Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.
At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.
Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.
As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001.
13-17 Jan 2020
16-20 Mar 2020
18-22 May 2020
24-28 Aug 2020
16-20 Nov 2020
• Penetration Tester
• Vulnerability Tester
• Security Analyst (II)
• Vulnerability Assessment Analyst
• Network Security Operations
• Application Security Vulnerability
To ensure your success in this course, you should have:
• Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
• Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.
You can obtain this level of skills and knowledge by taking CompTIA® Security+® (Exam SY0-501) course or by obtaining the appropriate industry certification.
Topic A: Introduction to Penetration Testing Concepts
Topic B: Plan a Pen Test Engagement
Topic C: Scope and Negotiate a Pen Test Engagement
Topic D: Prepare for a Pen Test Engagement
Topic A: Gather Background Information
Topic B: Prepare Background Findings for Next Steps
Topic A: Perform Social Engineering Tests
Topic B: Perform Physical Security Tests on Facilities
Topic A: Scan Networks
Topic B: Enumerate Targets
Topic C: Scan for Vulnerabilities
Topic D: Analyze Basic Scripts
Topic A: Analyze Vulnerability Scan Results
Topic B: Leverage Information to Prepare for Exploitation
Topic A: Exploit Network-Based Vulnerabilities
Topic B: Exploit Wireless and RF-Based Vulnerabilities
Topic C: Exploit Specialized Systems
Topic A: Exploit Windows-Based Vulnerabilities
Topic B: Exploit *Nix-Based Vulnerabilities
Topic A: Exploit Web Application Vulnerabilities
Topic B: Test Source Code and Compiled Apps
Topic A: Use Lateral Movement Techniques
Topic B: Use Persistence Techniques
Topic C: Use Anti-Forensics Techniques
Topic A: Analyze Pen Test Data
Topic B: Develop Recommendations for Mitigation Strategies
Topic C: Write and Handle Reports
Topic D: Conduct Post-Report-Delivery Activities
The CySA+ certification course will teach you the fundamental principles of using threat and vulnerability analysis tools plus digital forensics tools.
4-8 Nov 2019
24-28 Feb 2020
22-26 Jun 2020
21-25 Sep 2020
14-18 Dec 2020
You should have successfully earned the CompTIA Network+ certification and CompTIA Security+ certification or have equivalent knowledge. Specifically, it is recommended that you have the following skills and knowledge before starting this course:
• Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
• Understand TCP/IP addressing, core protocols, and troubleshooting tools
• Identify network attack strategies and defenses.
• Know the technologies and uses of cryptographic standards and products
• Identify network- and host-based security technologies and practices.
• Describe the standards and products used to enforce security on web and communications technologies.
After the class, you will be able to:
• Identify tools and techniques to use to perform an environmental reconnaissance of a target network or security system.
• Collect, analyze, and interpret security data from multiple log and monitoring sources.
• Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation.
• Understand and remediate identity management, authentication, and access control issues.
• Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack.
• Understand the use of frameworks, policies, and procedures and report on security architecture with recommendations for effective compensating controls.
• Cybersecurity Analysts
• Reconnaissance Techniques
• Managing Vulnerabilities
• Remediating Vulnerabilities
• Secure Software Development
• Security Appliances
• Logging and Analysis
• Incident Response
• Forensics Tools
• Incident Analysis and Recovery
• Secure Network Design
• Managing Identities and Access
• Security Frameworks and Policies
In this CompTIA Linux+ training, you will learn System Architecture, Linux Installation & Package Management, GNU & Unix Commands, Devices, Linux Filesystem, Filesystem Hierarchy Standard, User Interfaces & Desktops, Administrative Tasks, Essential System Services and Networking Fundamentals.
The CompTIA Linux+ covers multiple distributions, validating skills that help prevent platform lock-in and that promote more flexible approaches to Linux system troubleshooting. If you like pursue your career in system administrator supporting Linux Systems, earn the Comptia Linux+ certification powered by LPI that validates your competency.
2-6 Mar 2020
13-17 July 2020
30 Nov – 4 Dec 2020
Network systems administrators and engineers who work with Linux-based servers and workstations Certifications CompTIA Linux+ is a vendor-neutral certification, generic across distributions, targeted to individuals with a minimum of 6 to 12 months of practical Linux experience.
Upon completion of this course, you will be prepared to take the CompTIA Linux+ certification test after cementing your knowledge in the following tested subjects:
This course will provide you with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers.
9-12 Mar 2020
21-24 Sep 2020
This course is designed for individuals who are considering a career in information technology (IT) and who might be planning to pursue CompTIA IT Fundamentals certification, CompTIA A+™ certification, or other similar certifications.
CompTIA Server+ certified candidates can work in any environment because it is the only vendor-neutral certification covering the major server platforms. It is the only industry certification that covers the latest server technologies including virtualization, security and network-attached storage.
CompTIA Server+ certification validates the skills necessary to be a server administrator. Successful candidates will have mastered the following concepts:
11-15 Nov 2019
13-17 Jan 2020
13-17 Apr 2020
10-14 Aug 2020
Recommended CompTIA A+ and at least 18 months of IT experience
The Network+ Certification will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. It will prepare you to take the CompTIA Network+ exam by providing 100% coverage of the objectives and content examples listed on the syllabus.
13-17 Jan 2020 (Penang)
9-13 Mar 2020
18-22 May 2020 (Penang)
8-12 Jun 2020
21-25 Sep 2020
2-6 Nov 2020 (Penang)
Regardless of whether you have passed A+, it is recommended that you have the following skills and knowledge before starting this course:
On course completion, you will be able to:
The CompTIA Cloud+ course will help the student with the knowledge and best practices required of IT practitioners working in cloud computing environments and who must understand and deliver cloud infrastructure.
18-22 Nov 2019
10-14 Feb 2020
15-19 Jun 2020
In this course, you will address the business and technical perspectives of cloud computing. You will learn how to adopt, operate, and govern the cloud. This course helps you to successfully complete the associated CompTIA Cloud Essentials exam to become CompTIA Cloud Essentials certified.
Through scenario-driven learning, you will learn to apply the principles in a realistic setting. Role-play activities present a real-world connection using situations that can occur in your day-to-day life.
The course materials are accredited by the Cloud Credential Council, marked as CompTIA approved quality content and registered with the Project Management Institute.
13-15 Jan 2020
13-15 Apr 2020
6-8 July 2020
5-7 Oct 2020
Experience in the IT domain
CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
3-7 Feb 2020 (Penang)
20-24 Apr 2020
15-19 Jun 2020 (Penang)
13-17 Jul 2020
10-14 Aug 2020 (Penang)
19-23 Oct 2020
14-18 Dec 2020 (Penang)
Section 1.1. Differentiate among various systems security threats.
Section 1.2. Explain the security risks pertaining to system hardware and peripherals.
Section 1.3. Implement OS hardening practices and procedures to achieve workstation and server security.
Section 1.4. Carry out the appropriate procedures to establish application security.
Section 1.5. Implement security applications.
Section 1.6. Explain the purpose and application of virtualization technology.
Section 1.7. Review Questions
Section 1.8. Answers to Review Questions
Section 2.1. Differentiate between the different ports & protocols, their respective threats and mitigation techniques.
Section 2.2. Distinguish between network design elements and components.
Section 2.3. Determine the appropriate use of network security tools to facilitate network security.
Section 2.4. Apply the appropriate network tools to facilitate network security.
Section 2.5. Explain the vulnerabilities and mitigations associated with network devices.
Section 2.6. Explain the vulnerabilities and mitigations associated with various transmission media.
Section 2.7. Explain the vulnerabilities and implement mitigations associated with wireless networking.
Section 2.8. Review Questions
Section 2.9. Answers to Review Questions
Section 3.1. Identify and apply industry best practices for access control methods.
Section 3.2. Explain common access control models and the differences between each.
Section 3.3. Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.
Section 3.4. Apply appropriate security controls to file and print resources.
Section 3.5. Compare and implement logical access control methods.
Section 3.6. Summarize the various authentication models and identify the components of each.
Section 3.7. Deploy various authentication models and identify the components of each.
Section 3.8. Explain the difference between identification and authentication (identity proofing).
Section 3.9. Explain and apply physical access security methods.
Section 3.10. Review Questions
Section 3.11. Answers to Review Questions
Section 4.1. Conduct risk assessments and implement risk mitigation.
Section 4.2. Carry out vulnerability assessments using common tools.
Section 4.3. Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.
Section 4.4. Use monitoring tools on systems and networks and detect security-related anomalies.
Section 4.5. Compare and contrast various types of monitoring methodologies.
Section 4.6. Execute proper logging procedures and evaluate the results.
Section 4.7. Conduct periodic audits of system security settings.
Section 4.8. Review Questions
Section 4.9. Answers to Review Questions
Section 5.1. Explain general cryptography concepts.
Section 5.2. Explain basic hashing concepts and map various algorithms to appropriate applications.
Section 5.3. Explain basic encryption concepts and map various algorithms to appropriate applications.
Section 5.4. Explain and implement protocols.
Section 5.5. Explain core concepts of public key cryptography.
Section 5.6. Implement PKI and certificate management.
Section 5.7. Review Questions
Section 5.8. Answers to Review Questions
Section 6.1. Explain redundancy planning and its components.
Section 6.2. Implement disaster recovery procedures.
Section 6.3. Differentiate between and execute appropriate incident response procedures.
Section 6.4. Identify and explain applicable legislation and organizational policies.
Section 6.5. Explain the importance of environmental controls.
Section 6.6. Explain the concept of and how to reduce the risks of social engineering.
Section 6.7. Review Questions
Section 6.8. Answers to Review Questions
CompTIA's A+ certification is the industry standard for validating the foundational skills needed by today's computer support technicians and is included in the approved list of certifications to meet DoD Directive 8570.1 requirements. This international vendor-neutral certification requires that you pass two exams: CompTIA A+ Essentials Exam 220-
801 and Practical Application Exam 220-802. In this course with a particular focus on CompTIA A+ certification exam preparation, you'll gain the needed knowledge
of basic computer hardware and operating systems. You will cover the essential principles of installing, building, upgrading, repairing, configuring, troubleshooting, optimizing, and preventative maintenance on desktop and laptop computers. You will also learn elements of customer service and communication skills necessary to work with clients. Instructor-led practice exams and quizzes help reinforce course concepts and exam readiness.
6-10 Jan 2020
6-10 Apr 2020
6-10 Jul 2020
5-9 Oct 2020
30 Nov – 4 Dec 2020
Individuals seeking CompTIA A+ certification (220-801/220-802)