Our Training and Development Programs are designed to help you achieve more – build your capabilities & increase your capacity that boosts your career by gaining the right knowledge and skills.
Abyres Training and Development Programs cater different learning styles and you can choose the training path that suits your needs best
Offers Instructor-led training and development sessions in a professional classroom setting. This program covers lectures, discussions, and comprehensive hands-on lab exercises
Offers sessions that focuses on the involvement of participants. This program is aimed to improve understanding of concepts through facilitated activities, hands-on exercises and group discussions
Offers session that allows purposeful engagements with participants in direct experience and focused reflection. This program provides participants with hands-on, collaborative and reflective learning experience that offers opportunity to receive coaching one-on-one from our experienced professionals.
Offers an online learning environment that covers lectures, discussions, and comprehensive hands-on lab exercises. This program offers live interaction between the tutor and the learners as they are participating in learning activities.
Abyres offers a range of customized training and development programmes. We work closely with organizations to design, develop and implement training programmes which is tailored to reflect each organization’s specific training needs
This 2 days Hands-on training is to get the Fundamental understanding of Dropwizard &
Glassfish
Fee: MYR3,000
This 3 days Hands-on training is to get the Fundamental understanding of
ElasticNoSQL
Fee: MYR4,500
This 2 days Hands-on training is to get the Fundamental understanding of OS Patch
Update
Fee: MYR3,000
This 3 days Hands-on training is to get the Fundamental understanding of
PostgreSQL
Fee: MYR4,500
This 3 days Hands-on training is to get the Advanced understanding of
PostgreSQL
Fee: MYR5,400
This 3 days Hands-on training is to get the Fundamental understanding of Apache Tomcat
& NGINX
Fee: MYR4,500
This 3 days Hands-on training is to get the Fundamental understanding of Percona
MariaDB
Fee: MYR4,500
This 6 hours online training is to get the fundamental understanding of Enterprise
Linux system and Architecture
Fee: MYR2,100
CyberSecurity Malaysia (CSM) provides a new platform in nurturing security practitioners and promoting knowledge sharing with leading industry experts & academicians. CSM has over a decade's experience in Cyber Security Competency and Specialized Training programs in Malaysia. ABYRES in partnership with CyberSecurity Malaysia, deliver a line-up of Cyber Security courses ranging from basic to advanced levels.
All training courses will be conducted in CyberSecurity Malaysia (Cyberjaya) training rooms and labs adhering to the Social Distancing (SOPs) defined by the Malaysian Government. Please visit Training Schedule for 2020 training dates. You can request for on-demand trainings as well by filling up our registration form.
This course is intended for managers, government officers or
researcher/educators who are interested to understand high level information....
Fee: MYR1,950
This course is intended for managers, government officers or researcher/educators who are interested to understand high level information about digital forensic. Participants are encouraged to participate in decision making to manage evidence, forensics team, tools and resources.
This course is designed specifically to create understanding on basics of
cryptography and presenting main ideas in....
Fee:
MYR1,200
This course is designed specifically to create understanding on basics of cryptography and presenting main ideas in simple language.
This training is designed specifically to help you understand the importance of
data protection; presenting the main ideas in....
Fee:
MYR1,200
This training is designed specifically to help you understand the importance of data protection; presenting the main ideas in simple language. This training will explain what data encryption is and how it can help you to protect confidential files and other data that is critical for your organization, business and/or personal.
The implementation of Business Continuity Management (BCM) is crucial in all
organizations regardless of the size and nature of business....
Fee: MYR1,800
This course provides general understanding about the importance of cyber
security; create awareness on the growing cyber threats and....
Fee: MYR1,800
Organisations are increasingly aware of the value of their business-critical
information....
Fee: MYR1,000
This course provides a basic....
Fee:
MYR1,200
Search-Fu - Power Search Techniques is a 2-days hands-on workshop which aims to
educate Internet users to search information effectively.....
Fee: MYR1,600
This 1-day course provides general understanding about cyber threats landscape
and creates awareness on cyber terrorism and internet radicalization....
Fee: MYR1,800
This training exposes participants with the relevant skills and knowledge in Cloud
Computing Security (also known as Cloud Security) supported with....
Fee: MYR3,780
Summary: This topic will discuss on the introduction of cloud computing evolution, characteristic and benefit of using the cloud computing technology. This topic also covers the introduction to the cloud service models and cloud deployment models. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be discussing on concept of virtualization, hypervisor, virtual recourses and the component inside it that used by cloud computing.This topic will also explain on the benefit of server, desktop and application virtualization and how it can be related to cloud computing. Method of managing virtual machines, networking and storage will also be covered in this topic. Learning on the migration method from a physical server to virtualization environment. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be discussing on cloud networking concept and implementation. It will cover the concepts of cloud network configuration, cloud network optimization, basic troubleshooting network connectivity issues in the cloud. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will discuss on why managing your cloud deployment is important, the CSS and CSP responsibilities and the list of remote access tools for managing your cloud. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be discussing on the challenges in the cloud services against traditional IT, case study on the challenges of cloud implementation and top security challenges on cloud ecosystem. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be discussing on the security objective for cloud computing, the security threats in the cloud and the security model for cloud computing. This topic also covers the typical security controls, issues and security features as consideration in cloud computing implementation. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be discussing on the virtualization security and the typical security problems with virtualization. The content will cover the virtual machine discovery and inventory, configuration management, change management and network segmentation. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be discussing is on the business continuity aspects in the cloud. It will cover on phases of disaster recovery and the disaster recovery methods in the cloud such as failover and failback, replication, hot site etc. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be discussing on the typical cloud encryption technology and methods. Details will cover on the public key infrastructure (PKI) components, IPSec, SSL, TLS and Ciphers.
Summary: This topic will be discussing on the cloud application security. It will cover the understanding of user access control, Operating System hardening via checklist, instance and image security, IAM roles and the data security in the cloud. The following is the sub-topics will be covered in the training module, as follows.
This topic will be discussing on the cloud security assessment. This will cover the vulnerability management in the cloud and the importance of cloud configuration. The content will be also discussing on the basic procedure on how to perform cloud-based penetration testing. Other typical security checking mechanism such as cloud intrusion detection in the cloud and log management will also be covered in this topic. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be covering the introduction of security audit, what is IT audit and what is security audit. This topic will also explain the differences between IT audit and security audit. The following is the sub-topics will be covered in the training module, as follows.
Brief Info: This topic will be covering the cloud security audit overview and the cloud security audit process flow. The following is the sub-topics will be covered in the training module, as follows.
Summary: This topic will be covering the cloud security standards and best practices. The content will be discussing the relevant standards and best practices from existing entities such as ISO, CSA etc. The following is the sub-topics will be covered in the training module, as follows.
Information technology and security networks demand complex algorithms and
cryptographic systems. This....
Fee:
MYR3,600
Information technology and security networks demand complex algorithms and cryptographic systems. This course covers cryptographic components such as policy, cryptography implementation, key management and security issues.
Organizations are increasingly aware of the value of their
business-critical information....
Fee:
MYR3,500
Attackers often take advantage of vulnerabilities in routers, wireless
access point, firewalls, DNS, web and database servers, and other systems ....
Fee: MYR2,200
The outcome of this training is to perform penetration testing, assess
identified web applications and find security vulnerabilities....
Fee:MYR6,300
Servers and desktops are found in all organizations and they are crucial to
business operations. Servers typically host business data that if.....
Fee: MYR2,200
his training exposes participants with the relevant skills and knowledge in
fundamentals of smart card and its devices, based on.....
Fee: MYR6,300
Due to the nature of the training will require each participant to
prepare a specific environment....
Fee:
MYR3,800
It is critical for an organization to secure and protect their
information system. Security posture....
Fee:
MYR4,000
This course explores the objectives of ISMS Audit and explains the roles
and
responsibilities of...
Fee: MYR3,780
Certified Information Security Awareness Manager (CISAM) is a 2-days
hands-on training and...
Fee: MYR2,520
Certified Digital Forensic for First Responder (CDFFR) is a 4-days hands-on
training and...
Fee: MYR5,040
Everyday cybercriminals are looking for ways to penetrate the systems for
their evil intentions...
Fee: MYR5,040
Certified Penetration Tester is 5 days hands-on training and certification
programmes that enable the participants handle the vulnerability
assessment....
Fee: MYR6,300
Participants will be exposed to the security environment through
practitioners experience sharing...
Fee:
MYR3,780
This training expose participants with skills in Industrial Control System
(ICS) Security. Participants will be...
Fee:
MYR3,780
This course provides working level competency for personnel who will be
employed as MySEF Evaluator/MyCC Certifier...
Fee:
MYR3,780
This training exposes participants with skills to assess IoT environment
which includes robotic technology, web application...
Fee: MYR3,780
This course explores on the application of secure software development life
cycle framework focusing in PHP programming specifically i....
Fee: MYR3,780
This training is a practical qualification for those that work in the
fields of data protection and privacy. It is....
Fee:
MYR5,040
Currently, Security Operation Centre (SOC) Analyst role is being only used
in Security Operation Centers (SOC) that are monitoring....
Fee:
MYR6,300