fbpx

INVOICE NO : SIV10132

CAPM Certified Associate In Project Management (VILT)
Date: 26/07/2021 - 29/07/2021

INVOICE NO : SIV10023

 

Project Management Professional Examination Preparatory Course (VILT)
Date: 16/08/2021 - 20/08/2021
Name of Participant(s):
Too Chai Yee (Jaycee)

*PMP (VILT) Project Management Professional Examination Preparatory Course (VILT)
Date: 22/11/2021 - 26/11/2021
Name of Participant(s):
Muhammad Fazmir Hazuwan Bin Mohamad Yusoff

*OTH 7th Edition printed copy & 1 PMI standardized PMP E-Book
(Training Material)
 

What is the Employment Insurance System (EIS)?

The EIS was first implemented in January 2018 by SOCSO. It is a financial scheme aimed at helping employees who lost their jobs until they find new employment. The contributions are being collected in a fund to provide financial assistance to retrenched employees. It also aims to provide extended welfare coverage and aid in job search via career counselling and job-hunting assistance.

 

Iverson PERKESO EIS Program List

Retrenched Employee - Reskilled and Upskilled yourself now with Perkeso EIS Benefits. Get Funded Up To RM4000 Now

Click here for list of courses approved under Iverson for PERKESO EIS Program

lets us guide you to apply the claimable course for you.

fill up the detail below. We will contact you as soon as posible  

*Name:
Please insert your name
*Company:
Please insert your company name
*Designation:
Please insert your designation
*Email:
Please insert your email address
*Mobile:
Please insert your mobile no.
*How you find out about this event?
Please choose one
Please specify
Verification is required

How the EIS can help you?

The Employment Insurance System Act 2017 covers all employees who are:

  • Malaysian citizens/ permanent residents/ temporary residents
  • Aged 18-60
  • Working in the private sector and contribute to EIS
  • Working under a contract of service

 

Eligibility and Conditions

Insured Persons (IP) are eligible to receive benefits if they:

  • Apply within 60 days from the date of loss of employment (LOE)
  • Satisfy the Contributions Qualifying Conditions (CQC) i.e. have paid monthly contributions for a minimum number of months
  • Loss of employment (LOE) as defined in the EIS Act

 

What are considered as the Loss of Employment (LOE)?

LOE occurs if the contract of service of an Insured Person (IP) is terminated or becomes void.

It includes:

  • Normal retrenchment
  • VSS/MSS (voluntary/mutual separation schemes)
  • Closure of workplace due to natural disasters (force majeure)
  • Bankruptcy or closure of the business
  • Constructive dismissal
  • Resignation due to sexual harassment or threats made in the workplace
  • Resignation after being ordered to perform dangerous duties that are not within the job scope

 

What are not included under the Loss of Employment (LOE)?

The following CANNOT be accepted as LOE:

  • Dismissal due to employee misconduct
  • Voluntary resignation
  • Retirement
  • Expiry of a fixed-term contract or completion of a project

 

How to apply?

You may apply online or manually at the nearest SOCSO office.

Please enclose a copy of the following documents with your application:

  • National Registration Identity Card (NRIC)
  • Proof of loss of employment (e.g termination letter, VSS/MSS letter)
  • Bank account information
  • Payment slips for the 6 months before the date of loss of employment
  • Job offer (if applicable)

 

After successful application, please apply for training to https://eis.perkeso.gov.my/eisportal/insured/login

 

Click here for list of courses approved under Iverson for PERKESO EIS Program

PenjanaKerjaya 2.0 - Training Incentive 

What is PenjanaKerjaya 2.0?

PenjanaKerjaya 2.0 under the 2021 Budget is an enhanced version of the previous Hiring Incentive Programme with better rate of incentives to promote the creation of quality jobs and reduce unemployment among locals. Applications for Penjana Kerjaya 2.0 can be made from 1 January 2021 onwards.

Employers may apply for benefits under PenjanaKerjaya 2.0 for employees recruited from 21 December 2020 onwards.

Who are ELIGIBLE for PenjanaKerjaya 2.0?

Employers from all industries registered with SOCSO; and Employers registered with SSM or registered with SOCSO; and other authorities such as ROS, ROC, Local Authorities etc.

 

A. PenjanaKerjaya 2.0 - Training Programme

When can employers apply for the PenjanaKerjaya 2.0 Training Programme?

  • Employers may apply for the PenjanaKerjaya 2.0 Training Programme from 1 January 2021 onwards, once their Hiring Incentive application has been approved by SOCSO.
  • Only employers and employees whose PenjanaKerjaya 2.0 applications have been approved are eligible for the PenjanaKerjaya 2.0 Training Programme.
  • Employers are advised to apply for the PenjanaKerjaya 2.0 Training Programme within 90 days after receiving approval for the Hiring Incentive.

What are the eligibility requirements for employers for the PenjanaKerjaya 2.0 Training Programme?

  • Employers who hired employees / apprentices under PenjanaKerjaya 2.0 may apply to train or upskill their employees based on job requirements.
  • Only courses that suit the industry needs will be approved.
  • Each employee is only eligible for 1 course.

 

B. Iverson PenjanaKerjaya 2.0 - Training Programme List

Click here for list of courses approved under Iverson for PenjanaKerjaya 2.0 Training Programme

lets us guide you to apply the claimable course for your employees.

fill up the detail below. We will contact you as soon as posible  

*Name:
Please insert your name
*Company:
Please insert your company name
*Designation:
Please insert your designation
*Email:
Please insert your email address
*Mobile:
Please insert your mobile no.
*How you find out about this event?
Please choose one
Please specify
Verification is required

 

What are the documents required in the application PenjanaKerjaya 2.0 ? The required documents are as follows:

  • Employer's bank account information (copy of the front page of the Bank Statement with employer's name, bank account number, and bank’s name)
  • Employer’s business registration number verified by the bank (Business Registration Number - BRN). BRN
  • Employee Verification Form signed by the employee.
  • Employee’s bank account information (copy of the front page of the Bank Statement with employee’s name, bank account number, identity card number, and bank’s name) STAFF BANK Certificate / Self-declaration by the employer if the employee belongs to the vulnerable group (listed in table below)
  • Contract of service for the new employee(s) (a copy must be kept as proof)

How can employers check their application status? Employer may check their application status at https://penjanakerjaya.perkeso.gov.my

Virtual class schedule for Jul - Sep 2021 ( all courses are virtual class )

 

Want to know more about the offer we have ?

fill up the detail below. We will contact you as soon as posible  

*Name:
Please insert your name
*Company:
Please insert your company name
*Designation:
Please insert your designation
*Email:
Please insert your email address
*Mobile:
Please insert your mobile no.
*How you find out about this event?
Please choose one
Please specify
Verification is required

For more information, kindly email : This email address is being protected from spambots. You need JavaScript enabled to view it. 

Thank you.

Check out Iverson full schedule, download below  

 

 

This course includes extensive hands-on activites to reinforce the skills and knowledge attained.

At the end of this course, you will have explored the areas below and more:The Tableau analytics platform
• Planning a Tableau Server installation
• Server installation
• Command-line utilities
• Content management and governance
• Authorization and permissions
• Data source management and governance
• Desktop reporting
• Security best practices
• Server UI organization and navigation
• Managing users
• Data extracts
• Schedules, tasks, and subscriptions
• Securing data sources
• Automating administrative tasks
• Monitoring server status, performance
• Customizing the Server experience

Additional Info

  • Certification Course only
  • Price RM7000
  • Exam Price Exclude
  • Duration 4 Days
  • Schedule

    27 - 30 Jul

  • Audience

    This course provides in-depth coverage of the best practices for installing and administering Tableau Server. It covers important information and practices on security, performance, governance, and scalability. The knowledge and skills acquired will position the student to fast track their way to creating a sound and extensible Tableau platform.

  • Prerequisities
  • At Course Completion

    • Tableau Server overview
    • Planning a Server deployment
    • Single Server installation
    • Security and platform reporting features
    • Managing users
    • Functional security and permissions
    • Publishing and securing data sources and workbooks
    • Schedules and tasks
    • Monitoring Server status
    • Automating command line utilities
    • Customizing your Server

  • Module 1 Content
  • Module 2 Content
  • Module 3 Content
  • Module 4 Content
  • Module 5 Content
  • Module 6 Content
  • Module 7 Content
  • Module 8 Content
  • Module 9 Content
  • Module 10 Content
  • Module 11 Content
  • Module 12 Content
  • Module 13 Content
  • Module 14 Content
  • Module 15 Content
  • Module 16 Content
  • Module 17 Content
  • Module 18 Content
  • Module 19 Content
  • Module 20 Content
  • Module 21 Content
  • Module 22 Content
  • Module 23 Content
  • Module 24 Content
  • Module 25 Content
RM7,000.00(+RM420.00 Tax)
* Training Dates:

Course Outline
Chapter 1: Introduction to cross-platform development with Xamarin
In the first chapter, we are looking at a complete, high-level overview of the Xamarin platform. We will look at the different development environments (Visual Studio and Xamarin Studio) and explore all the different building blocks that make up the Xamarin toolset. An overview of the setup when creating your own environment is also included.
- Hello Xamarin!
- C# everywhere
- How Xamarin works
- Xamarin components
- Visual Studio integration
- Xamarin Studio
- Xamarin Forms and XAML
- Xamarin Test Cloud
- Preparing your environment for Xamarin

Chapter 2: Cross-platform code-sharing approaches and architectural considerations
In chapter 2, we are exploring the different approaches which are possible to create cross-platform applications which share code between Windows Phone, iOS and Android (and even Windows 8.1). This chapter focuses mostly on the architectural considerations.
- Code sharing options
- Architecture
- Cross platform solutions
- Dealing with platform specific items
- Demo
- Shared ProjectsCourse Outline :: Xamarin Development:: 
- Portable Class
- Libraries
- Labs

Chapter 3: Building our first Xamarin.Android application
Starting with Chapter 3, we are going to focus on Xamarin.Android. In this chapter, we are introducing the most important aspects of Android development by means of a large instructor-led demonstration. Along the way, you'll learn about activities, intents and much more.
- Activities
- Intents
- Services
- Permissions
- Resources
- Labs

Chapter 4: UI Development with Xamarin.Android
In Chapter 4, we've seen the basic concepts of Android development. In Chapter 4, we are digging deeper in the UI 
aspects. We will see how Xamarin.Android makes it possible to create a good-looking UI. You'll learn about the most important views, the layout managers and fragments, a very important aspect when it comes to building Android apps.
- Introduction to UI layout
- Working with the designer tools
- Layout in Android
- Views in Android
- ListViews and Adapters
- Working with Fragments
- Labs

Chapter 5: Programming Android
Chapter 5 covers more advanced concepts in Android development. This topic contains a collection of topics which are vital to understanding more advanced programming concepts in Android development.
- More on Activities
- Rotation of the device
- ResourcesCourse Outline :: Xamarin Development:: 
- Graphics
- Permissions
- Navigation in Android apps
- Working with services

Chapter 6: Deploying your Xamarin.Android apps
In this final topic covering Android development, we will look at what it takes to deploy apps to the store. We will look at the different stores and see how we can make our app ready for deployment in Google Play.
- Debugging and logging
- Packaging and deploying to the store

Chapter 7: Building our first Xamarin.IOS application
Chapter 7 is the first one which covers iOS development using Xamarin.iOS. Similarly to what we have done with Android, we will look at the basic concepts in iOS development by means of a large instructor-led demonstration. Along the way, the most important iOS development concepts are explained.
- Getting started in iOS
- UIViewController
- NavigationController
- Storyboards
- Labs

Chapter 8: Controllers in-depth
iOS development has a couple of very important concepts that you need to grasp. Controllers is one of them. In this chapter, we are digging into the specifics of controllers and will take a look at some of the built-in controllers in iOS.
- Protocols and delegates
- UIViewController
- UINavigationController
- UITabController
- Modal controller
- iPad controller
- UI flow creation in Storyboards

Chapter 9: Views in-depthCourse Outline :: Xamarin Development:: 
Building a good-looking UI in iOS requires the use of views. In Chapter 9, we are exploring the different views we get by default in Xamarin.iOS. We can create our UIs with the designer in Visual Studio, we'll look at using this designer as well.
- Working with the designer
- Text input
- Buttons
- Images
- Progress
- Scrolling
- Alerts
- Labs

Chapter 10: Table and collection views
Using Table views is a very important aspect in almost every iOS application. This chapter digs deep into the use of table views and how they get their data.
- TableViews
- TableSource
- Indexing
- Headers and footers
- Cell appearance
- Editing data
- Collection Views
- Labs

Chapter 11: Programming Xamarin.iOS
Chapter 11 includes a number of more advanced topics in iOS development.
- Using images
- Using graphics
- Resources
- Permissions and plists
- Working with local files on the device
- Creating apps in code entirely

Chapter 12: Deploying your Xamarin.iOS applicationsCourse Outline :: Xamarin Development:: 
Once your app is ready, it needs to be deployed in the App Store. Making sure it passes certification requiresfollowing a number of steps. In this chapter, we will look at the different steps we need to follow.
- Debugging
- Deploying to the store

Chapter 13: Introduction to Xamarin.Forms
Recently, Xamarin added Xamarin.Forms to the Xamarin product family. Using Forms, we can easily create apps using a single code-base, including the UI, targeting iOS, Android and Windows Phone, while still creating a native app. In this chapter, we will explore Xamarin.Forms.
- Introduction to Xamarin Forms
- Project structure
- Pages
- Views and layouts
- Lists
- Navigation
- Platform features
- Working with the Dependency Service

Chapter 14: XAML and databinding in Xamarin.Forms
Xamarin.Forms lends itself to being used with XAML and even supports data binding. This final chapter will look at how we can use these.
- What is XAML?
- Building an app with XAML
- XAML Syntax
- XAML Markup Extensions
- Data binding
- Lab

Additional Info

  • Certification Course only
  • Course Code Xamarin
  • Price RM4000
  • Exam Price Exclude
  • Duration 5 Days
  • Schedule

    31 May - 4 Jun

  • Audience

    Students should have experience developing applications or websites using C#; the course assumes you are familiar with the language. XAML knowledge is a plus but is not required

RM4,000.00(+RM240.00 Tax)
* Training Dates:

This training exposes participants with skills to assess IoT environment which includes robotic technology, web application, wireless network, and cloud. Participants will be able to identify, perform and mitigate security issues as part of securing IoT environment.


Objective
1. To analyse the main components in IoT environment and technology
2. To understand the capabilities of components in IoT environment
3. To conduct Network Security Assessment involving assessing the security protocol
4. To identify possible mitigation processes
5. To defend the communication in IoT environment
6. To perform application security assessment
7. To provide remediation strategies
8. To defend the applications in IoT environment
9. To determine security risk and incident management plan of IoT environment

 

Exam
The CISA examination is certified by the Global ACE Certification. The examination framework is designed to align with a set of relevant Knowledge, Skills and Attitudes (KSA) that are necessary for a Secure Application Professional. Candidates will be tested via a combination of either continual assessment (CA), multiple choice (MC), theory/underpinning knowledge assessment (UK), practical assessment (PA), assignments (AS) and case studies (CS) as required.Candidates can take the examination at authorized examination centres in participating member countries. Candidates who have successfully passed the CISA examination will be eligible to apply as an associate or professional member by fulfilling the membership criteria defined under the Global ACE Certification

Additional Info

  • Certification Course only
  • Course Code CIoTSA
  • Price RM5000
  • Exam Price Exclude
  • Duration 3 Days
  • Schedule

    13 – 15 July
    28 – 30 Sep
    16 – 18 Nov

     

  • Audience

    IT developer, security analyst, engineer, and cloud security analyst

  • Module 1 Title Module 1: Introduction to IoT
  • Module 1 Content

    Module 1.1: Introduction to IoT Security
    1. Component of IoT Security
    1. Robotic
    2. Wireless
    3. Web Application
    4. Cloud Computing
    5. IoT Security Guideline
    6. Outcome from IoT Security

    Module 1.2: IoT TechnologyCourse Outline :: Certified IoT Security Analyst (CISA)::
    1. History of IoT Technology
    2. Current IoT Technology
    3. IoT In Security
    4. Previous Incident in IoT

  • Module 2 Title Module 1: Introduction to IoT
  • Module 2 Content

    Module 2.1: Introduction to Robotic Technology
    1. Introduction to robotic components
    2. Introduction to robotic communications

    Module 2.2: Case Study
    1. Case Study 1: Manufacturing
    2. Case Study 2: Autonomous System

    Module 2.3: Introduction to type of robotics
    1. Collaborative Robot
    2. Industrial Robot

  • Module 3 Title Module 3: Wireless Network Assessment
  • Module 3 Content

    Module 3.1: Introduction to Wireless Network
    1. Wi-Fi network fundamentals
    2. Wireless network standard and organization
    3. Wireless threats and attacks

    4. Module 3.2: Information Gathering
    5. Active and Passive Scanning
    6. Using tool: Kismet

    Module 3.3: Penetration Testing
    1. Wired equivalent privacy (WEP)
    2. Wi-Fi Protected Access (WPA)
    3. Wi-Fi Protected Access 2 (WPA2)
    4. Cracking WEP & WPA
    5. Wi-Fi protected setup (WPS)

    Module 3.4: Wireless Network Defense
    Mitigation process

  • Module 4 Title Module 4: Web Application Security
  • Module 4 Content

    Module 4.1: Introduction to Web Application Security
    1. Use of web applicationsCourse Outline :: Certified IoT Security Analyst (CISA)::
    2. Importance of web applications in IoT

    Module 4.2: Web Application Threat in IoT
    1. OWASP Top 10 2019
    2. SQL Injection
    3. Cross Site Scripting (XSS)

    Module 4.3: Penetration Testing
    1. SQL Injection on Vulnerable Web Site
    2. Cross Site Scripting on Vulnerable Web Site

    Module 4.4: Web Application Defense
    Mitigation process

  • Module 5 Title Module 5: Cloud
  • Module 5 Content

    Module 5.1 Introduction to Cloud
    1. Introduction to Cloud
    2. Type of Cloud Computing
    3. Public, Private vs Hybrid Cloud

    Module 5.2 Cloud as a Services
    1. Infrastructure as a Services
    2. Platform as a Services
    3. Software as a Services

    Module 5.3 Concept and Architecture
    1. Importance of Cloud Computing in IoT
    2. Secure Cloud Architecture
    3. Secure Cloud Implementation

  • Module 6 Title Module 6: Security in IoT
  • Module 6 Content

    Module 6.1 Introduction to IoT Security Guideline
    The importance of IoT Security

    Module 6.2 Introduction to IoT Security Infrastructure

    Module 6.3 Introduction to IoT Security layer

    Module 6.4 IoT Security Requirement
    Guideline on IoT Security Requirement

RM5,000.00(+RM300.00 Tax)
* Training Dates:

Deep Learning is the fastest-growing field in Machine Learning and highly crucial for Artificial Intelligence, using many layered Deep Neural Networks (DNNs) to make sense of data and enable many practical machine assists. This course introduces students to Deep Learning as a subject within advanced Artificial Intelligence and provides several real-life problem sets that can be solved using Deep Learning neural networks.


Learning Objective
• Understand the intuition behind Artificial Neural Networks 
• Understand the intuition behind Convolutional Neural Networks 
• Apply Artificial Neural Networks in practice 
• Apply Convolutional Neural Networks in practice 
• Understand the intuition behind Recurrent Neural Networks 
• Apply Recurrent Neural Networks in practice

 

Additional Info

  • Certification Course only
  • Course Code DLFC
  • Price RM4500
  • Exam Price Exclude
  • Duration 2 Days
  • Schedule

    16-18 Aug
    6-8 Dec

  • Audience

    Anyone interested to learn more about Deep Learning, or kickstart a career as a Data Scientist. This includes Students, Data Analysts, Developers, Business Owners, Engineers, Product Architects, Entrepreneurs or any individual who wishes to leverage on powerful Deep Learning tools to add value, wherever they are.

  • Prerequisities

    Students must have knowledge in basic high-schoolmathematics

    Required Software
    Anaconda for Python (version 3.x) Optionally Sublime Text

  • Module 1 Title Day 1
  • Module 1 Content

    What is Deep Learning and what are Neural Networks?
    • Deep Learning as a branch of AI
    • Neural networks and their history and relationship to neurons
    • Creating a neural network in Python

    Artificial Neural Networks (ANN) Intuition
    • Understanding the neuron and neuroscience
    • The activation function (utility function or loss function)
    • How do NN’s work?
    • How do NN’s learn?
    • Gradient descent
    • Stochastic Gradient descent
    • Backpropagation

    Building an ANN
    • Getting the python libraries
    • Constructing ANN
    • Using the bank customer churn dataset
    • Predicting if customer will leave or not
    Evaluating Performance of an ANN
    • Evaluating the ANN
    • Improving the ANN
    • Tuning the ANN

    Hands-On Exercise
    • Participants will be asked to build the ANN from the previous exercise
    • Participants will be asked to improve the accuracy of their ANN

    Convolutional Neural Networks (CNN) Intuition
    • What are CNN’s?
    • Convolution operation
    • ReLU Layer
    • Pooling
    • Flattening
    • Full Connection
    • Softmax and Cross-entropy

  • Module 2 Title Day 2
  • Module 2 Content

    Building a CNN
    • Getting the python libraries
    • Constructing a CNN
    • Using the Image classification dataset
    • Predicting the class of an image

    Evaluating Performance of a CNN
    • Evaluating the CNN
    • Improving the CNN
    • Tuning the CNN

    Hands-On Exercise
    • Participants will be asked to build the CNN from the previous exercise
    • Participants will be asked to improve the accuracy of their CNN

    Recurrent Neural Networks (RNN) Intuition
    • What are RNN’s?
    • Vanishing Gradient problem
    • LSTMs
    • Practical intuition
    • LSTM variations

    Building a RNN
    • Getting the python libraries
    • Constructing RNN
    • Using the stock prediction dataset
    • Predicting stock price

    Evaluating Performance of a RNN
    • Evaluating the RNN
    • Improving the RNN
    • Tuning the RNN

    Hands-On Exercise
    • Participants will be asked to build the RNNfrom the previous exercise
    • Participants will be asked to improve the accuracy of their RNN

  • Module 3 Title Day 3*
  • Module 3 Content

    Natural Language Processing and Word Embeddings
    • Word representation
    • Word embeddings
    • Word2Vec
    • Sentiment Classification

    Sequence Models and Attention Mechanism
    • Picking the next word or sentence
    • Beam Search
    • What is an Attention Model?
    • Speech Recognition
    • Trigger Word Detection
    • Working with Advanced NLP Models - GPT – 3

    Hands-On Exercise
    • Participants will be asked to use attention-based sequence models and evaluate their effectiveness
    • Participants will be asked to improve the accuracy of their attention-based models

    Building a Deep Learning Neural Network (DQN)
    • Getting the Python libraries
    • Constructing the DQN
    • Working with OpenAI Gym
    • Optimising a DQN

    Reinforcement Learning
    • What is reinforcement learning?
    • K-Armed Bandit Problem - exploration / exploitation trade-off
    • Markov Processes
    • Policies and value functions
    • Dynamic programming
    • Q learning and Deep Q learning

    Hands-On Exercise
    • Participants will be asked to build the DQN from the previous exercise
    • Participants will be asked to improve the accuracy of their DQN

    Evaluating Performance of a DQN
    • Evaluating the DQN
    • Improving the DQN
    • Tuning the DQN

RM4,500.00(+RM270.00 Tax)
* Training Dates:

Everyday cybercriminals are looking for ways to penetrate the systems for their evil intentions. The recent rising trend of ransomware is also exploiting the unsecured systems to infect many other users or organizations. Therefore, the need for Malaysia to develop secure coding has become an important and urgent issue to protect organizations in Malaysia.


Objective
1. Understand the basic concepts of secure coding
2. Learn the Open Web Application Security Project (OWASP) and Common Weakness Enumeration (CWE) secure coding standards on security vulnerabilities
3. Learn the detail of the Open Web Application Security Project (OWASP) Top Ten secure coding practices and examples of application source code security vulnerabilities
4. To identify and to avoid the common coding mistakes
5. To examine application source code vulnerabilities and demonstrate how the issues are exploited by attackers
6. To ensure the participants have understand the course and apply the knowledge into software development

Additional Info

  • Certification Course only
  • Course Code CSAP
  • Price RM7200
  • Exam Price Exclude
  • Duration 4 Days
  • Schedule

    27 - 30 Sept 
    4 - 7 Oct 
    1 - 4 Nov 
    6 - 9 Dec 

  • Audience

    1. Cyber Security Professionals
    2. Information Security officers/ ISMS Manager
    3. ICTSOs/CIOs/CISOs/CSOs/CTOs
    4. Security auditors, governance and compliance officers
    5. Application Developers, Software Engineers and Programmers

  • Module 1 Title Session 1 : The Concept of Secure Coding
  • Module 2 Title Session 2 : Introduction of Web Security and Secure Coding organizations
  • Module 3 Title Session 3 : Classification of security flaws
  • Module 3 Content

    3.1 OWASP TOP 10

    3.2 CWE/SANS TOP 25

    3.3 Secure Coding Guide in South Korea

  • Module 4 Title Session 4 : Configuration of test application for exercise
  • Module 5 Title Session 5 : Software weakness
  • Module 5 Content

    5.1 SQL Injection
    a. Security Breach Examples
    b. SQL Injection Definition
    c. Exercise - How to test application for SQL Injection
    d. Exercise - How to write secure code

     5.2 Directory Path Traversal
    a. Security Breach Examples
    b. Directory Path Travesal Definition
    c. Exercise - How to test application for Directory Path Tranversal
    d. Exercise - How to write secure code

    5.3 Cross-Site Scripting (XSS)
    a. Security Breach Examples
    b. XSS Definition
    c. Exercise - How to test application for XSS
    d. Exercise - How to write secure code

    5.4 OS Command Injection
    a. Security Breach Examples
    b. OS Command Injection Definition
    c. Exercise - How to test application for OS Command Injection
    d. Exercise - How to write secure code

    5.5 URL Redirection to Untrusted Site
    a. Security Breach Examples
    b. URL Redirection to Untrusted Site Definition
    c. Exercise - How to test application for URL Redirection to Untrusted Site
    d. Exercise - How to write secure codeCourse Outline ::CSAP::

    5.6 Xpath Injection
    a. Security Breach Examples
    b. Xpath Injection Definition
    c. Exercise - How to test application for Xpath Injection
    d. Exercise - How to write secure code

    5.7 HTTP Response Splitting
    a. Security Breach Examples
    b. HTTP Response Splitting Definition
    c. Exercise - How to test application for HTTP Response Splitting
    d. Exercise - How to write secure code

    5.8 Reliance on Untrusted Inputs in a Security Decision
    a. Security Breach Examples
    b. Reliance on Untrusted Inputs in a Security Decision Definition
    c. Exercise - How to test application for Reliance on Untrusted Inputs in a Security Decision
    d. Exercise - How to write secure code

    5.9 Use of a Broken or Risky Cryptographic Algorithm
    a. Security Breach Examples
    b. Use of a Broken or Risky Cryptographic Algorithm
    c. Exercise - How to test application for Use of a Broken or Risky Cryptographic Algorithm
    d. Exercise - How to write secure cod

    5.10 Cleartext Transmission of Sensitive Information
    a. Security Breach Examples
    b. Cleartext Transmission of Sensitive Information Definition
    c. Exercise - How to test application for Cleartext Transmission of Sensitive Information
    d. Exercise - How to write secure code

    5.11 Cleartext Storage of Sensitive Information
    a. Security Breach Examples
    b. Cleartext Storage of Sensitive Information DefinitionCourse Outline ::CSAP::
    c. Exercise - How to test application for Cleartext Storage of Sensitive Information
    d. Exercise - How to write secure code

    5.12 Hard-Coded Credentials
    a. Security Breach Examples
    b. Hard-Coded Credentials Definition
    c. Exercise - How to test application for Hard-Coded Credentials
    d. Exercise - How to write secure code

    5.13 Use of Hard-Coded Cryptographic Key
    a. Security Breach Examples
    b. Use of Hard-Coded Cryptographic Key Definition
    c. Exercise - How to test application for Use of Hard-Coded Cryptographic Key
    d. Exercise - How to write secure code

    5.14 Information Exposure Through Persistent Cookies
    a. Security Breach Examples
    b. Information Exposure Through Persistent Cookies Definition
    c. Exercise - How to test application for Information Exposure Through Persistent Cookies
    d. Exercise - How to write secure code

    5.15 Information Exposure Through Comments
    a. Security Breach Examples
    b. Information Exposure Through Comments Definition
    c. Exercise - How to test application for Information Exposure Through Comments
    d. Exercise - How to write secure code

    5.16 Error Handling
    a. Security Breach Examples
    b. Error Handling Definition
    c. Exercise - How to test application for Error Handling
    d. Exercise - How to write secure code

    5.17 Null Pointer DereferenceCourse Outline ::CSAP::
    a. Security Breach Examples
    b. Null Pointer Dereference Definition
    c. Exercise - How to test application for Null Pointer Dereference
    d. Exercise - How to write secure code

    5.18 Improper Resource Shutdown or Release
    a. Security Breach Examples
    b. Improper Resource Shutdown or Release Definition
    c. Exercise - How to test application for Improper Resource Shutdown or Release
    d. Exercise - How to write secure code

RM7,200.00(+RM432.00 Tax)
* Training Dates:

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline