Exploiting IT System Vulnerabilities
WHEN
22 - 23 NOVEMBER 2021
WHERE
MS TEAMS
TIME
9.00AM - 5.00PM
RM 1,550 FOR PROFESSIONALS
10% Discount for Early Bird (until 22 October 2021) / Group / Students
CONTENT SUMMARY
INTRODUCTION
The challenge of dealing with IT (computer systems) vulnerabilities, exploits, and threats is that they are always changing. Understanding vulnerability management processes, such as vulnerability testing, penetration testing, etc are crucial for blunting new IT security threats as they arise. It's important to note that there is no standardized method of building a vulnerability management program. As such, How to Exploit IT System Vulnerability is aimed to introduce the standard practice of proactively finding and fixing potential weaknesses in an IT based network security. The goal is to lead the course participants to apply these fixes (mitigation approaches) before an attacker can use them to cause IT security breaches.
OBJECTIVES
Upon completion of this course, participants will be able to:
WHO SHOULD ATTEND?
1. Associate Professor Dr Low Tang Jung
He obtained his Bachelor Degree (Computer Technology) from Teesside University (UK) in 1989, his MSc. IT from UKM in 2001, and his PhD IT from UTP in 2012. Low has been in the academic line for the past 25 years teaching various electrical engineering and ICT courses in various public and private institutions. His research interest includes wireless and mobile networking technology, embedded systems, robotic, IoT and Grid/HPC computing. He has conducted various research and consultancy works for the past 25 years with various clients both local and international.
2. Ts Dr Lukman Ab. Rahim
He completed his PhD at Lancaster University. His current research interest is in formal verification, software and system modelling, and software architecture. Currently, his research is focusing in particular with adopting model-driven engineering and formal verification in cloud computing. Some of the projects he is working on right now are using architecture-driven modernization and model-driven engineering in deploying engineering simulation software as a cloud service, formal verification of cloud security mechanism using model checking, domain specific modelling languages for educational games. Apart from these projects, he is also involved in research projects related to system engineering and Big Data.
3. Ts Abdullah Sani Abdul Rahman
He obtained his first degree in Informatique with specialization in Industrial Systems from the University of La Rochelle, France in 1995. He was then employed by Ramgate Systems Sdn Bhd (a subsidiary of DRB-HICOM) as a Project Engineer in an automated storage retrieval project in KLIA. He was then served as a lecturer in Electrical and Equipment Installation Technology Department at at Univerisiti Kuala Lumpur-MFI (Malaysia France Institute). He completed his Master’s Degree in Computer Science with specialization in Distributed Computing from Universiti Putra Malaysia in 2004. He is currently a PhD candidate in UTP, specializing in Cyber security. His current research interests are in cyber security, optimization and data analytics.
*fee quoted does not include SST, GST/VAT or withholding tax (if applicable)
*fee quoted does not include SST, GST/VAT or withholding tax (if applicable)
Centre for Advanced & Professional Education (CAPE)
Level 16, Menara 2,
Menara Kembar Bank Rakyat,
50470, Jalan Travers,
Kuala Lumpur.
+605 - 368 7558 /
+605 - 368 8485
cape@utp.edu.my