravel, Symfony, Prestashop, NodeJS, ExpressJS, VueJS, MySQL, MongoDB, PostgreSQL, Camunda Microservices architecture with gRP, GoLang/Python & Echo (Go framework), Flask & Panda libraries (Python Framework), Angular, Docker & Kubernetes, and JIRA & Confluence (Atlassian products).

During his freelance career, he has collaborated with several companies, developing web pages, web shops, and forums using platforms such as Joomla, Wordpress, vBulletin, MyBB, and HTML.

In 2017, he joined Marc & Zed SPACES in Kuala Lumpur as an Assistant Trainer. Although he left Marc & Zed in 2019, his interest in the training field brought him back in February 2020 as a Principal Trainer and Coach. In this role, he conducts hybrid trainings in Singapore, Germany, and Malaysia. He has also taken on web development projects for Marc & Zed, including developing their own website and creating a CMS website for propertysifu.com.my, and providing training for their staff. Currently, he is working on developing a website and providing training for another client of Marc & Zed, Cameron Adams UK Ltd., a real-estate agency.

 OR E-MAIL FOR DETAILS AT janice@marcnzed.com 

OR CALL +6012 451 4977 (MALAYSIA) OR  +65 9052 3859 (SINGAPORE)

Certificate

Upon successful completion of the course, participants will be awarded a verified certificate issued by Universiti Kuala Lumpur [Advancement & Continuing Education (ACE) UNIKL] and co-signed by Marc & Zed SPACES