
Top Private College in Malaysia to Study Cyber Security at APIIT
Written by EduSpiral Consultant Services For more information contact 01111408838
The first year provides a general grounding in computing skills and introduces you to the fundamental aspects of computer security. You will gain technical skills in both computer networks and computer systems that you will build on in later years. In the following years, you will develop technical skills in network security, and hacking attacks and defences as well as in biometrics and biometric based security systems.
In the final year, cryptography and malicious software are covered in some detail. Practical work in the specialist modules and the final year project will involve the development of appropriate security software. As part of studying network security you will cover the CISCO networking syllabus for Cisco Certified Network Associate (CCNA) Routing and Switching and then the follow on CCNA Security syllabus.
You will have an opportunity to take the industry-standard ECCouncil Ethical Hacker Certification. We have placement students in a variety of organisations, including GCHQ, Police High Tech Crime Units, Cyber Security and Digital Forensic businesses.
APIIT, having won hundreds of awards in IT and computing, is the best college in Malaysia to study the degree in Cyber Security.
For more information contact 01111408838
Please fill up the Form below and I will WhatsApp you and provide you with sound advise on how to choose the best private university or college in Malaysia to study at. If you do not give your mobile number or full name as in IC, your query will not be answered. Our knowledgeable & experienced counsellor will send you a message on WhatsApp & provide assistance from there.
Increasing Demand for Qualified and Experienced Cyber Security or Security Systems Professionals in Malaysia
IF there was one surprise for David Siah, it was the fact that despite a rapidly changing IT landscape, targeted attack campaigns were expected to continue to multiply in 2015, becoming the norm rather than the exception.
The Singapore country manager for security vendor Trend Micro was sharing his thoughts with Digital News Asia (DNA) via email, on the main finding of the company’s annual security predictions report, Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible.
“They will no longer originate just from, and set their sights on, countries like the United States, but will come from other countries as well, as we’ve seen attacks from India, Vietnam, and the United Kingdom, among others,” he said.
Pointing to the recent hack of Sony Entertainment Pictures as one such example, Siah said that Trend Micro predicts that two or more major data breach incidents will occur every month in 2015.
“For Sony and other businesses alike, cyber-fraud and cybersecurity is going to be the key component moving forward. This only serves as a reminder for IT administrators to re-analyse and think ahead in terms of securing their network infrastructure.
“Organisations should also constantly monitor their networks for all kinds of threats and exploitable vulnerabilities,” he said.
Siah said businesses need to embrace the paradigm shift and accept the fact that these breaches will occur, rather than simply

Li Jian, IT at Asia Pacific University
preventing threats, and that there is a greater need for a 360-degree detection strategy in order to detect, analyse, and respond to threats.
However, he also noted that there has been an increasing awareness and concern from customers about targeted attacks that could happen to their organisations.
“Many have recognised that it should always be assumed that the system has been compromised and that it is about the ability to react, adapt and detect.
“This reinforces the need to have a technology and monitoring service to assist in detecting targeted attacks or advanced persistent threats.
IN 2014, and increasingly moving forward into 2015, corporate data is now a huge gold-mine that cybercriminals are looking to harvest, according to Trend Micro Inc’s Targeted Attack Trends 2014 Annual Report.
Occurring via a mix of seemingly state and non-state sponsored cyber-attacks, targeted attacks – otherwise known as advanced persistent threats (APTs) – have intensified over the past year, alongside newly identified techniques, the company said in a statement.
Trend Micro’s research analysed various forms of APTs, along with the agenda behind these rising assaults, and monitored attack-related command and control (C&C) infrastructure which poses great threats to the computing public.
“Cybercriminals are adopting techniques more commonly associated with targeted attacks because these prove to be effective

in increasing their financial gain,” said Dhanya Thakkar, managing director, Trend Micro Asia Pacific.
“To fight back, organisations need to remain vigilant and adopt effective solutions to adapt to the changing cyber-landscape.
“They need to reinforce a custom defence strategy, which uses advanced threat detection technologies and shared intelligence, to detect, analyse, and respond to attacks that are invisible to standard security products.”
According to the report, targeted attacks remained hard to tackle because their threat actors proactively cover their traces in targeted networks. With the aim to gather intelligence and exfiltrate confidential data, targeted attack tactics continued to push the envelope with newly identified techniques.
Targeted attacks also remained to be a global problem, with the United States, Russia and China no longer being the only favoured targets for C&C server attacks.
Based on cases monitored in 2014, Australia, Brazil, China, Egypt, and Germany were among the list of countries that hosted targeted attack C&C servers.
With government agencies remaining the top attack targets, Trend Micro also saw a spike in attacks targeting hardware/ software companies, consumer electronics manufacturers, and healthcare providers.
Study Bachelor of Science (Hons) Cyber Security at APIIT in Malaysia
Cyber Security is an important and growing area of work for computing professionals. Any organisation that has a computer

Jane, Asia Pacific University
network or uses the Internet has a potential security risk and will need people with specialised skills to help protect their systems and data.
You may also find yourself working for a specialist consultancy firm that provides such a service to smaller organisations. Computer systems store, process and communicate a wide variety of data. Much of this data is private and improper access to it can result in significant costs to an organisation or the person that owns the data.
Securing computer systems against malicious attack or even against inadvertent damage is vital to any computer system. This programme gives you the knowledge and skills to enable you to prevent attacks and inadvertent damage to computer systems.
The first year provides a general grounding in computing skills and introduces you to the fundamental aspects of computer security. You will gain technical skills in both computer networks and computer systems that you will build on in later years. In the following years, you will develop technical skills in network security, and hacking attacks and defences as well as in biometrics and biometric based security systems.
In the final year, cryptography and malicious software are covered in some detail. Practical work in the specialist modules and the final year project will involve the development of appropriate security software. As part of studying network security you will cover the CISCO networking syllabus for Cisco Certified Network Associate (CCNA) Routing and Switching and then the follow on CCNA Security syllabus.
You will have an opportunity to take the industry-standard ECCouncil Ethical Hacker Certification. We have placement students in a variety of organisations, including GCHQ, Police High Tech Crime Units, Cyber Security and Digital Forensic businesses.
APIIT, having won hundreds of awards in IT and computing, is the best college in Malaysia to study the degree in Cyber Security.
Asia Pacific Institute of Information Technology (APIIT)’s Collaborative Partners:
Programme outline for the BSc (Hons) Cyber Security at Asia Pacific Institute of Information Technology (APIIT)

Topics you will experience include:
Year 1 Subjects for the BSc (Hons) Cyber Security atAsia Pacific Institute of Information Technology (APIIT)
- Algorithms & Data Structures in C
- Hardware & Software Systems & Graphics
- Introduction to Forensic Tools & Techniques
- Introduction to Networking with LANs & WANs
- Introduction to Security Technologies
- Introduction to Software Development
- Mathematics & Statistics for Computing
- Systems and Database Analysis
Year 2 Subjects for the BSc (Hons) Cyber Security atAsia Pacific Institute of Information Technology (APIIT)
- Computer Systems Low Level Techniques
- Information Systems Organisations and Management
Students at APU will receive a dual award upon graduation – one from APU and the other from Staffordshire University, UK - Ethical Hacking
- Biometrics 1
- LAN Switching and WAN Networks
- Professional & Enterprise Development
- Router Security Technologies
- System Programming and Computer Control
Year 3 Subjects for the BSc (Hons) Cyber Security atAsia Pacific Institute of Information Technology (APIIT)
- Computer Systems Security
- Malicious Software and Security Programming
- Image Processing
- Group Case Study
- Biometrics 2
- Project: Artefact Realisation, Testing & Evaluation
- Project: Planning, Management, Communication & Appraisal
- Project: Research, Analysis & Artefact Design
In addition to the above, all students are also required to successfully complete four (4) General Studies modules as stipulated by the Malaysian Qualifications Agency, as well as fulfill credit requirements for Co-Curricular Activities.
Teaching and Learning for the BSc (Hons) Cyber Security atAsia Pacific Institute of Information Technology (APIIT)

Kah Jun, Software Engineering at APU
Different people learn in different ways and therefore the programme utilises a range of different teaching methods and situations – lectures, problem-based tutorials, practical laboratory sessions, group-based activities, project work, virtual learning environments, seminars, workshops (skills-based) etc. – that best deliver the specific learning outcomes of the modules.
In all classes emphasis is placed on active, experiential learning usually based around a case study, or specific crime/event based scenarios.
Students will be actively challenged during tutorials to explain or defend a particular viewpoint/finding/analysis, as the students may in the future be expected to defend their expert witness testimony within a legal environment.
The use of industry standard packages, such as Encase and Forensic Tool Kit (FTK), .XRY and Biometric hardware and software will be used with real life case studies to provide good exposure to students.
With a dedicated and self-contained laboratory, with its own private internal network and containing some of the latest equipment and software, students will be able to practice and develop their practical and troubleshooting skills as required.
Learning approaches are chosen to be compatible to the method of delivery and can include: case studies, investigations, seminars, resource based learning and independent reading.

A wide range of teaching, learning and assessment approaches are used and are seen as beneficial in exposing the student to diverse approaches.
The emphasis is on developing students as confident, independent learners. Students are encouraged to access a variety of materials, journals, text books, e-journals etc., as part of their independent learning.
This independent learning is directed, with lecturers providing general reading lists to prepare for or follow-up classes, specific assignment reading as well as a range of formative tasks and activities.
All this directed study supports and builds upon the knowledge and skills learnt in class to provide a fuller understanding of the subject.
Students need to choose the best university or college in Malaysia to study cyber security so that they can gain the necessary knowledge and skills to succeed in the competitive world of IT.
Assessment for the BSc (Hons) Cyber Security atAsia Pacific Institute of Information Technology (APIIT)

The Cyber Security award employs an innovative range of formative and summative assessments. Typically, formative assessment is used as an aide to check students’ understanding of a specific subject or topic.
The method of assessment is chosen to meet the academic content and outcomes the module is to assess. These will include individual coursework assignments, group-work assignments, presentations, demonstrations, written reports, end-of-module examinations, and oral viva.
This is to: ensure that learning outcomes are tested in the most appropriate way; reflect the sorts of materials graduates will be asked to prepare in future careers; and recognise that students have different abilities.
Although the practical and skills based are the nature of the Cyber Security award, coursework, formal examinations and class-tests are also used to assess knowledge-based modules across all three levels.