Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.
 
Certified Cyber Defender Associate
Our cyber security training program, Certified Cyber Defender Associate (CCDA) helps security teams build the skills necessary to defend their network against new age cyber-attacks.
 
Testing as a Service (TaaS)
CI’s security testing as a service (TaaS), solution, powered by IXIA’s BreakingPoint provides a fast, accurate, and reliable means of validating that Security infrastructures and devices will work reliably when they’re needed most.

Cyber Range Malaysia is a collaboration between International Islamic University Malaysia the world’s premier Islamic University, CyberSecurity Malaysia, Malaysia’s national cyber security agency and Cyber Intelligence Sdn Bhd, Malaysia's premier cyber security company.

Contact Information

Categories:
Training & Education

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting are Indias expert Cyber Law / Cyber Crime Advocates & IPR Attorneys. We are best cyber lawyers & financial crime lawyers

Aruba Networks

Aruba Networks

Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Red Lambda

Red Lambda

Red Lambda provides cybersecurity software that enables organizations to rapidly identify, visualize, investigate, and understand threat behaviors of both known and unknown, zero-day attacks.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Mosaic Technologies Group

Mosaic Technologies Group

MOSAIC’s Cyber solutions provide the analytics, planning, technologies, and operations support to protect our clients’ systems, our warfighters, and the nation’s joint cyber mission.