HILLS EDUCATION GROUP SDN BHD

INFORMATION TECHNOLOGY SECURITY CONTINUED PROFESSIONAL DEVELOPMENT (CPD) PROGRAMS 

<< back      >> E-Learning CPD Programs <<      >> CPD Programs

Select your program and email us at cpd@hillseducation.com.  Our consultants will reply you within 24 hours.  Thank you.

S/NO

 

PROGRAM TITLE

 

DURATION

 

Assessment Mode

 

1

ADVANCED REVERSE ENGINEERING & MALWARE ANALYSIS

5 DAYS

Class Based Assessment

 

 

Learning Outcomes: This allows us to visualize the software’s structure, its operations, and the features that drive its behaviour. The techniques of analysis, and the application of automated tools for software examination, give us a reasonable way to comprehend the complexity of the software and to uncover its truth.

We use Remnux, honeypots and online analysis services to track the movement of the malware across the virtual network. We can do malware analysis based on the activity monitoring. We now delve deep into the techniques used for analysis of malware such as process dumping, Live Analysis, analysing Anti-virus evasion and so on. Further we peek at advanced malware methodologies which enable us to capture memory dumps, infect PDF and MS office documents and detect and analyse shell code.

At the end of the course, the learner will be able to:

Learning Objectives

1.      Understand Malwares

2.      Setup your own Malware Analysis Lab

3.      Perform Static and Dynamic malware analysis

4.      Perform Reverse Engineering on malicious files

 

2

FRAUD DETECTION, INVESTIGATION AND PREVENTION

2 DAYS

Class Based Assessment

 

 

Learning Outcomes: How to detect fraudulent activities, and most importantly how to investigate any type of financial fraud. It also explores the various possible avenues of computer-based investigations. The training focuses on audit techniques, fraud detection techniques, accounting and law, practically auditing and investigation of frauds, collection of evidence/documentation which can stand the test of legal scrutiny and write succinct, factual reports. It is power-packed with case studies designed to give participants a clear idea of real-world frauds and how investigative techniques can be deployed to nail the fraudsters and determine the extent and exact nature of the fraud.

At the end of the course, the learner will be able to:

Learning Objectives

1.      Get a clear real world idea of frauds

2.      Understand the different forensic technique used to investigate frauds

3.      Analytics and Evidence presentation

 

3

VIRTUALIZATION & SECURITY

3 DAYS

Class Based Assessment

 

 

Learning Outcomes: In this course, we will teach the virtualization security fundamentals with an in-depth treatment of today's most pressing virtualization security concerns: known attacks and threats, theoretical methods for a security breach.

At the end of the course, the learner will be able to:

Learning Objectives

1.      Understand the fundamentals of Virtualization

2.      Secure Virtualization planning and deployment

3.      Understanding Storage and Cluster security

4.      Understand the best practises for Virtualization security

 

4

NETWORK SECURITY

2 DAYS

Class Based Assessment

 

 

Learning Outcomes: The course covers fundamental aspects of security in a modern networked environment with the focus on system design aspects in the specific context of network / internetwork security. It provides information the participants can apply directly when they go back to work.

At the end of the course, the learner will be able to:

Learning Objectives

1.      Fundamentals of Network Security

2.      Understand the different discovery and evasion techniques

3.      Understand the different network attacks and assessing the security of networks

4.      Perform Network and Wireless network audits

 

5

CERTIFIED PAYMENT INDUSTRY DATA SECURITY IMPLEMENTER (CPI DSI)

3 DAYS

Class Based Assessment

 

 

Learning Outcomes:

·        Understand the requirements of Payment Card Industry’s Data Security Standard (PCI DSS) in depth

·        Understand the implementation challenges

·        Understand the right tools and techniques to help address some of the critical control requirements.

·        Move ahead with compliance not just to PCI DSS, but also with the RBI guidelines.

 

At the end of the course, the learner will be able to:

Learning Objectives

1.      Understand PCI DSS

2.      Understand Assessment and Compliance

3.      PCI DSS Implementation best practices

4.      Identify the concerns in critical infrastructure

 

6

IT RISK MANAGEMENT

2 DAYS

Class Based Assessment

 

 

Learning Outcomes:

·        Identify where and how to reduce known/unknown IT risks

·        Identify areas of cost-benefit optimization and thus reduce IT expenditure

·        Understand the ISO 31000:2009 standard and its applicability to the corporate environment

·        Understand risk assessment as addressed in BASEL II, ISO 20000, ISO 27001, ITIL, COSO, COBIT, BS 25999 and its relevance to IT

·        Understand the different IT Risk Assessment Standards, Models and Methodologies – NIST’s SP-800-30, and OCTAVE™, ISO 27005

·        Insights on practical use of risk assessment and control evaluation techniques

 

At the end of the course, the learner will be able to:

Learning Objectives

1.      Understand Risk Management concepts and techniques

2.      Perform IT Risk assessment

3.      Perform IT Risk mitigation

4.      Evaluate an IT Risk management cycle

 

7

CERTIFIED DIGITAL FORENSICS EXPERT (CDFE)

5 DAYS

Class Based Assessment

 

 

Learning Outcomes:

·        What should one do when there is a suspicion of a computer-based crime?

·        What tools and techniques are most likely to yield the right set of clues?

·        What is the procedure to deal with incident response and remediation?

·        How should the investigation be carried out such that it can be presented in a court of law?

·        Demonstration with the worlds’ leading forensics tool – Encase

·        Working with Forensics Distros like SIFT, DEFT, etc.

 

At the end of the course, the learner will be able to:

Learning Objectives

1.      Understand Computer Forensics and the Investigation process

2.      Setup a Computer Forensics Lab

3.      Perform Disk acquisition and imaging

4.      Perform Forensic analysis on the evidence

5.      Understand Steganography and various email crimes

6.      Perform Windows/Linux/Network/Email/Mobile forensics

 


8

MOBILE SECURITY

3 DAYS

Class Based Assessment

 

 

Learning Outcomes: Secure mobile application design strategies will be put forward to encourage programmers and developers to write secure code in their application(s) for making robust and hardened apps. This will ensure the highest levels of security measures in the apps and subsequently peace of mind for the clients.

At the end of the course, the learner will be able to:

Learning Objectives

1.      Understand iOS and Android architecture and app ecosystems

2.      Analyse and systematically audit Android/iOS applications

 

9

CLOUD COMPUTING SECURITY

3 DAYS

Class Based Assessment

 

 

Learning Outcomes:

·        In this course, we shall first discuss the characteristics of cloud computing and later focus specifically on cloud security’s best practices taking reference from industry standards like NIST, OWASP, Cloud Security Alliance etc.

·        We then consider the broad set of policies, technologies, and controls deployed to protect client data, applications and infrastructure associated with cloud computing.

At the end of the course, the learner will be able to:

Learning Objectives

1.      Build up understanding of Cloud Computing

2.      Setup your own private cloud

3.      Understand Cloud Infrastructure, Cloud Application Security

4.      Understand Cloud Data Security best practises

5.      Compliance and Audit policies for cloud computing

6.      Forensics in cloud

 

Clients

Back to Top 

What We Do

1.  Student Advisory

2.  Content / Program Development

3.  CPD or Corporate / TVET Training

4.  International Partnership Consultancy 

5.  GIIM-HEG Certificate (wth ICCP Certification) + 32 IT & Management Programs 

5.  Degree / International Programs

6.  E-Learning Programs

7.  The Hotel Business Management Training Simulation

Read More

Corporate

Hills Education Group is equipped to deliver quality education and training projects to meet every organization's needs. 

Read More...


THRU GIIM-HEG   

 

GET A MASTERS DEGREE IN AMERICA 

News & Articles

NEWS:

20 Feb 2017 - AD-Vantage E-Learning & Contents' Library now holds over 100 titles -  Project owner Arnez Desmond.

21 May 2017 - HEG and GIIM enter education collaboration to offer IT & Management Certificates in Malaysia and SEA.

01 June 2017- HEG and faculty from WSU enter into an exclusive partnership to offer the Hotel Business Management Training Simulation program in Southeast Asia.

 

ARTICLES:

23 July 2016  - A Bright Path Ahead

30 August 2016 - Transforming TVET in Malaysia

Read more

Categories

About UsBenefits of E-LearningContinued Professional Development (CPD) ProgramsGIIM-HEG Mini-MBA & Certs (US & International)Masters Degree in the US Thru GIIM-HEGHotel Business Management Training SimulationEducation Consulting ServicesProCalV5NewsLocations

Articles Posted

People & Strategy Management

What are Your Customers’ Impressions of Your Organization?