Training with Iverson classes

Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.

At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.

Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.

As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.

This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001.
 

Additional Info

  • Certification Course & Certificate
  • Course Code PenTest+
  • Price RM6000
  • Exam Price Exclude
  • Exam Code PT0-001
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    13-17 Jan 2020

    16-20 Mar 2020

    18-22 May 2020

    24-28 Aug 2020

    16-20 Nov 2020

  • Audience

    • Penetration Tester
    • Vulnerability Tester
    • Security Analyst (II)
    • Vulnerability Assessment Analyst
    • Network Security Operations
    • Application Security Vulnerability

  • Prerequisities

    To ensure your success in this course, you should have:
    • Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
    • Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.
    You can obtain this level of skills and knowledge by taking CompTIA® Security+® (Exam SY0-501) course or by obtaining the appropriate industry certification.

  • Module 1 Title Planning and Scoping Penetration Tests
  • Module 1 Content

    Topic A: Introduction to Penetration Testing Concepts
    Topic B: Plan a Pen Test Engagement
    Topic C: Scope and Negotiate a Pen Test Engagement
    Topic D: Prepare for a Pen Test Engagement

  • Module 2 Title Conducting Passive Reconnaissance
  • Module 2 Content

    Topic A: Gather Background Information
    Topic B: Prepare Background Findings for Next Steps

  • Module 3 Title Performing Non-Technical Tests
  • Module 3 Content

    Topic A: Perform Social Engineering Tests
    Topic B: Perform Physical Security Tests on Facilities

  • Module 4 Title Conducting Active Reconnaissance
  • Module 4 Content

    Topic A: Scan Networks
    Topic B: Enumerate Targets
    Topic C: Scan for Vulnerabilities
    Topic D: Analyze Basic Scripts

  • Module 5 Title Analyzing Vulnerabilities
  • Module 5 Content

    Topic A: Analyze Vulnerability Scan Results
    Topic B: Leverage Information to Prepare for Exploitation

  • Module 6 Title Penetrating Networks
  • Module 6 Content

    Topic A: Exploit Network-Based Vulnerabilities
    Topic B: Exploit Wireless and RF-Based Vulnerabilities
    Topic C: Exploit Specialized Systems

  • Module 7 Title Exploiting Host-Based Vulnerabilities
  • Module 7 Content

    Topic A: Exploit Windows-Based Vulnerabilities
    Topic B: Exploit *Nix-Based Vulnerabilities

  • Module 8 Title Testing Applications
  • Module 8 Content

    Topic A: Exploit Web Application Vulnerabilities
    Topic B: Test Source Code and Compiled Apps

  • Module 9 Title Completing Post-Exploit Tasks
  • Module 9 Content

    Topic A: Use Lateral Movement Techniques
    Topic B: Use Persistence Techniques
    Topic C: Use Anti-Forensics Techniques

  • Module 10 Title Analyzing and Reporting Pen Test Results
  • Module 10 Content

    Topic A: Analyze Pen Test Data
    Topic B: Develop Recommendations for Mitigation Strategies
    Topic C: Write and Handle Reports
    Topic D: Conduct Post-Report-Delivery Activities

RM6,000.00(+RM360.00 Tax)
* Training Dates:

The CySA+ certification course will teach you the fundamental principles of using threat and vulnerability analysis tools plus digital forensics tools.

Additional Info

  • Certification Course & Certificate
  • Course Code CySA+
  • Price RM5000
  • Exam Price Exclude
  • Exam Code CSO-001
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    4-8 Nov 2019

    24-28 Feb 2020

    22-26 Jun 2020

    21-25 Sep 2020

    14-18 Dec 2020

  • Prerequisities

    You should have successfully earned the CompTIA Network+ certification and CompTIA Security+ certification or have equivalent knowledge. Specifically, it is recommended that you have the following skills and knowledge before starting this course:
    • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
    • Understand TCP/IP addressing, core protocols, and troubleshooting tools
    • Identify network attack strategies and defenses.
    • Know the technologies and uses of cryptographic standards and products
    • Identify network- and host-based security technologies and practices.
    • Describe the standards and products used to enforce security on web and communications technologies.

  • At Course Completion

    After the class, you will be able to:
    • Identify tools and techniques to use to perform an environmental reconnaissance of a target network or security system.
    • Collect, analyze, and interpret security data from multiple log and monitoring sources.
    • Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation.
    • Understand and remediate identity management, authentication, and access control issues.
    • Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack.
    • Understand the use of frameworks, policies, and procedures and report on security architecture with recommendations for effective compensating controls.

  • Module 1 Title Threat Management (1)
  • Module 1 Content

    • Cybersecurity Analysts
    • Reconnaissance Techniques

  • Module 2 Title Vulnerability Management
  • Module 2 Content

    • Managing Vulnerabilities
    • Remediating Vulnerabilities
    • Secure Software Development

  • Module 3 Title Threat Management (2)
  • Module 3 Content

    • Security Appliances
    • Logging and Analysis

  • Module 4 Title Cyber Incident Response
  • Module 4 Content

    • Incident Response
    • Forensics Tools
    • Incident Analysis and Recovery

  • Module 5 Title Security Architecture
  • Module 5 Content

    • Secure Network Design
    • Managing Identities and Access
    • Security Frameworks and Policies

RM5,000.00(+RM300.00 Tax)
* Training Dates:

In this CompTIA Linux+ training, you will learn System Architecture, Linux Installation & Package Management, GNU & Unix Commands, Devices, Linux Filesystem, Filesystem Hierarchy Standard, User Interfaces & Desktops, Administrative Tasks, Essential System Services and Networking Fundamentals.


The CompTIA Linux+ covers multiple distributions, validating skills that help prevent platform lock-in and that promote more flexible approaches to Linux system troubleshooting. If you like pursue your career in system administrator supporting Linux Systems, earn the Comptia Linux+ certification powered by LPI that validates your competency.

Additional Info

  • Certification Course & Certificate
  • Course Code LINUX+
  • Price RM3300
  • Exam Price Exclude
  • Exam Code LX0-103 LX0-104
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    2-6 Mar 2020

    13-17 July 2020

    30 Nov – 4 Dec 2020

  • Audience

    Network systems administrators and engineers who work with Linux-based servers and workstations Certifications CompTIA Linux+ is a vendor-neutral certification, generic across distributions, targeted to individuals with a minimum of 6 to 12 months of practical Linux experience.

  • Prerequisities
    • The CompTIA Linux+ certification validates the knowledge and abilities of individuals with at least six months of practical Linux experience
    • A+ and N+ certification or the equivalent in experience is recommended
  • At Course Completion

    Upon completion of this course, you will be prepared to take the CompTIA Linux+ certification test after cementing your knowledge in the following tested subjects:

    • Installation and Configuration
    • System Maintenance and Operations
    • Application and Services
    • Networking
    • Security
  • Module 1 Title Getting Started with Linux
  • Module 1 Content
    • Module Overview
    • Linux and its History
    • Basic Commands
    • Documentation Booting and Shutting Down
    • Module Review
  • Module 2 Title Linux File System
  • Module 2 Content
    • Module Overview
    • File System Types
    • Partitioning Navigation
    • Managing and Maintaining the File System
    • Module Review
  • Module 3 Title Users and Groups
  • Module 3 Content
    • Module Overview
    • User Groups and Profiles
    • 03: Managing User Accounts
    • Module Review
  • Module 4 Title Working with Files
  • Module 4 Content
    • Module Overview
    • VI Editor
    • Locating Files
    • Links Backup and Restore
    • MySQL
    • Permissions
    • Special Permissions
    • Module Review 
  • Module 5 Title Scripting
  • Module 5 Content
    • Module Overview
    • Shells
    • Customizing the Bash Shell
    • I/O and Control Statements
    • Module Review
  • Module 6 Title Printing
  • Module 6 Content
    • Module Overview
    • Configuring local Printers and Printer File Commands
    • Print Jobs and Queues and Remote Printing
    • Module Review
  • Module 7 Title Packages
  • Module 7 Content
    • Module Overview
    • Using RPM
    • Verifying Packages, Updating Packages and Repositories
    • YUM Commands and Install with YUM
    • Debian Package Manager
    • Source Files
    • Module Review
  • Module 8 Title Networking
  • Module 8 Content
    • Module Overview
    • Connecting to a Network
    • Configuring Routes
    • Configuring DHCP
    • Configuring DNS
    • Implementing Network File Sharing Services
    • Configuring NIS
    • Managing Remote Network Servers
    • Configuring Web Servers
    • Implementing Apache Access Control
    • Implementing Access Control in a Proxy Server
    • Configuring E-mail Services
    • Module Review
  • Module 9 Title Hardware
  • Module 9 Content
    • Module Overview
    • Common Hardware
    • Power Management
    • Removable Hardware
    • Mass Storage Devices
    • Logical Volumes
    • Disk Quotas
    • Module Review
  • Module 10 Title Linux Kernel
  • Module 10 Content
    • Module Overview
    • Exploring the Linux Kernel and Customizing Kernel Modules
    • Creating an initrd Image
    • Managing Device Drivers
    • Monitoring Hardware Devices, Processes and Resources
    • Module Review
  • Module 11 Title Processes
  • Module 11 Content
    • Module Overview
    • Jobs and Background Processes
    • Using Process Table
    • Delayed, Detached and Scheduled Jobs
    • System Time
    • Module Review
  • Module 12 Title System Services
  • Module 12 Content
    • Module Overview
    • Configuring System Services
    • Monitoring System Logs
    • Configuring SELinux
    • Module Review
  • Module 13 Title Securing Linux
  • Module 13 Content
    • Module Overview
    • Examining System
    • Security Securing User Accounts
    • Enabling Firewall Functionality and Implementing Security Auditing
    • Intrusion Detection
    • Module Review
    • Demonstration: Security Based Distributions
  • Module 14 Title Pre-Installation Considerations and Installing
  • Module 14 Content
    • Module Overview
    • Preparing For Installation
    • Identifying Phases of the Linux Boot Sequence
    • Configuring GRUB
    • Install Overview
    • Installing SUSE
    • Installing Fedora
    • Installing CentOS
    • Installing Debian
    • Configuring the GUI and Performing Post-Installation Tasks
    • Module Review
  • Module 15 Title Troubleshooting
  • Module 15 Content
    • Module Overview
    • Troubleshooting System-Based Issues and Hardware Issues
    • Troubleshooting Network Connection and Security Issues
    • Module Review
    • Course Review
    • Final Thoughts
RM3,300.00(+RM198.00 Tax)
* Training Dates:

This course will provide you with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers.

Additional Info

  • Certification Course & Certificate
  • Course Code ITF
  • Price RM2500
  • Exam Price Exclude
  • Exam Code FC0-U51
  • Duration 4 Days
  • Principals CompTIA
  • Schedule

    9-12 Mar 2020

    21-24 Sep 2020

  • At Course Completion

    This course is designed for individuals who are considering a career in information technology (IT) and who might be planning to pursue CompTIA IT Fundamentals certification, CompTIA A+™ certification, or other similar certifications.

  • Module 1 Title Identifying Computer Hardware
  • Module 1 Content
    • Identify Types of Computing Devices
    • Identify Internal Computer Components
    • Common Computer Connector Types
    • Identify Common Peripheral Devices
  • Module 2 Title Identifying Computer Software
  • Module 2 Content
    • Compare Functions and Features of Common Operating Systems
    • Identify Application Software
  • Module 3 Title Setting Up a Basic Workstation
  • Module 3 Content
    • Connect Hardware
    • Install and Configure Operating Systems
    • Install and Configure Applications
    • Configure Accessibility Options
  • Module 4 Title Configuring Network Access
  • Module 4 Content
    • Network Connection Types
    • Install and Configure a SOHO Router
    • Network and Alternative Technologies
    • Sharing and Storage Methods
  • Module 5 Title Working with Files, Folders, and Applications
  • Module 5 Content
    • Create Files
    • Navigate a File Structure
    • Manage Files and Folders
    • Compress and Extract Files
    • Create Screen Captures
  • Module 6 Title Configuring and Using Wireless Devices
  • Module 6 Content
    • Configuring Wireless Devices
    • Use Wireless Devices
  • Module 7 Title Securing Computing Devices
  • Module 7 Content
    • Identify Security Threats
    • Apply Security Best Practices
    • Perform Secure Web Browsing
  • Module 8 Title Supporting Computers and Users
  • Module 8 Content
    • Environmental and Safety Concepts
    • Back Up and Restore Data
    • Manage Software
    • Implement Basic Support Measures
RM2,500.00(+RM150.00 Tax)
* Training Dates:

CompTIA Server+ certified candidates can work in any environment because it is the only vendor-neutral certification covering the major server platforms. It is the only industry certification that covers the latest server technologies including virtualization, security and network-attached storage.

CompTIA Server+ certification validates the skills necessary to be a server administrator. Successful candidates will have mastered the following concepts:

  • Virtualization
  • Storage
  • Security
  • Troubleshooting

Additional Info

  • Certification Course only
  • Course Code SERV
  • Price 3300
  • Exam Price Exclude
  • Exam Code MB0-001
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    11-15 Nov 2019

    13-17 Jan 2020

    13-17 Apr 2020

    10-14 Aug 2020

  • Audience
    • Server Support Technician
    • Server Administrator
    • IT/Server Technician
    • Storage Administrator
  • Prerequisities

    Recommended CompTIA A+ and at least 18 months of IT experience

  • Module 1 Title Server Setup
  • Module 1 Content
    • Servers and Racks
    • Storage Devices
    • RAID
    • System Setup
    • Server Operating Systems
    • Troubleshooting Procedures
  • Module 2 Title Server Networking
  • Module 2 Content
    • Ethernet
    • Internet Protocol
    • Routers and Firewalls
    • Network Services
    • Virtualization Services
  • Module 3 Title Server Applications
  • Module 3 Content
    • Configuring Server Roles
    • Storage Services
    • Volume Management
    • Directory Services
    • File and Print Services
    • Performance Monitoring
  • Module 4 Title Server Maintenance
  • Module 4 Content
    • Server Hardware
    • Environment and Maintenance
    • Power Distribution
    • Server Hardware Troubleshooting
    • Server Management
    • Configuration Management
  • Module 5 Title Server Security
  • Module 5 Content
    • Site Security
    • Remote Access Services
    • Server Hardening
    • Security Software
    • Disaster Recovery
    • Backup
RM3,300.00(+RM198.00 Tax)
* Training Dates:

The Network+ Certification will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. It will prepare you to take the CompTIA Network+ exam by providing 100% coverage of the objectives and content examples listed on the syllabus.

Additional Info

  • Certification Course only
  • Course Code NWK
  • Price RM3300
  • Exam Price Exclude
  • Exam Code N10-007
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    13-17 Jan 2020 (Penang)

    9-13 Mar 2020

    18-22 May 2020 (Penang)

    8-12 Jun 2020

    21-25 Sep 2020

    2-6 Nov 2020 (Penang)

  • Prerequisities

    Regardless of whether you have passed A+, it is recommended that you have the following skills and knowledge before starting this course:

    • Configure and support PC, laptop, mobile (smartphone / tablet), and print devices.
    • Know basic network terminology and functions (such as Ethernet, TCP/IP, switches, routers).
    • Configure and manage users, groups, and shared resources in a simple SOHO network.
    • Understand the use of basic access control measures, such as authentication, security policy, encryption, and firewalls.
    • Understand TCP/IP addressing, core protocols and troubleshooting tools.
  • At Course Completion

    On course completion, you will be able to:

    • Describe the features of different network protocols and products for LANs, WANs, and wireless networks.
    • Understand the functions and features of TCP/IP addressing and protocols.
    • Identify threats to network security and appropriate countermeasures and controls.
    • Install and configure network cabling and appliances.
    • Manage, monitor, and troubleshoot networks.
  • Module 1 Title Topologies and Infrastructure
  • Module 1 Content
    • Topologies and the OSI Model
    • Ethernet
    • Hubs, Bridges, and Switches
    • Infrastructure and Design
  • Module 2 Title Addressing and Routing
  • Module 2 Content
    • Internet Protocol
    • IPv4 Addressing
    • IPv6 Addressing
    • Routing
  • Module 3 Title Troubleshooting and Management
  • Module 3 Content
    • Transport Protocols
    • Name Resolution
    • Troubleshooting
    • Applications and Services
    • Management and Monitoring
    • Cloud and Virtualization
  • Module 4 Title Installation
  • Module 4 Content
    • Network Sites
    • Installing Cable
    • Installing Wireless Networks
    • WAN Technologies
    • Remote Access
  • Module 5 Title Security
  • Module 5 Content
    • Vulnerabilities and Threats
    • Security Appliances
    • Authentication
    • Incident Response
    • Change and Configuration Management
RM3,300.00(+RM198.00 Tax)
* Training Dates:

The CompTIA Cloud+ course will help the student with the knowledge and best practices required of IT practitioners working in cloud computing environments and who must understand and deliver cloud infrastructure.

Additional Info

  • Certification Course & Certificate
  • Course Code Cloud+
  • Price RM3300
  • Exam Price Exclude
  • Exam Code CV0-001
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    18-22 Nov 2019

    10-14 Feb 2020

    15-19 Jun 2020

  • Audience
    • This course is intended for experienced computer support professionals with a working knowledge of computer hardware, software, and operating systems to prepare for the CompTIA® Cloud+® (Exam CV0-001), or who wish to increase their knowledge and understanding of cloud technologies and acquire the required skills to prepare for a career in in that field
  • Module 1 Title Cloud Computing Concepts, Models and Terminology
  • Module 1 Content
    • Cloud Service Models
    • Cloud Delivery Models and Services
    • Cloud Characteristics and Terms
    • Object Storage Concepts
  • Module 2 Title Disk Storage Systems
  • Module 2 Content
    • Disk Types and Configurations
    • Tiering
    • RAID
    • File System Types
  • Module 3 Title Storage Networking
  • Module 3 Content
    • Storage Technologies
    • Access Protocols and Applications
    • Storage Provisioning
  • Module 4 Title Network Infrastructure
  • Module 4 Content
    • Network Types
    • Network Optimization
    • Routing and Switching
    • Network Ports and Protocols
  • Module 5 Title Virtualization Components
  • Module 5 Content
    • Hypervisor
    • Virtualization Host
    • Virtual Machine
  • Module 6 Title Virtualization and the Cloud
  • Module 6 Content
    • Benefits of Virtualization in a Cloud Environment
    • Virtual Resource Migrations
    • Migration Considerations
  • Module 7 Title Network Management
  • Module 7 Content
    • Resource Monitoring Techniques
    • Remote Access Tools
  • Module 8 Title Performance Tuning
  • Module 8 Content
    • Host Resource Allocation
    • Virtual Machine Resource Allocation
    • Optimizing Performance
  • Module 9 Title Systems Management
  • Module 9 Content
    • Policies and Procedures
    • Systems Management Best Practices
  • Module 10 Title Testing and Troubleshooting
  • Module 10 Content
    • Testing Techniques
    • Troubleshooting and Tools
  • Module 11 Title Security in the Cloud
  • Module 11 Content
    • Network Security: Best Practices
    • Data Security
    • Access Control Methods
  • Module 12 Title Business Continuity and Disaster Recovery
  • Module 12 Content
    • Disaster Recovery Methods
    • High Availability
RM3,300.00(+RM198.00 Tax)
* Training Dates:

In this course, you will address the business and technical perspectives of cloud computing. You will learn how to adopt, operate, and govern the cloud. This course helps you to successfully complete the associated CompTIA Cloud Essentials exam to become CompTIA Cloud Essentials certified.

Through scenario-driven learning, you will learn to apply the principles in a realistic setting. Role-play activities present a real-world connection using situations that can occur in your day-to-day life.

The course materials are accredited by the Cloud Credential Council, marked as CompTIA approved quality content and registered with the Project Management Institute.

Additional Info

  • Certification Course & Certificate
  • Course Code CCE
  • Price RM2750
  • Exam Price Exclude
  • Exam Code CLO-001
  • Duration 3 Days
  • Principals CompTIA
  • Schedule

    13-15 Jan 2020

    13-15 Apr 2020

    6-8 July 2020

    5-7 Oct 2020

  • Audience
    • IT management, support staff, and consultants
    • Business managers and analysts
    • Small and midsized business owners
    • Specialists (IT, security, infrastructure, services, systems, and test)
    • Business process owners
    • IT developers
    • Service providers
    • System integrators
    • Architects
  • Prerequisities

    Experience in the IT domain

  • At Course Completion
    • Common terms and definitions of cloud computing
    • Business benefits and considerations of cloud computing
    • Cloud computing from a technical perspective and the various techniques, methods, challenges, and types of clouds
    • Impact and changes of cloud computing on IT service management
    • Steps that lead to the successful adoption of cloud computing and the implications for organizations
    • Compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact
  • Module 1 Title Introduction
  • Module 2 Title Cloud Services from a Business Perspective
  • Module 2 Content
    • Common terms and definitions of cloud computing
    • Relationship between cloud computing and virtualization
    • Early examples of cloud computing
    • Common definitions of cloud computing and their commonalities/differences
    • Types organizations that may and may not benefit from cloud computing
    • Different types of clouds, including XaaS, IaaS, and PaaS
  • Module 3 Title Cloud Computing and Business Value
  • Module 3 Content
    • Comparing cloud computing and outsourcing
    • Characteristics of clouds and cloud services from a business perspective:
      • Scalability
      • Security
      • Hardware independence
      • Variable costs
      • Time to market
      • Distribution over the Internet
      • How the characteristics of cloud computing enhance business value
  • Module 4 Title Technical Perspectives and Cloud Types
  • Module 4 Content
    • Differences between private and public types of clouds from a technical perspective
    • Important techniques and methods for cloud computing deployment:
      • Networking
      • Automation and self service
      • Federation
      • The role of standardization
    • Technical challenges and risks for cloud computing and methods to mitigate them for:
      • Cloud storage
      • Application performance
      • Data integration
      • Security
      • The impact of cloud computing on application architecture and the application-development process
  • Module 5 Title Successful Cloud Adoption
  • Module 5 Content
    •  Typical steps that lead to a successful adoption of cloud computing services:
      • Understand selection criteria for a pilot
      • Relate SaaS, PaaS, IaaS deployment to organizational goals
    •  Roles and capabilities of cloud computing vendors and dependencies on the vendors
    • Organizational capabilities that are relevant for realizing cloud benefits:
      • Skills that are required in an organization adopting cloud computing
      • Critical success factors
    •  Multiple approaches for migrating applications
  • Module 6 Title Cloud Computing and IT Service Management - Impact and Changes
  • Module 6 Content
    • Impact and changes cloud computing on IT service management in a typical organization:
      • Service strategy
      • Service design
      • Service operation
      • Service transition
      • Structured approach based on ITIL to explore the potential impact of cloud computing in your organization
  • Module 7 Title Cloud Computing Risks and Consequences
  • Module 7 Content
    • Issues associated with integrating cloud computing into an organization's existing compliance risk and regulatory framework:
      • Security, legal, compliance, and privacy risks
      • Implications for direct cost and cost allocations
      • How to maintain strategic flexibility
RM2,750.00(+RM165.00 Tax)
* Training Dates:

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.

Additional Info

  • Certification Course & Certificate
  • Course Code SEC
  • Price RM3300
  • Exam Price Exclude
  • Exam Code SY0-501
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    3-7 Feb 2020 (Penang)

    20-24 Apr 2020

    15-19 Jun 2020 (Penang)

    13-17 Jul 2020

    10-14 Aug 2020 (Penang)

    19-23 Oct 2020

    14-18 Dec 2020 (Penang)

  • Module 1 Title Systems Security
  • Module 1 Content

    Section 1.1. Differentiate among various systems security threats.

    Section 1.2. Explain the security risks pertaining to system hardware and peripherals.

    Section 1.3. Implement OS hardening practices and procedures to achieve workstation and server security.

    Section 1.4. Carry out the appropriate procedures to establish application security.

    Section 1.5. Implement security applications.

    Section 1.6. Explain the purpose and application of virtualization technology.

    Section 1.7. Review Questions

    Section 1.8. Answers to Review Questions

  • Module 2 Title Network Infrastructure
  • Module 2 Content

      

    Section 2.1. Differentiate between the different ports & protocols, their respective threats and mitigation techniques.

    Section 2.2. Distinguish between network design elements and components.

    Section 2.3. Determine the appropriate use of network security tools to facilitate network security.

    Section 2.4. Apply the appropriate network tools to facilitate network security.

    Section 2.5. Explain the vulnerabilities and mitigations associated with network devices.

    Section 2.6. Explain the vulnerabilities and mitigations associated with various transmission media.

    Section 2.7. Explain the vulnerabilities and implement mitigations associated with wireless networking.

    Section 2.8. Review Questions

    Section 2.9. Answers to Review Questions

  • Module 3 Title Access Control
  • Module 3 Content

    Section 3.1. Identify and apply industry best practices for access control methods.

    Section 3.2. Explain common access control models and the differences between each.

    Section 3.3. Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.

    Section 3.4. Apply appropriate security controls to file and print resources.

    Section 3.5. Compare and implement logical access control methods.

    Section 3.6. Summarize the various authentication models and identify the components of each.

    Section 3.7. Deploy various authentication models and identify the components of each.

    Section 3.8. Explain the difference between identification and authentication (identity proofing).

    Section 3.9. Explain and apply physical access security methods.

    Section 3.10. Review Questions

    Section 3.11. Answers to Review Questions

  • Module 4 Title Assessments and Audits
  • Module 4 Content

    Section 4.1. Conduct risk assessments and implement risk mitigation.

    Section 4.2. Carry out vulnerability assessments using common tools.

    Section 4.3. Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.

    Section 4.4. Use monitoring tools on systems and networks and detect security-related anomalies.

    Section 4.5. Compare and contrast various types of monitoring methodologies.

    Section 4.6. Execute proper logging procedures and evaluate the results.

    Section 4.7. Conduct periodic audits of system security settings.

    Section 4.8. Review Questions

    Section 4.9. Answers to Review Questions

  • Module 5 Title Cryptography
  • Module 5 Content

    Section 5.1. Explain general cryptography concepts.

    Section 5.2. Explain basic hashing concepts and map various algorithms to appropriate applications.

    Section 5.3. Explain basic encryption concepts and map various algorithms to appropriate applications.

    Section 5.4. Explain and implement protocols.

    Section 5.5. Explain core concepts of public key cryptography.

    Section 5.6. Implement PKI and certificate management.

    Section 5.7. Review Questions

    Section 5.8. Answers to Review Questions

  • Module 6 Title Organizational Security
  • Module 6 Content

    Section 6.1. Explain redundancy planning and its components.

    Section 6.2. Implement disaster recovery procedures.

    Section 6.3. Differentiate between and execute appropriate incident response procedures.

    Section 6.4. Identify and explain applicable legislation and organizational policies.

    Section 6.5. Explain the importance of environmental controls.

    Section 6.6. Explain the concept of and how to reduce the risks of social engineering.

    Section 6.7. Review Questions

    Section 6.8. Answers to Review Questions

RM3,300.00(+RM198.00 Tax)
* Training Dates:

CompTIA's A+ certification is the industry standard for validating the foundational skills needed by today's computer support technicians and is included in the approved list of certifications to meet DoD Directive 8570.1 requirements. This international vendor-neutral certification requires that you pass two exams: CompTIA A+ Essentials Exam 220-
801 and Practical Application Exam 220-802. In this course with a particular focus on CompTIA A+ certification exam preparation, you'll gain the needed knowledge
of basic computer hardware and operating systems. You will cover the essential principles of installing, building, upgrading, repairing, configuring, troubleshooting, optimizing, and preventative maintenance on desktop and laptop computers. You will also learn elements of customer service and communication skills necessary to work with clients. Instructor-led practice exams and quizzes help reinforce course concepts and exam readiness.

Additional Info

  • Certification Course & Certificate
  • Course Code ACP
  • Price RM3498
  • Exam Price Exclude
  • Exam Code 220-901 / 220-902
  • Duration 5 Days
  • Principals CompTIA
  • Schedule

    6-10 Jan 2020

    6-10 Apr 2020

    6-10 Jul 2020

    5-9 Oct 2020

    30 Nov – 4 Dec 2020

  • Audience

    Individuals seeking CompTIA A+ certification (220-801/220-802)

  • Prerequisities
    • End-user skills with Windows-based PCs
    • Basic knowledge of computing concepts
  • Module 1 Title Motherboards and Expansion Cards
  • Module 1 Content
    • Safety procedures
    • Motherboards
    • BIOS settings
    • Expansion cards
  • Module 2 Title CPUs and Power Supplies
  • Module 2 Content
    • CPUs
    • Power supplies
  • Module 3 Title Memory and Physical Storage
  • Module 3 Content
    • RAM types and features
    • Storage devices and media
  • Module 4 Title Connections
  • Module 4 Content
    • Connection interfaces
    • Connectors and cables
  • Module 5 Title Peripheral Devices
  • Module 5 Content
    • Display devices
    • Other devices
  • Module 6 Title Printers
  • Module 6 Content
    • Imaging processes
    • Printer installation
    • Printer maintenance
  • Module 7 Title Notebooks
  • Module 7 Content
    • Notebook hardware components
    • Notebook displays
    • Laptop features
  • Module 8 Title Networking Basics
  • Module 8 Content
    • Networks
    • Internet connection types
    • Network devices
    • Networking basics
  • Module 9 Title The Physical Network
  • Module 9 Content
    • Network cable and connector types
    • Cable and connector properties
    • Networking tools
  • Module 10 Title Networking Protocols
  • Module 10 Content
    • TCP/IP
    • Ports and protocols
  • Module 11 Title Wireless Networking
  • Module 11 Content
    • Wireless networking standards
    • Wireless SOHO networking
  • Module 12 Title Professional Conduct
  • Module 12 Content
    • Communication and professionalism
    • Environmental issues
    • Incident response
  • Module 13 Title Troubleshooting Basics
  • Module 13 Content
    • Troubleshooting methodology
    • The troubleshooting toolkit
  • Module 14 Title Client Operating Systems
  • Module 14 Content
    • Comparing Windows editions
    • Configuring Windows Explorer
    • Command line utility
    • Virtualization
  • Module 15 Title Configuring the Operating System
  • Module 15 Content
    • System configuration tools
    • System information and monitoring
    • Task management
    • Configuration files
  • Module 16 Title Configuring Hardware Settings
  • Module 16 Content
    • Device and hardware settings
    • Disks and partitions
  • Module 17 Title Networking PCs
  • Module 17 Content
    • Creating network connections
    • Sharing files and printers
    • Remote connections
  • Module 18 Title Authentication and User Security
  • Module 18 Content
    • Users and authentication
    • Windows security policies
    • File system security
  • Module 19 Title Securing Systems and Data
  • Module 19 Content
    • Identifying common threats
    • Physical security
    • Digital security
    • Data destruction and disposal
    • Malware detection and removal
  • Module 20 Title Preventative Maintenance
  • Module 20 Content
    • Performing backups
    • Disk maintenance
    • Updating software
  • Module 21 Title Securing Networks
  • Module 21 Content
    • Securing wired networks
    • Securing wireless networks
  • Module 22 Title Troubleshooting System Hardware
  • Module 22 Content
    • Troubleshooting core system elements
    • Troubleshooting storage devices
    • Troubleshooting laptop computers
  • Module 23 Title Display and Printer Troubleshooting
  • Module 23 Content
    • Troubleshooting display issues
    • Printer troubleshooting
  • Module 24 Title Network Troubleshooting
  • Module 24 Content
    • Troubleshooting the physical network
    • Troubleshooting the logical network
  • Module 25 Title Operating System Troubleshooting
  • Module 25 Content
    • Startup and recovery tools
    • Troubleshooting Windows and application issues
RM3,300.00(+RM198.00 Tax)
* Training Dates:

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline