Available courses

UNIMAS Webinar 2021

This webinar is exclusively intended for FCSIT of UNIMAS. All rights reserved to Sarawak Information System Sdn Bhd (SAINS).

CyberSafe Awareness Training

What You'll Learn:

  • Students will know how to protect themselves from being hacked.
  • Students will understand and be more aware of cybersecurity issues. 
  • Students will learn how to identify different cybersecurity threats in the digital world.

Description: 

Cybersecurity has never been more prominent in the news than these days. Data breaches made headlines across the globe. In almost every case, it was a human error who clicked on an attachment that installed malware or exposed sensitive information. This course is designed to provide a working knowledge of cyber intrusion methods and cybersecurity countermeasures to assist employees in preventing cyberattacks and protecting their systems and information.


Interested? Enroll today!

Secure Coder

What You'll Learn: 

  • Secure programming of application code. 
  • Owasp methodologies and standard
  • Understand how to identify the most common types of web attacks and industry experienced vulnerabilities. 

Description: 

Secure Coder examines and explains common threats and vulnerabilities of web applications. In this course, common web-based vulnerabilities are demonstrated through simulating attacks, while the recommended coding techniques and mitigation methods are explained in the context of PHP, JAVA, and .NET. The course is designed around OWASP Top 10 which is a common standard used in design, architecture, and testing of web applications. 


Interested? Enroll today!


Network Security & Penetration Testing

What You'll Learn: 

  • Hacking tools, methodologies, and techniques.
  • Be able to gather information about your target. 
  • How to find vulnerabilities in your target infrastructure. 
  • Exploit found vulnerabilities.

Description: 

This course starts with proper scoping and recon, then dives deep into scanning, network security threat, post-exploitation, and etc. This is both a practical and theoretical step-by-step course. This course will also demonstrate various network hacking methods, as well as penetration testing methodologies to help you identify network security vulnerabilities in a careful and professional manner.


Interested? Enroll today!


Wifi Hacking & Security

What You'll Learn:

  • Students will understand concepts of Wi-fi
  • Students will be able to conduct Wi-fi penetration testing
  • Students will be able to come out with security measures on Wi-fi

Description: 

While Wi-fi has provide seamless connectivity over its counterpart(cable), it remains vulnerable to attacks due to its seamless nature. Protecting your Wi-fi has been an utterly important and crucial security measure taken to protect and prevent unwanted access to your network and resources.


Interested? Enroll today!


Docker Security Training

What You'll Learn:

  • Docker security fundamentals.
  • Understand how Docker and Container works.
  • Understand Docker Daemon and Docker Container protections.

Description: 

Docker and containers are a whole new way of developing and delivering applications and IT infrastructure. Docker is a popular software, and it is widely used in the field of Information Technology. It’s popularity also brings a larger attack surface and this it is important to understand its security aspects to be able to protect Docker containers. This course focus on Docker security fundamentals to teach students on how to defend their docker daemon, docker images and docker containers.


Interested? Enroll today!


Kubernetes Security Training

What You'll Learn:

  • Basic understanding of Kubernetes Fundamentals.
  • Understand the purpose and theory of Kubernetes
  • Best practices of Kubernetes security.

Description: 

Kubernetes is an open-source framework for automating deployment, scaling, and management of containerized applications. This course is a ‘Deep Dive’ into Kubernetes Security which leads you through Kubernetes Security’s principles and best practices. You are guided through the concepts and best practices of Kubernetes Security and realistic examples are given to apply what is covered.


Interested? Enroll today!


Mobile Security Training

What You'll Learn:

  • Manipulate the behavior of mobile applications to bypass security restrictions.
  • Art of exploiting and penetrating mobile applications so security and performance flaws can be found in your mobile apps before the real hackers do.
  • Hacking and mitigation tools and methods for the mobile apps used by the attacker.

Description: 

Mobile security training aimed to teach how to effectively evaluate the security of mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test.


Interested? Enroll today!

AWS & Azure Cloud Security Training

What You'll Learn:

  • Hardening and securing cloud environments and applications using security tools. 

  • Understand cloud computing’s vulnerabilities.

  • Implement and secure your own environment within Microsoft Azure

Description: 

Cloud security has almost been overlooked by a lot of professionals. When they create an application, or working on some project, people generally fail to properly implement the security aspect correctly. This course is all about implementing the Cloud Security in the first place, where you will learn all the security tools and services available on AWS (Amazon Web Services) and Microsoft Azure.


Interested? Enroll today!

Malware Analysis Training

What You'll Learn:

  • Students will learn how to analyze and fight malicious code, such as viruses and worms.
  • Students will learn how to perform static and dynamic analysis of malware.

Description: 

Malware is everywhere and the industry is desperate for people who can track the hackers. In this course, you will learn about the different types and categories of malware, their signs, and how they work. This course also will teach you on how to perform the basics of dynamic malware analysis and incidents that happened using the malicious code.


Interested? Enroll today!


Digital Forensics Training

What You'll Learn:

  • Students will be able to use log files in digital forensics investigations.
  • Students will understand how an attacker attacks a system.
  • Students will be able to conduct forensics investigations.

Description: 

Digital forensics training is an introduction to computer forensics and analysis, how to perform an investigation to correctly gather, analyze, and present digital evidence to business and legal audiences. This course will help you to better understand how to use digital forensic tools and processes.


Interested? Enroll today!

Incident Response Training

What You'll Learn:

  • Students will understand importance of incident response
  • Students will learn how to conduct forensic collections 
  • Students will know how to measure impact of security incidents

Description: 

Incidents are disruption towards security measures or policies, compromising the confidentiality, integrity and availability of information and processes in an organization thus, causing immeasurable downtime and business losses. This training aids to improve response towards security incidents. 


Interested? Enroll today!


CompTIA Security+ Exam Simulation

The ultimate exam preparation tool, SY0-501 practice questions and answers cover all topics and technologies of the SYO-501 exam allowing you to get prepared and then pass the exam.