KISMEC Logo

KISMEC Cybersecurity Programs

Explore our comprehensive cybersecurity programs designed to equip you with the knowledge and skills needed to succeed in a dynamic digital landscape.

Certified by Cybersecurity Malaysia

Certified by Cybersecurity Malaysia

1. Network Security and Defense Fundamentals

Target Group: Diploma and above

Duration: 2 months (20 days Self pase study + 10 days guided Online + 3 days Face 2 Face)

Certification 1 : DIGITAL SECURITY ESSENTIAL

Certification 2 : CERTIFIED INCIDENT HANDLING AND NETWORK SECURITY ANALYST

Program Objectives: This program is designed to equip participants with comprehensive knowledge and practical skills in network security, cybersecurity principles, threat mitigation, cryptography, incident handling, and secure programming. The course blends foundational concepts with advanced topics such as malware analysis and web application security, preparing learners to effectively defend organizational systems and respond to cybersecurity threats.

Learning Outcome:

  • You will learn how to build and maintain strong digital defenses for your organization's network and systems.
  • You will understand how to safely handle and respond to a cyberattack, minimizing the damage and recovering quickly.
  • You will know the best practices for keeping customer information and sensitive company data private and secure.
  • You will learn how to identify security weaknesses in websites and applications before they can be exploited by hackers.

Modules:

  • 1. Introduction to Cybersecurity & Ethical Hacking
  • 2. Understanding Cyber Threats & Reconnaissance
  • 3. Network Security & Scanning Techniques
  • 4. Vulnerability Analysis & System Exploitation
  • 5. Malware Threats & Analysis
  • 6. Sniffing & Session Hijacking
  • 7. Denial-of-Service & Evasion Techniques
  • 8. Web & Application Security
  • 9. Secure Programming & AI Risks
  • 10. Wireless, Mobile & IoT Security
  • 11. Cloud Security & Cryptography
  • 12. Data Privacy, Protection & Regulations
  • 13. Security Incidents, Response & Recovery
  • 14. Cybersecurity Frameworks & Assessment

2. Advanced Network Security and Defense

Target Group: Degree and above

Duration: 2 months (20 days Self pase study + 10 days guided Online + 3 days Face 2 Face)

Certification 1 : DIGITAL SECURITY ESSENTIAL

Certification 2 : CERTIFIED INCIDENT HANDLING AND NETWORK SECURITY ANALYST

Program Objectives: To equip participants with in-depth knowledge and advanced hands-on skills in securing network infrastructures, analyzing sophisticated threats, applying cryptographic protections, handling complex cybersecurity incidents, conducting malware and web security analysis, and aligning cybersecurity strategies with global standards and emerging technologies such as AI.

Learning Outcome:

  • You will gain the skills to find and stop advanced cyberattacks that most standard security tools miss.
  • You will know how to effectively manage a cyberattack from start to finish, ensuring a quick and controlled recovery.
  • You will understand how to protect valuable company data and ensure the organization complies with important privacy laws.
  • You will be able to evaluate and improve the security of all company software and websites, stopping hackers before they can get in.

Modules:

  • 1. Advanced Cybersecurity Landscape & Ethical Hacking Overview
  • 2. Advanced Cyber Threats, Reconnaissance & Social Engineering
  • 3. Network Architecture, Scanning & Enumeration
  • 4. Vulnerability Analysis & System Exploitation
  • 5. Applied Cryptography & Attacks
  • 6. Cloud, Mobile & IoT Security and Hacking
  • 7. Data Protection, Privacy & Compliance
  • 8. Malware Analysis & Reverse Engineering
  • 9. Sniffing, Hijacking & DoS Attacks
  • 10. Advanced Web App Security & Exploits
  • 11. Secure Software Development & AI Threats
  • 12. Incident Response, Threat Hunting & Forensics
  • 13. Global Frameworks & Capstone Project

3. Network Security and Defense for Industries

Target Group: Working adults

Duration: 1 months (10 days Self pase study + 5 days guided Online + 3 days Face 2 Face)

Certification 1 : DIGITAL SECURITY ESSENTIAL

Certification 2 : CERTIFIED INCIDENT HANDLING AND NETWORK SECURITY ANALYST

Program Objectives: To equip participants with the skills and knowledge required to secure industrial networks and systems (including OT/ICS/SCADA), protect critical infrastructure, and implement cybersecurity controls tailored to industrial environments. The program combines IT and OT security principles, focusing on network segmentation, threat detection, incident response, and compliance with industrial cybersecurity standards.

Learning Outcome:

  • You will know how to protect our factory equipment and essential services from digital attacks, ensuring our operations run safely and without interruption.
  • You will be able to set up secure communication between different parts of our industrial network, stopping hackers from moving around and causing damage.
  • You will learn how to identify and defend against computer viruses and other threats specifically designed to attack our industrial systems.
  • You will be prepared to handle a cyber emergency in our industrial environment, knowing exactly what to do to contain the problem and get our systems back online.

Modules:

  • 1. Introduction to Industrial Cybersecurity & Ethical Hacking
  • 2. ICS Network Architecture, Components & Reconnaissance
  • 3. Threats to ICS & Vulnerability Analysis
  • 4. Network Scanning, Segmentation & ICS Defense
  • 5. Industrial Cryptography & Secure Protocols
  • 6. Identity, Access Control & Zero Trust in ICS
  • 7. Data Protection, Industrial Compliance & Cloud Exposure
  • 8. Secure Remote Access & VPN in Industrial Sites
  • 9. ICS Malware, Detection & Defense
  • 10. Web Applications, Interfaces & ICS Vulnerabilities
  • 11. Mobile, IoT, and OT Security in ICS
  • 12. Secure Configuration, Patching & Resilience
  • 13. Incident Response & Industrial Threat Hunting
  • 14. Digital Forensics & Recovery for ICS
  • 15. Industrial Penetration Testing & Capstone Simulation

4. Penetration Testing & Ethical Hacking

Target Group: Diploma and above

Duration: 2 months (20 days Self pase study + 10 days guided Online + 3 days Face 2 Face)

Certification 1 : DIGITAL SECURITY ESSENTIAL

Certification 2 : CERTIFIED PENETRATION TESTER

Program Objectives: This program aims to provide participants with comprehensive knowledge and hands-on skills in ethical hacking and penetration testing. It equips learners with the ability to identify, exploit, and mitigate security vulnerabilities across various platforms, including networks, web applications, wireless systems, and operating systems. Participants will develop practical competencies in areas such as Open-Source Intelligence (OSINT), vulnerability assessment, exploit development, and post-exploitation techniques.

Learning Outcome:

  • You will be able to act like a cyber detective, finding hidden security weaknesses in a company's systems before real hackers do.
  • You will learn how to safely test websites and computer networks to make sure they are secure against a wide variety of attacks.
  • You will understand how to trick and outsmart common hacking methods, including those that rely on social engineering and password attacks.
  • You will know how to write a clear report for a company on its security weaknesses and provide a plan on how to fix them.
  • You will learn how to conduct a realistic simulated cyberattack to test a company's defenses.

Modules:

  • 1. Introduction to Ethical Hacking & Cybersecurity Landscape
  • 2. OSINT & Cyber Intelligence Fundamentals
  • 3. Intelligence Tools & Secure Environments
  • 4. Introduction to Vulnerability Assessment & Penetration Testing
  • 5. Target Discovery & Network Mapping
  • 6. Vulnerability Assessment
  • 7. Cracking, Brute Force & Social Engineering
  • 8. Exploitation Techniques
  • 9. PowerShell & Advanced Scripting Attacks
  • 10. Web Application Penetration Testing
  • 11. Wireless Network Penetration Testing
  • 12. Red Team Simulation & Incident Evasion

5. Advanced Penetration Testing & Ethical Hacking

Target Group: Degree and above

Duration: 2 months (20 days Self pase study + 10 days guided Online + 3 days Face 2 Face)

Certification 1 : DIGITAL SECURITY ESSENTIAL

Certification 2 : CERTIFIED PENETRATION TESTER

Program Objectives: This advanced program is designed to deepen participants' expertise in penetration testing and ethical hacking through intensive, hands-on training. It aims to equip cybersecurity professionals with the ability to conduct complex attack simulations, exploit sophisticated system vulnerabilities, bypass modern defense mechanisms, and craft custom exploits. Participants will gain mastery in advanced techniques involving red teaming, Active Directory attacks, wireless compromise, evasion tactics, and post-exploitation persistence.

Learning Outcome:

  • You will gain the skills to simulate a full-scale cyberattack, testing our company's defenses.
  • You will learn how to get deep inside a computer network, move from one system to another without being detected, and prove what a hacker could steal or destroy.
  • You will understand how to bypass modern security tools and firewalls that are designed to stop attacks, proving their weaknesses so they can be improved.
  • You will be able to test the security of our most critical assets, including our websites, cloud services, and other new technologies, to ensure they are safe from attack.

Modules:

  • 1. Threat Emulation & Adversary Simulation
  • 2. Advanced Reconnaissance & Initial Access
  • 3. Custom Exploit Development
  • 4. Advanced Payload Generation & Obfuscation
  • 5. Red Team Infrastructure & C2 Frameworks
  • 6. Privilege Escalation Techniques - Windows & Linux
  • 7. Active Directory (AD) Exploitation
  • 8. Lateral Movement & Persistence
  • 9. Post-Exploitation & Data Exfiltration
  • 10. Advanced Web App & API Attacks
  • 11. Bypassing Security Controls & EDR Evasion
  • 12. Cloud & Container Penetration Testing
  • 13. Wireless & IoT Hacking Techniques
  • 14. Red Team Operations & Blue Team Evasion
  • 15. Capstone Practical Assessment & Reporting

6. Penetration Testing & Ethical Hacking for Workers

Target Group: Working adults

Duration: 1 month (10 days Self pase study + 5 days guided Online + 3 days Face 2 Face)

Certification 1 : DIGITAL SECURITY ESSENTIAL

Certification 2 : CERTIFIED PENETRATION TESTER

Program Objectives: The main objective of this program is to provide workers with comprehensive knowledge and hands-on experience in ethical hacking and penetration testing. It enables participants to identify, exploit, and mitigate security vulnerabilities across various platforms including networks, web applications, operating systems, and wireless environments. The program also aims to build technical competencies in OSINT gathering, vulnerability assessment, exploit techniques, and incident simulation.

Learning Outcome:

  • You will be able to think like a hacker to better protect our company from cyberattacks.
  • You will learn how to find security holes in our company's websites and computer networks before a bad guy does.
  • You will understand how to recognize and avoid common tricks hackers use, like password theft and social engineering scams.
  • You will be prepared to help our team handle a cyberattack, knowing how to spot a problem and what steps to take to defend against it.
  • You will know how to perform security assessments in a legal and ethical way.

Modules:

  • 1. Introduction to Cybersecurity & Ethical Hacking
  • 2. Cyber Intelligence & OSINT Basics
  • 3. Setting Up a Safe Testing Environment
  • 4. Vulnerability Assessment Introduction
  • 5. Network Discovery & Mapping
  • 6. Password Attacks & Social Engineering
  • 7. Exploitation Fundamentals
  • 8. Secure Scripting and Automation Basics
  • 9. Web Application Security Essentials
  • 10. Wireless Network Hacking Basics
  • 11. Threat Simulation & Red Teaming Introduction
  • 12. Incident Handling & Defense Techniques
  • 13. Final Practical Assessment & Reflection