Course Info

Date: June-09-2025

Length: 1 Week

City: Kuala Lumpur

Fees: 3,985

Type: In Classroom

Available Dates

  • Dec-16-2024

    Kuala Lumpur

  • Jan-13-2025

    Kuala Lumpur

  • Feb-10-2025

    Kuala Lumpur

  • Mar-10-2025

    Kuala Lumpur

  • Apr-14-2025

    Kuala Lumpur

  • May-12-2025

    Kuala Lumpur

  • June-09-2025

    Kuala Lumpur

  • July-14-2025

    Kuala Lumpur

  • Aug-11-2025

    Kuala Lumpur

  • Sep-08-2025

    Kuala Lumpur

  • Oct-13-2025

    Kuala Lumpur

  • Nov-10-2025

    Kuala Lumpur

  • Dec-08-2025

    Kuala Lumpur

Dates in Other Venues

  • Nov-25-2024

    Paris

  • Nov-25-2024

    Singapore

  • Dec-02-2024

    Amsterdam

  • Dec-02-2024

    London

  • Dec-09-2024

    Barcelona

  • Dec-09-2024

    Dubai

  • Dec-16-2024

    Istanbul

  • Dec-23-2024

    Singapore

  • Dec-30-2024

    Paris

  • Jan-06-2025

    Dubai

  • Jan-06-2025

    Barcelona

  • Jan-13-2025

    Istanbul

  • Jan-20-2025

    Singapore

  • Jan-20-2025

    Paris

  • Jan-27-2025

    London

  • Jan-27-2025

    Amsterdam

  • Feb-03-2025

    Dubai

  • Feb-03-2025

    Barcelona

  • Feb-10-2025

    Istanbul

  • Feb-17-2025

    Singapore

  • Feb-17-2025

    Paris

  • Feb-24-2025

    Amsterdam

  • Feb-24-2025

    London

  • Mar-03-2025

    Barcelona

  • Mar-03-2025

    Dubai

  • Mar-10-2025

    Istanbul

  • Mar-17-2025

    Singapore

  • Mar-17-2025

    Paris

  • Mar-24-2025

    Amsterdam

  • Mar-24-2025

    London

  • Apr-07-2025

    Dubai

  • Apr-07-2025

    Barcelona

  • Apr-14-2025

    Istanbul

  • Apr-21-2025

    Singapore

  • Apr-21-2025

    Paris

  • Apr-28-2025

    London

  • Apr-28-2025

    Amsterdam

  • May-05-2025

    Dubai

  • May-05-2025

    Barcelona

  • May-12-2025

    Istanbul

  • May-19-2025

    Singapore

  • May-19-2025

    Paris

  • May-26-2025

    London

  • May-26-2025

    Amsterdam

  • June-02-2025

    Dubai

  • June-02-2025

    Barcelona

  • June-09-2025

    Istanbul

  • June-16-2025

    Singapore

  • June-16-2025

    Paris

  • June-23-2025

    London

  • June-30-2025

    Amsterdam

  • June-30-2025

    Dubai

  • June-30-2025

    Barcelona

  • July-07-2025

    Dubai

  • July-07-2025

    Barcelona

  • July-14-2025

    Istanbul

  • July-21-2025

    Paris

  • July-21-2025

    Singapore

  • July-28-2025

    London

  • July-28-2025

    Amsterdam

  • Aug-04-2025

    Dubai

  • Aug-04-2025

    Barcelona

  • Aug-11-2025

    Istanbul

  • Aug-18-2025

    Singapore

  • Aug-18-2025

    Paris

  • Aug-25-2025

    Amsterdam

  • Aug-25-2025

    London

  • Sep-01-2025

    Dubai

  • Sep-01-2025

    Barcelona

  • Sep-08-2025

    Istanbul

  • Sep-15-2025

    Paris

  • Sep-15-2025

    Singapore

  • Sep-22-2025

    London

  • Sep-29-2025

    Dubai

  • Sep-29-2025

    Amsterdam

  • Sep-29-2025

    Barcelona

  • Oct-06-2025

    Dubai

  • Oct-06-2025

    Barcelona

  • Oct-13-2025

    Istanbul

  • Oct-20-2025

    Singapore

  • Oct-20-2025

    Paris

  • Oct-27-2025

    Amsterdam

  • Oct-27-2025

    London

  • Nov-03-2025

    Barcelona

  • Nov-03-2025

    Dubai

  • Nov-10-2025

    Istanbul

  • Nov-17-2025

    Singapore

  • Nov-17-2025

    Paris

  • Nov-24-2025

    London

  • Nov-24-2025

    Amsterdam

  • Dec-01-2025

    Dubai

  • Dec-01-2025

    Barcelona

  • Dec-08-2025

    Istanbul

  • Dec-15-2025

    Singapore

  • Dec-15-2025

    Paris

  • Dec-22-2025

    London

  • Dec-29-2025

    Dubai

  • Dec-29-2025

    Amsterdam

  • Dec-29-2025

    Barcelona

Course Details

Course Outline

5 days course

Introduction to Cybersecurity Risks & Threats

  • Introduction to Cybersecurity First Responder course: Overview and objectives
  • Defining cybersecurity and its related key terms and terminologies
  • Discussing the fundamentals and importance of risk management for Cybersecurity
  • Tools and techniques for identifying, assessing and mitigating risks
  • Understanding the role of documentation in risk management
  • Exploring types of cyber threats, and their motivations, and develop their profiles

Threats & Attacks Analysis

  • Understanding the analysis of trends affecting security posture
  • Techniques for conducting continuous threat research
  • Developing and Implementing threat models to predict potential threats
  • Methods for performing reconnaissance in computing and network environment
  • Techniques for assessing the impact of social engineering tactics on organization
  • Exploring attacks and assessing their impact on computing and network environments:

  •       A system hacking attacks
  •       Web-based attacks
  •       Malware
  •       Hijacking and impersonation attacks
  •       Dos Incidents

  • Discussing common mobile and cloud security threats and their impacts

Post-Attack, Vulnerabilities & Penetration Testing

  • Techniques for assessing and analyzing post-attack:

  •        Command and control techniques
  •        Persistence techniques
  •        Lateral movement and pivoting techniques
  •        Data exfiltration techniques
  •        Anti-forensics techniques

  • Techniques for assessing and analyzing post-attack:
  • Developing and implementing a vulnerability management plan
  • Explore common vulnerabilities and their impact in the organization
  • Tools and techniques for scanning vulnerabilities
  • Steps for conducting penetration tests on network assets

Cybersecurity Intelligence & Log Data

  • Understanding the meaning of Cybersecurity intelligence
  • Discussing the importance of collecting Cybersecurity intelligence in detecting threats
  • Exploring the deployment of a security intelligence collection and analysis platform
  • Methods for collecting data from intelligence sources:

  •       Network-based
  •       Host-based

  • Discovering tools to analyze log data, including SIEM

Incidents Analysis, Response & Investigation

  • Discussing how to analyze active asset and network
  • Exploring Windows-Based and Linux-Based tools to analyze incidents
  • Understanding the analysis of compromise indicators
  • Developing a response and management plan for incident
  • Strategies for containing and mitigating incidents
  • Discussing steps for preparing forensic investigations and the role of CSIRT
  • Developing a forensic investigation plan using incident information
  • Understanding the importance of security while collecting and analyzing electronic evidence
  • Exploring post-investigation activities
  • Course evaluation and feedback