Site Overlay

Digital Courses

Artificial Intelligence Engineer Workshop
Artificial Intelligence Generalist Workshop
Digital Transformation and Innovation Practitioner
Corporate Cybersecurity Awareness Session
Certified Information Security Awareness Manager
Customized Digital Forensic Training
Artificial Intelligence Engineer Workshop

Learning in depth in AI
« of 8 »

Artificial Intelligence (AI) Engineer Workshop

Artificial Intelligence (AI) Engineer Programme provides detailed knowledge to understand the theory of AI, machine learning, deep learning, and image discrimination AI while able to implement appropriate methods that can be used to boost the marketability of company.

 

Artificial Intelligence (AI) is no longer the future, it is now here and applied by companies as it enables system to perform tasks that usually requires human intelligence, such as visual perception, speech recognition, decision-making and language translation. The syllabus in this programme includes machine learning, deep learning and neural network which are part of AI which, based on algorithms and powerful data analysis, enable computers to learn and adapt independently.

 

Artificial Intelligence (AI) Engineer Workshop equip scholars with adequate knowledge in Artificial Intelligence today, integration of AI towards current technologies to form a complete solution, branches of AI such as machine learning and deep learning, hands on experience in developing AI and Expert guidance throughout the workshop.

 

Training Objective(s)

  1. To have detailed knowledge of deep learning and able to implement in business.
  2. To determine an appropriate utilization policy.
  3. To ensure scholars have the ability and knowledge to utilize AI in business.
  4. To certify scholars with ARTIS AI Certified Engineer that can select and implement appropriate methods with either human-level intelligence or machine-level intelligence.

 

Pre-requisite(s)

  1. Diploma / Degree in equivalent Science / Engineering related field OR
  2. Industry workers in related field
  3. Basic knowledge in Python language is a bonus

 

Learning Outcome(s)

  1. Scholars are expected to be able to understand in depth in Applied Mathematics related to AI development.
  2. Scholars are expected to master every detail in Machine Learning.
  3. Scholars are expected to understand in detail about Neural Network.
  4. Scholars are expected to have deep knowledge about image identification and image generation model.
  5. Scholars are expected to comprehend the laws and regulations related to AI.

 

Module Title

Module 1

Applied Mathematics

 

Module 2

Machine Learning

 

Module 3

Neural Network

 

Module 4

Convolutional Neural Network

 

Module 5

Image Identification Model

 

Module 6

Image Generation Model

 

Module 7

Natural Language Processing

 

Module 8

Precautions In AI Making

 

Type of Training

Instructor-led Training (ILT), physical training

 

Course/Certification Level

Intermediate

 

Certification Name

Certified AI Engineer

 

Career Track/Job Roles

AI Engineer, AI Prototype Tester, AI Developer

 

Examination

  1. Online MCQ test
    • 199 MCQs
  2. Project based test
    • Develop a fully functioning AI Model that pass minimum scoring in Tanjak Test (AI Tested by AI Experts from ARTIS)

 

REGISTER NOW!

 

Contact Us!

Almuntazar
Sales & Marketing Executive
Call - 0173666211 / 03 5524 3704
W/s - http://www.wasap.my/60173666211/AI
Materials Technology Education Sdn Bhd

Artificial Intelligence Generalist Workshop

COURSE OVERVIEW

You will be exposed to various issues and concerns surrounding AI such as ethics and bias and get advice from experts about learning and starting AI projects. You will also demonstrate AI in action with a mini project. This course is designed for those with little or no background in AI, and does not require any programming skill. It is designed to give you a firm understanding of what is AI, its application and use cases across various industries.

 

Course Contents

  1. What is AI
  2. Trends in AI
  3. Problems in the field of AI
  4. Specific method of machine learning
  5. Overview of deep learning
  6. Deep learning techniques
  7. Research field of deep learning
  8. Application of deep learning

 

Course Duration

2 Days

 

Level

Basic

 

Register Now!

Almuntazar
Sales & Marketing Executive
Call - 0173666211 / 03 5524 3704
W/s - http://www.wasap.my/60173666211/AI
Materials Technology Education Sdn Bhd

Digital Transformation and Innovation Practitioner

DTIP-Cover
« of 5 »

DIGITAL TRANSFORMATION AND INNOVATION PRACTITIONER 

CODE: DTIP

Technology is now evolving at such a rapid pace that annual predictions of trends can seem out-of-date before they are published publicly. As technology evolves, it enables even faster change and progress, causing an acceleration of the rate of change, until eventually, it will become exponential. 

 

Technology-based careers do not change at the same speed, but they do evolve, and the IT graduates need to recognise that their roles may not stay the same. And an IT staff of the 21st century will constantly be learning, upskilling and adapting to current and emerging technologies. What does this mean for you? It means staying current with technology trends. And it means keeping your eyes on the future, to know which skills you will need to know and what types of jobs you want to be qualified to do. This course focuses on knowledge and skill requirements of the IT graduate preparing for the workplace and staying relevant in the modern era.

 

Course Objective

  • Learn about Digital Technologies used in Digital Transformation.
  • Understand the values of Digital transformation for businesses and industries.
  • Understand solutions enabled by advances in digital technologies
  • Understand Cyber Security risks and measures that enables businesses and industries to remain resilient
  • Understanding the obstacles and critical success factors to Digital Transformation.

 

Course Contents                                              

  • Introduction to Digital Transformation and Innovation
    • Foundations of Digital Transformation
    • Digital Transformation Lifecycle
    • Technology changes in Business and Industries
    • Digital Trends: Past and Future
    • Obstacles and Critical Success Factors
  • Smart Devices and Digital Services
    • Wearables and Sensors
    • Virtual Reality and Augmented Reality
    • Digital Services
    • Digital Marketing
  • Artificial Intelligence (AI) and Machine Learning (ML)
    • Defining AL
    • Benefits of AL
    • Applying AI
    • Case Studies
  • Data Science
    • Introduction to Business Statistics
    • Business Data Analytics
    • Types of Analytics
    • Data and Data Types
    • Probability
    • Concept of Predictive Analytics
    • Data Mining
  • Internet of Things
    • Defining IoT
    • IoT and Cyber – Physical Systems
    • IoT Security
    • Emerging IoT Technologies
    • IoT Security Challenges
  • Cloud Computing
    • What is Cloud Computing
    • Cloud Computing Services
    • Benefits of Cloud Computing
    • Obstacles of Cloud Providers
    • Opportunities in Cloud
    • Security Aspects of Cloud Computing
  • Autonomous Things
    • Introduction to autonomous technologies
    • Sensing and Acting on real time data
    • Real time communications
    • Case Study: Autonomy in Mining and Industrial environment
    • Case Study: Introduction to Fleet Management and Heavy Haulage
    • Case Study: Autonomy in Light Vehicles
  • Blockchain
    • Defining Blockchain
    • Concept of Blockchain
    • Application of Blockchain
    • Blockchain technology platforms
    • Business implementations of Blockchain Platform
    • Smart Contracts
    • Digital Currency
  • Cyber Security
    • Concept of cyber security
    • Current threat landscape
    • Human factor in cyber security
    • Privacy and Security
    • Information Risk Management
    • Standards, Best Practices and Guidelines
    • CIS 20 Controls
    • Security Awareness Tips
    • Incident Handling

***Note that this course outline is subject to change

 

Course Duration

5 Days

 

Who Should Attend

This programme is meant for anyone who is looking to up skill their level of knowledge and skills in current and emerging technologies focusing on Digital Transformation.

 

Pre-Requisites

The participants of this course are required to have basic IT or Business IT knowledge. Technical knowledge is not required.

 

Certificate

Certificate of Completion

 

Language

English / Bahasa Malaysia

 

REGISTER NOW!

Corporate Cybersecurity Awareness Session

CCAS-3
« of 3 »

Corporate Cybersecurity Awareness Session

Do you know that cyber threats are no longer just IT-related problems? Because every employee in an organization does part of the job online through emails, WhatsApp, social media, banking, etc., employees who are unaware of the risks can easily call for a cyber-attack that can cost a lot of money to an organization.

 

By offering clear strategies to secure organizational data properties, the Corporate Cybersecurity Awareness Session would warn and educate employees. This awareness session will address all the risks to which companies are exposed and employees are trained to become an effective shield by defending your business from the cyber threats and attacks of today.

 

Training Objective(s)

We are addressing the weakest link in cyber security chain, i.e., THE HUMANS. Regardless of how much an organization spends to protect its network and endpoints, it remains largely vulnerable if the awareness and behavior of the workforce is addressed.

 

The objective is to address the needs and requirements of the concerning organizations and the training needs of the organization. In today’s business environment, security remains a critical component of the business operation. Therefore, it is crucial that all staff are made aware of the security best practices, processes, and policies to safeguard their information resources and remain resilient.

 

The cyber security awareness program will contribute to:

  1. Building a strong cyber security culture in the organisation
  2. Employees understand security issues and respond well
  3. Minimizing loss of productivity
  4. Reducing threats and vulnerabilities at user level
  5. Understanding the current human risk posture and seek for improvements
  6. Meet compliance and regulatory requirements
  7. Protect brand, image, and reputation
  8. Reduce liability due to data breach and cyber-attack

 

Module Title

Corporate Cyber Security Awareness Session

 

Type of Training

Instructor-led Training (ILT), physical training, online training, In-House Training

 

Course Price

Contact for discount!

 

Course/Certification Level

NA

 

Certification Name

NA

 

Career Track/Job Roles

NA

 

REGISTER NOW!

 

Contact Us!

Almuntazar
Sales & Marketing Executive
Call - 0173666211 / 03 5524 3704
W/s - http://www.wasap.my/60173666211/AI
Materials Technology Education Sdn Bhd

Certified Information Security Awareness Manager

Certified Information Security Awareness Manager (CISAM)

Organizations implements security policies and invests into technology, but most neglect educating their workforce. Due to this, the employees become the desired target for cyber attackers. The most effective way to address the human element is to establish an comprehensive security awareness programme that goes beyond compliance, changes human behaviour and to create a security culture. Certified Information Security Awareness Manager (CISAM) is a 2 days hands-on training and certification programme that provides the essential know-how, enabling information security professionals to develop and manage an effective security awareness programme for their organization.The CISAM examination is certified by the Global ACE Certification based on examination framework aligned with relevant Knowledge, Skills and Attitudes (KSA), necessary for an Information Security Awareness Manager.

 

Training Objective(s)

  1. Identify the “As-Is” state of your organisation’s awareness and competence levels.
  2. Understand the difference between awareness, training and education.
  3. Build and maintain a comprehensive awareness and competence programme, as part of an organisation’s information security programme.
  4. Identify awareness, training and competence needs, develop a training plan, and get organisational buy-in for the funding of awareness and competence programme efforts
  5. Select awareness, training and competence topics; Find sources of awareness and training materials.
  6. Implement awareness and training material, using various methods.
  7. Evaluate the effectiveness of the programme; Understanding and overcoming the obstacles to success; Update and improve the focus of technology and organisational priorities change
  8. Create an effective social engineering assessment programme.

 

Pre-requisite(s)

The candidate should have fundamental understanding of ICT and Information Security

 

Learning Outcome(s)

  1. Understand the human risk to organisations
  2. Understand the difference between awareness, training and education
  3. Understand the current level of awareness among your peers in your organisation
  4. Build and maintain a comprehensive awareness and competence programme, as part of an organisation’s information security programme.
  5. Learn how to build a business case and justify funding for an awareness programme.
  6. Selecting the right topics and knowing the sources of information .
  7. Comparing the various communication channels.
  8. Understanding the obstacles and critical success factors.

 

Skills Outcome

  1. Is able to develop a business case for implementing an awareness programme for organisation
  2. Is able to measure the current levels and conduct needs assessment
  3. Is able to apply the qualities of a good awareness management system, Is able to apply the strategies for awareness and behaviour management, Is able to apply the strategies for communication and commitment plan,Is able to define the indicators for measurement,Is able to execute awareness programme, Is able to measure and adjust the programme

 

Module Title

 

Module 1

Introduction - The difference between “awareness” and “behavior”

Module 2

The elements of risks and analysis on why humans are the weakest link

Module 3

Designing an Awareness and Competence Programme

Module 4

Conducting awareness and training needs assessment

Module 5

Developing Awareness and Competence Material

Module 6

Implementing the Awareness and Competence Programme

Module 7

Various techniques for delivering awareness material

Module 8

Post-Implementation

Module 9

Overcome Obstacles to Success

Module 10

Conducting Phishing Assessment

 

Type of Training:

Instructor-led Training (ILT)

 

Course/Certification Level:

Intermediate

 

Career Track/Job Roles:

Cyber Risk Analyst, Security Manager

 

Level:

Technical, End User

 

Register Now

Customized Digital Forensic Training

CUSTOMIZED DIGITAL FORENSIC TRAINING

Un-patched, unprotected computers connected to the Internet are compromised in less than 3 days. The Digital Forensics and Investigation course will teach the students about techniques and tools for successful forensic investigation in hands-on and practical. Students will learn knowledge and technical to perform effective and successful digital forensics. In addition, our trainer will provide necessary forensics tools and testing images for students to conduct the real digital forensics investigations. Upon completion of the 5-day training, students will receive a certification for participation. They will be provided with a test image to take home and investigate/ recover the image with the skills and tools they have learned from the training. If the students successfully recover the image and provide the result / report to us, they will be issued a certificate for successfully complete the training.

 

Course Contents

Theory hours / P: Practical hours

 

  1. Introduction (2T / 0P hours)

 

  • Introduction to Digital Forensics
  • Digital forensic work phase
  • Types of digital forensic
  • News and forensic cases analysis examples sharing

 

  1. Digital evidence and related legal issues (2T / 0P hours)

 

  • Types and characteristics of digital evidence
  • Digital forensic legal issues
  • Digital evidence impartiality

 

  1. On-site standard search procedure (1T / 1P hour)

 

  • On-site evidence collection preparation
  • On-site evidence collection process
  • Digital evidence storage procedure
  • Digital evidence transportation requirements
  1. Digital forensic laboratory and analysis program (2T / 0P hours)
  • Partition of digital forensic la and tasks
  • Forensic laboratory organisation, role and responsibility
  • Forensic analysis procedure description

 

  1. Windows file system and file restoration (3T / 2P hours)
  • Disk structure and configuration
  • Disk sector recovery
  • Folder and file recovery
  • Introduction to the file system
  • Add and delete files for Windows FAT system
  • Folder recovery
  • File recovery

 

  1. File characteristics and data concealment (2T / 1P hours)
  • File characteristics analysis
  • Data hiding
  • Data camouflage

 

  1. Open Source digital forensics tools and operations (3T / 2P hours)
  • Usage of open source
  • SIFT-Integrated digital forensic platform
  • Autosy-key word searching and analysis

 

  1. Keyword search and hash value comparison (1T / 2P hours)
  • Raw search syntax
  • How to execute index search
  • Hash comparison

 

  1. Windows Advanced analysis (2T / 2P hours)
  • NTFS advanced analysis
  • Windows special file analysis

 

10.Case study -Practice of Simulation (1T /3Phours)

  • Windows platform simulation case analysis

 

11.Anti-forensic Technology and practice (1T /1P hours)

  • Anti-forensic overview
  • Introduction to Anti-Forensics
  • Anti-forensic practice

 

12.Case study -Practice of Simulation (2T /4P hours)

  • Linux platform simulation case

 

Course Duration

5 Days

 

Level Basic

 

Register Now

    TRAINING COURSE INFORMATION

    Please fill the details as below. We will send the brochure to your inbox.


    Your Name (required)

    Your Email (required)

    Phone

    Your Message

      TRAINING COURSE INFORMATION

      Select courses category:

      Your courses:

      Your courses:

      Your courses:


      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:

      Your courses:


      Courses Venue

      Courses Date

      Registration Type:
      IndividualCompany


      PERSONAL INFORMATION

      Full name:

      IC/Passport No:

      Mobile No:

      Gender:
      MaleFemale

      Mailing Address:

      Your email address:

      Position

      Year(s) of Service

      Highest Education


      COMPANY INFORMATION

      Company name:

      Company address:

      Person in Charge:

      PIC Email:

      PIC Designation:

      Office No:

      Mobile No:

      Fax No:



      (Note: to be filled only registration under company)

      Full Name

      IC/Passport No

      Mobile No

      Position

      Year(s) of Service

      Highest Education