Cybersecurity operations centre with threat monitoring dashboards

Cybersecurity Training

Defend organisations against the threats that keep CISOs awake at night. Our 12-month program transforms motivated learners into skilled cybersecurity professionals ready for the front lines of digital defence.

Program Overview

Cyber threats are escalating in both frequency and sophistication across Southeast Asia. Organisations of every size need professionals who can anticipate attacks, harden infrastructure, and respond decisively when breaches occur. This program gives you that capability through a curriculum rooted in real-world scenarios, current tooling, and recognised security frameworks.

You will progress from foundational networking concepts to advanced offensive and defensive techniques. Each module blends lecture content with extensive lab work, including simulated attack environments where you practise penetration testing, incident triage, and forensic analysis. By graduation, you will have logged hundreds of hours of hands-on experience and hold a portfolio of documented security assessments.

Curriculum Highlights

  • Network Security Fundamentals — TCP/IP deep dive, firewall configuration, VPN architecture, and network segmentation strategies for enterprise environments.
  • Ethical Hacking & Offensive Security — Reconnaissance, vulnerability scanning, exploitation techniques, and privilege escalation using industry-standard tools like Kali Linux and Metasploit.
  • Incident Response & Digital Forensics — Structured response procedures, evidence preservation, log analysis, and post-incident reporting aligned with NIST and ISO 27001 standards.
  • Cloud Security — Securing workloads on AWS, Azure, and Google Cloud. Identity management, encryption, container security, and compliance in multi-cloud deployments.
  • Compliance & Risk Management — Understanding regulatory frameworks including PDPA (Malaysia), GDPR, PCI-DSS, and SOC 2. Risk assessment methodologies and security policy development.
  • Penetration Testing — Structured methodology for web application, network, and wireless penetration tests. Report writing and remediation guidance for stakeholders.
  • SIEM Tools & Security Operations — Hands-on experience with Splunk, Elastic SIEM, and QRadar. Alert tuning, correlation rules, dashboard creation, and threat hunting workflows.
  • Threat Intelligence & Analysis — Open-source intelligence gathering, indicator of compromise analysis, threat modelling with MITRE ATT&CK, and strategic intelligence reporting.
  • Secure Coding Practices — Identifying and remediating OWASP Top 10 vulnerabilities in web applications. Secure development lifecycle integration.
  • Capstone Security Assessment — A comprehensive red team/blue team exercise conducted against a simulated corporate environment, culminating in a professional security assessment report.

Who This Program Is For

Career Changers

You are working in a non-technical role but have a strong interest in technology and problem-solving. You want a structured path into a cybersecurity career with practical credentials that employers trust.

IT Professionals Seeking Specialisation

You already work in IT support, networking, or systems administration and want to move into a dedicated security role. This program builds on your existing knowledge and fills the gaps with security-specific expertise.

Recent Graduates

You have completed a degree in computer science, information technology, or a related field and want to specialise before entering the job market. The hands-on focus gives you a practical edge over candidates with only academic experience.

Frequently Asked Questions

Do I need programming experience to enrol?

No prior programming experience is required. The program includes a foundational module on scripting with Python and Bash, which are essential for security automation and tool development. If you already have some coding knowledge, you will move through this section more quickly and can focus on advanced applications.

What equipment or software do I need?

You will need a laptop capable of running virtualisation software (minimum 16 GB RAM recommended). We provide licences for all commercial tools used during the course, and our lab environment is accessible remotely so you can practise from anywhere. A detailed hardware and software checklist is sent to all enrolled students before the program begins.

Does this program prepare me for industry certifications?

Yes. The curriculum aligns with the knowledge domains of CompTIA Security+, CEH (Certified Ethical Hacker), and the CISSP associate level. While we issue our own Sprytani Cybersecurity Professional certificate upon completion, many graduates go on to pass these external certifications within months of finishing the program, using the skills and knowledge they gained here.

Take the First Step Toward a Career in Cybersecurity

Our admissions team can walk you through the enrolment process, discuss financing options, and answer any questions about the program structure. No obligation, just a conversation about your goals.

Get in Touch →