Competitive Intelligence

Tactical, Operational & Strategic Analysis of Markets, Competitors & Industries

ECCS Executive Certificate in Cyber Security - ECCS Malaysia


The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on countries. Information Technology is one of the most effective tools with rapid development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best branch or modern tool of Information Technology with respect to security concerns and risk management factors. Information technology is highly integrated into our everyday lives. As a society, we have gone digital. We play, learn, socialize, communicate, and do business online. While cyberspace brings significant benefits, our ever increasing reliance on it, causing or creating new and significant vulnerabilities.

Voice of Green Hat, brought an innovative research based certificate in cyber security along with a number of other cutting edge certifications. This research based certificate is called ECCS. Executive certificate in Cyber Security provides a number of research based in skills, highly brained storm strategy to tackle the problems and multidimensional techniques to countermeasure the cyber-attacks and hacking in the cyber space. Not only this, ECCS also covers intermediate skills for digital forensic investigation, risk management and competitive intelligence to understand the attacker’s approaches as well as having deep understanding with today’s Cyber War scenario. This certificate contains five modules of Cyber security & Law; Ethical Hacking & Countermeasure; Digital Forensic Investigation; Competitive Intelligence and Important Demanded Skills.

This revised certificate also leads towards the specialization such as “Social Media”, “Cloud & Robotic Security”, “Competitive Intelligence”, "Digital Forensic Investigation" and “Web Applications Penetration Test Engineer.


Module ECCS 01:Cyber Security & Laws
A. Introduction to Cyber World, Cyber Security, Internet Security, Computer Security
B. Cyber Laws in Malaysia, Pakistan, USA, Japan, UK, Australia, Germany, Singapore
C. Cyber Crimes, Law Sections and Penalties

Module ECCS 02:Ethical Hacking & Countermeasures
A. Introduction to Ethical Hacking, Virtualizaion and Cloud Computing
B. Foot printing, Scanning, Enumeration
C. System Hacking , Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking
D. Hacking Web Servers , Web Application Vulnerabilities ,Web-based Password Cracking Techniques
E. SQL Injection, Hacking Wireless Networks , Virus and Worms
F. Physical Security
G. Linux Hacking, Evading IDS, Firewalls, and Honey pots, Buffer Overflows
H. Cryptography, Penetration Testing

Module ECCS 03: Computer Forensic Investigation
A. Introduction to Computer Forensics Investigation
B. Data Recovery Software Tools
C. Password Recovery Tools Kits Software

Module ECCS 04: Competitive Intelligence
A. Introduction to competitive Intelligence (CI)
B. Ethics of CI
C. Competitive Intelligence and Espionage

Module ECCS 05: Important Market Demanded Skills
A. Basic Skills of Web Programming
B. Basic Skills of Networking for Windows/ Cisco
C. Basic Skills of Cloud Computing and Application
D. Troubleshooting with Windows, Cisco and Linux etc.

Specialization: (On demand only)

1- Social Media
2- Digital Forensic Investigation
3- Cloud & Robotics Security
4- Competitive Intelligence
5- Web Application Penetration Test Engineer

Student may request to enhance and test his/her knowledge in the specialized disciplines only in Social Media, Cloud & Robotic Security, Digital Forensic Investigation, Competitive Intelligence and Webs Application Penetration Test Engineer only

Learning Outcomes:

  • Student will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed.
  • Student then learns how intruders escalate privileges and what steps can be taken to secure a system.
  • Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
  • Student will learn how to investigate the threats, attack and compromised Data as how to provide risk management at the initial stages.
  • Student will have strong understanding of Competitive Intelligence and its utilization to eliminate competitive advantage rival organization or product at primary level.
  • Student will have practical knowledge on OS (Windows XP, VISTA, 7, 8, 10, Azure, Intune; Windows Server 2003, 2008, 2008R2, 2012, 2012R2, RedHat, Kali, Backtrack, Android etc.) Cloud Computing and Social Media along with a number of tools for countermeasure, defence, forensic and risk management.
  • Student will be able to create, analyses and publish the penetration report along with effect correct action and measure to resolve the problems

Target Audience:

  • Security Officers, Security Professionals, Site Administrators, Security Network Administrator
  • Cyber Laws Auditors, Competitive Intelligence, Strategic Analysis, Market Research and Analysis
  • Financial Analysis, Business Development, Marketing, Document or Information Management
  • Strategic Planning
  • Corporate library
  • Human Resources
  • Recruiting Firms

ECCS Executive Certificate in Cyber Security - ECCS Malaysia

You may also see these links for more information


Contact at

Views: 143


You need to be a member of Competitive Intelligence to add comments!

Join Competitive Intelligence

Free Intel Collab Webinars

You might be interested in the next few IntelCollab webinars:

RECONVERGE Network Calendar of Events

© 2024   Created by Arik Johnson.   Powered by

Badges  |  Report an Issue  |  Terms of Service