FULLSTACK CYBERSECURITY (CompTIA) pROGRAM

EMPOWERING MALAYSIAN BUMIPUTERA

Our Fullstack Cybersecurity program is carefully designed to equip you with the skills needed to excel in modern cybersecurity environments. This comprehensive program covers essential security technologies and practices, ensuring you gain expertise to protect and defend network infrastructures effectively.
 
  • CompTIA CASP: Dive deep into advanced security concepts and strategies, learning how to analyze and mitigate complex security risks.
  • CompTIA Pentest+: Master the art of ethical hacking and penetration testing, gaining practical skills to identify and address vulnerabilities in systems.
  • CompTIA Security+: Build a strong foundation in cybersecurity principles, including risk management, threat detection, and incident response.
  • CompTIA Linux+: Specialize in Linux-based security, understanding how to secure Linux systems and networks against cyber threats.

 

PEOPLElogy, in partnership with Yayasan Peneraju Pendidikan Bumiputera, offers a transformative program for aspiring IT professionals. This program equips you with advanced skills and globally recognized certifications to elevate your IT career.

Top 5 In-Demand Careers in Cybersecurity

Security Analyst

A security analyst is responsible for maintaining the security and integrity of data

Cybersecurity Consultant

Studying what weaknesses there are and figuring out how to strengthen systems to prevent hackers from exploiting vulnerabilities

Security System Engineer

System Security Engineers are responsible for preventing and mitigating security breaches that may arise within company’s computer systems.

Cybersecurity Manager

A cybersecurity manager is an IT professional who oversees security systems and teams, identifies potential network vulnerabilities and devises strategies to counter the methods cybercriminals use to infiltrate information systems.

IT And Security Infra Manager

Managerial level job position who is incharge of securing and managing infrastructure and system of computer network.

Requirements, Financing Schemes, Skillsets & Certifications

Requirements

Financing Schemes

Skillsets and Certifications

Course Outlines

*Click the image to zoom-in

Terms & conditions

By submitting this application, you hereby warrant that all information submitted by you is true, current, and complete. Yayasan Peneraju/PEOPLElogy reserves the right to verify the eligibility of all participants. In the event of any dispute regarding the terms and any other matters relating to this training, the decision of the organizing committee is final, and no further correspondence will be entertained.

PEOPLElogy (Organizing Committee) and/or Yayasan Peneraju reserves the right to cancel or amend the terms and conditions without prior notice. Any changes will be posted either within these terms and conditions or on the training information portal.

For any inquiry, please contact us at:

(+60) 18-276 9976 / (+60) 17-492 2159 (Project Team)

Working Hours: Monday-Friday, 9.00 AM – 5.00PM

What To Expect After Submitting This Application:

  1. Online briefing for candidates who meet the criteria.
  2. Online assessment.
  3. Document submission.
  4. Candidate shortlist.
  5. Offer letter and funding award.
  6. Cohort briefing.
  7. Class commencement.

Register Here


Have questions? Email us at farhana@peoplelogy-project.com

What Our Scholars Say about us?

I think training with Peneraju is quite a unique experience because it taught me to learn with a quick pace. Documents that have been supplied by trainer are also very useful in terms of understanding how CompTIA construct their questions and which part we need to focus more.

Zaki Zakaria

Secure Transmission Engineer

Marking my final achievement under 6-months of Cyber Security Fullstack Training Program from Yayasan Peneraju + Peoplelogy. Thanks a lot to the organizer, instructors and fellow coursemates for this wonderful journey.

Next to go: Security+, CSIE and CISSP.

The journey doesn’t stop here. More to learn, more to apply and more to share.

Arimi K.

Cyber Security Consultant

Let’s Get in Touch

Have any questions? We’d love to hear from you.