Internet Security Training

Essential training to protect governmental, military and commercial institutions from cyberattacks.

  • Course Delivery

Classroom Training

  • 2 days (recommended)
  • Fundamental
  • Difficulty Level
  • Pre-requisite

Suitable for all

A simple ransomware could ruin your company business

Ransomware is a malware that encrypts a user’s files and demands cryptocurrency in ransom to unlock them and spread across the world in a coordinated cyberattack.

How ransomware happen:


A warning popup from WannaCry appear that files are encrypted

WannaCry searches for and encrypts 176 different file types and appends


Victims were instructed to send ransom payments

It asks users to pay a US$300 ransom in bitcoins.


Payment amount will be doubled after three days

The ransom note indicates that the payment amount will be doubled after three days.


If payment is not made, encrypted files will be deleted

If payment is not made after seven days it claims the encrypted files will be deleted.

See for Real

Phishing Attack Prevention

The majority of emails are opened on mobile devices, scammers have ample opportunity for a successful phishing attack. Hence, our cyber security training will guide you on how to identify & prevent phishing email.

Do you know that a hacker can monitor you from your webcam & microphone?

Learn how to secure your webcam and microphone from hackers

Email encryption flaw and keyloggers allow hackers target easily on full access to your secret messages

Keyloggers run hidden in the background making a note of each keystroke you type. For example, it could look for sequences of numbers that look like credit card numbers and abuse information to a malicious server.

Backup your data on cloud and protect your data

If you are using a computer or mobile device for long enough, something will go wrong sooner or later, can causing you to lose your personal files, documents or images. 

For instances, you can accidentally delete your files, have a hardware malfunction, lose a device or get infected with malware such as ransomeware. Backups often are the only way to rebuild your digital life in the moments like these.

Why you should learn Internet Security?

Reduce Errors

Learn about common scams, such as email attachments that contain malware or phishing emails that steal personal information.

Enhances Security

Use strong passwords, flag suspicious emails, and alert supervisors about unusual communications or activity

Protect Company’s Reputation

A breach of security can ruin the brand's credibility, causing customers to flee in droves.

Helps Morale

Educate everyone discreetly, enhancing job satisfaction and employee retention along the way.

Save Time and Money

Save the time from identifying and recovering from cyber-attack. And save the cost of typical disruption to business operations, upgrades or replacements.

Peace of Mind

Having a strong security policy coupled with security awareness training means less worrying.

What You Will Learn

Introduction to Internet Security.

Personal App safety on Android and iOS.

Why good password are important and best practices for creating passwords.

What is Keyloggers and ways to protect from keyloggers.

Beaware of Phishing and Scammy email example.

Intro to Spam protection.

What is it and how to prevent it.

How can computers send private data?

What ransomware does, how it spreads and how to protect against ransomeware.

Who should attend the training?

This is a non-technical Internet Security Training which is suitable for everyone who uses the internet.




Government Staffs

Home Users

For anyone who use a computer with Internet connection.

For anyone who wants to learn more about internet security and privacy.

Key Take Away

At the end of this Internet Security Training, participants will be able to:

  • Flag suspicious emails and alerting supervisors about unusual communications or activity
  • Prevent cybercrime
  • Mitigate data and security breaches on time to minimize the dangers
  • Behave in a socially responsible manner
  • Prevent breaches and attacks
  • Flagging suspicious emails and alerting supervisors about unusual communications or activity
  • Prevent cybercrime
  • Mitigate data and security breaches on time to minimize the dangers
  • Behave in a socially responsible manner
  • Prevent breaches and attacks

What You Will Get


Free chat support for 1 year


Certificate of Completion provided


Online learning with step by step videos

Bonus in Training

We provide a checklist of best practices precaution measures for FREE!

Public Training

Clients can attend the training at our computer lab based on the given date. Pay per person.

Date: Refer to our training calendar

Venue: Computer Lab, MU DOT MY PLT (Subang Jaya)

Syllabus: Predefined course contents

In-House Training

Conduct this training at your office anytime, anywhere. No limit on number of participants. Just pay per day!

1. Unlimited participants

2. Training date can be chosen by your company

3. Training content can be customized

4. Project based training

Register Now

Improve your skills and develop your career by joining our training now!


HRDF Claimable
MOF No: 357-02240271
Catalogue ID : 80141607

Get A Quote Now / Request Brochure

Still have questions? Check out our FAQ section or fill up enquiry form.
Our marketing ninja’s will get in touch with you.

[[[["field4","equal_to","In-House Training"]],[["hide_fields","field7"]],"and"]]
1 Step 1
Company / Agency
No of People
Comments / Enquiry
0 /

Online Register

Coming soon in 2020. Drop us an email for the latest updates.