Carian Kursus

[ KCA0081 ] Kursus IR4.0: Digital Forensic and Evidence [ Siri 1/2022 ]

Sinopsis Kursus

In the sphere of information technology, cyber security plays a critical role. In today's world, protecting information has become one of the most difficult tasks. When we think about cyber security, the first thing that comes to mind is cybercrime, which is on the rise at an alarming rate. Various governments and businesses are taking a variety of steps to combat cybercrime. Despite many steps, cyber security remains a major issue for many people. The Course covers the most up-to-date information on cyber security tactics, ethics, and trends that are transforming the face of cyber security. A solid cyber security plan should be in line with the company's vision, goals, and innovation projects. It can improve product integrity, customer experience, operations, regulatory compliance, brand reputation, investor confidence, and more if executed correctly, thereby turning risk into a competitive advantage. The advancement of Cyber Crime is easily accessible by hackers/attackers. They have learned to evade traditional signature-based solutions such as firewalls and intrusion detection system. An analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioural analytics skills and forensics skills covered by this course is designed for Cybersecurity Experts or IT professionals to identify and combat attacks, malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.

Cyber Security Professional is expected to have the following skills:

  1. Configure and use threat detection tools
  2. Perform data and log analysis
  3. Interpret the results to identify vulnerabilities, threats and risks to an organization.

In this 2-days course, participants will use their knowledge and skills to configure and use threat detection tools to perform data analysis and interpret the results to identify vulnerabilities and threats with the end goal of securing and protecting applications and systems within an organization.

Objektif Kursus
  1. Pada akhir kursus ini, berdasarkan insiden keselamatan ICT, peserta akan dapat:
  2. Menggunakan analisis data masa sebenar (real-time data analysis) untuk mengesan anomali.
  3. Menganalisa petunjuk-petunjuk untuk mengesan kemungkinan serangan.
  4. Mengunakan peralatan yang sesuai untuk menganalisis insiden keselamatan.
  5. Menggunakan kaedah atau peralatan yang sesuai untuk menyiasat insiden.
Syarat Tambahan

Peserta yang telah dipilih untuk menghadiri kursus dalam talian perlu mematuhi syarat-syarat tambahan berikut:

  • Tidak perlu hadir secara fizikal ke INTAN Bukit Kiara sama ada untuk pendaftaran, menghadiri kuliah dan sebagainya. Hanya perlu berada di tempat masing-masing dengan akses kepada komputer berinternet, mikrofon dan webcam.
  • Mendaftar masuk ke platform dalam talian yang telah ditetapkan tepat jam 8.30 pagi pada hari berkursus. Link ke platform akan diedarkan oleh urus setia kursus sehari sebelum kursus bermula.
  • Menetapkan webcam pada mod ON semasa kursus berlangsung dan menetapkan mikrofon pada mod OFF sekiranya tidak digunakan.
  • Mengemukakan soalan atau maklum balas semasa sesi pembelajaran dengan mengangkat tangan sebelum menetapkan mikrofon pada mod ON atau taip melalui ruangan chat window.
  • Mengekalkan adab tatasusila semasa berinteraksi menerusi ruangan chat window. Beri laluan kepada penceramah/peserta lain untuk turut berkongsi maklumat.                           
  • Memastikan bebas daripada aktiviti lain semasa menghadiri kursus. Sekiranya perlu menguruskan hal penting yang tidak dapat dielakkan, sila maklumkan kepada urus setia melalui ruangan chat window.
  • Membuat penilaian kursus  melalui pautan www.dtims.intan.my bagi memperolehi Sijil Kehadiran Kursus pada hari terakhir kursus.

** Para peserta WAJIB mempunyai akses kepada talian Internet yang laju dan stabil serta mempunyai kemudahan kamera dan mikrofon pada komputer/laptop bagi melancarkan sesi pembelajaran secara dalam talian.

** Link capaian ke platform dalam talian akan dihantar melalui e-mel setelah maklumbalas penyertaan dibuat.
***Sila pastikan alamat emel dikemaskini.

Modul/Topik
Hari Pertama | 15/06/2022 | Rabu
Masa/Sesi Topik
SESI 1 : 08.30 Pagi - 10.30 Pagi
: Introduction of Cyber Security
SESI 2 : 11.00 Pagi - 01.00 Petang
: Cyber Security Strategy
SESI 3 : 02.30 Petang - 04.30 Petang
: Network Level Security; Analyzing Attacks on Computing and Network Environments; & Analyzing Post-Attack Techniques
Hari Ke-2 | 16/06/2022 | Khamis
Masa/Sesi Topik
SESI 1 : 08.30 Pagi - 10.30 Pagi
: Digital Forensics Techniques & Mobile Forensics Techniques
SESI 2 : 11.00 Pagi - 01.00 Petang
: Responding to Cybersecurity Incidents & Security Incident Event Management (SIEM)
SESI 3 : 02.30 Petang - 04.30 Petang
: Hands-on Session - Log Analysis Using SIEM Tool