Menu

Diploma in Cyber Security Technology

Diploma in Cyber Security Technology

Diploma in Cyber Security Technology

Diploma in Cyber Security Technology

Cyber Security Technology programme

To develop the competencies required in the security of overall network architecture which includes design and write computer programs, use and maintain databases, configure and integrate various network security tools and install and secure computer networks. It emphasizes on the security of overall network architecture, configuration and integration of various network security tools, which includes open source the proprietary software.

Outcome

Students from the Cyber Security Technology programme will develop essential knowledge & skills and tools to use cyber security measures to protect data and manage personnel conduct in relation to safeguarding data based on the defined network security industry standards and regulations which are still evolving. The programme also nurtures ethics in network security, developing young minds to become successful entrepreneurs, while promoting thinking and problem-solving skills, and also to use critical thinking skills to research current and evolving cyber security trends.

Program Code:
(R2/0613/4/0043) (07/26) (MQA/FA 15748)

Status: Accredited

Fee: RM 33,324

Study Mode: Full Time

Duration: 6 Semester/ 3 Years

  1. Character and ethics as well as high professionalism with strong technical competencies to contribute to global industry demands
  2. Engage in lifelong learning and demonstrate good leadership quality through academic qualifications achievement and career advancement
  3. Responsible to the community, cultures and environment through involvement with related organizations and society.
  4. Communicate effectively and demonstrate entrepreneurial skills.
PLO 1 Knowledge:

Possess relevant knowledge of technology fundamentals on well- defined procedures and practices in the Cyber Security field of study

PLO 2 Problem analysis:

Propose and employ current tools and techniques to resolve well-defined Cyber Security related problems.

PLO 3 Critical thinking:

Establish investigative and significant thinking abilities to resolve well-defined problems in the Cyber Security field of study.

PLO 4 Communication:

Communicate and explain clearly several viewpoints for social, academic and professional purposes.

PLO 5 Technology Practices:

Illustrate the understanding of the issues related to the society and the subsequent responsibilities appropriate to the extended well-defined technology practices.

PLO 6 Career establishment: 

Acknowledge the requirement of career establishment and to employ independent continuing learning in specialized technical knowledge.

PLO 7 Management and technopreneurship:

Illustrate consciousness of management and technopreneurship routine in real perspective.

PLO 8 Ethics:

Illustrate ethical awareness and professionalism.

PLO 9 Technical teams:

Illustrate leadership character and work efficiently in diverse technical teams.

  1. Cybersecurity Analyst
  2. Security Engineer /Architect
  3. Penetration Testing
  4. Security Consultant
  5. Ethical Hacker
  1. Penetration Testing /Vulnerability Assessment
  2. Network Management System
  3. Network Forensics
  4. Open Source Network Tools – Configuration & Integration
  5. Networking
  6. Operating Systems Administration
  7. Programming
  8. Attacking and defending activities
  9. Mobile Application
  10. Internet of Things
  11. Cryptography & Network Security
Course
Semester 1
  • IT Essential
  • Cyber Security Technology & Ethics
  • Basic of Programming
  • German Language 1
  • Discrete Mathematics
  • Effective Communication Skills
  • Network Fundamental
Semester 2
  • Database Management System
  • English for Professional Purposes 1
  • German Language 2
  • Routing & Switching Essentials
  • Calculus & Algebra
  • Penghayatan Etika dan Peradaban
  • Bahasa Kebangsaan A*
  • Secured Object Oriented Programming
Semester 3
  • Network Programming
  • Operating Systems Administration
  • English for Professional Purposes 2
  • Kursus Integriti dan Antirasuah/ Integrity and Anti Corruption Course
  • Community Service
  • Scaling Network
  • Web Programming
Semester 4
  • IT Project Management
  • Wireless Network & Security
  • Penetration Testing
  • Intrusion Detection & Prevention Systems
  • CBS Project Proposal
  • Digital Entrepreneurship
  • Securing Network
Semester 5
  • Digital Forensics & Incident Response
  • Cryptography
  • Internet of Things
  • CBS Final Project
  • Network Management & Monitoring Systems
  • Mobile Application Development
Semester 6
  • Industrial Training

Gallery

March 2025:

2024 and the preceding years:

GMI FYP Presentation
GMI Network Security
FYP Network Security
network security student configure router
GMI Network Security presenting FYP

Terms & Conditions

  1. Eligibility
    – This contest is open to secondary school students born between January 1, 2007, and December 31, 2009.
    – Participants must follow at least one of the official social media accounts of the German-Malaysian Institute (GMI) to be eligible (Facebook, Instagram or Tiktok).
  2. Contest Participation
    – To enter the contest, participants must complete the quiz and submit their answers as instructed.
    – Participants are encouraged to create a unique and creative tagline related to GMI to increase their chances of winning.
  3. Agreement to Terms
    – By entering the contest, participants agree to abide by these terms and conditions.
    – Participants must ensure that their submissions comply with all guidelines provided.
  4. Prizes
    – Details of the prizes will be announced at the start of the contest.
    – Winners will be selected based on the accuracy of their quiz answers and creativity of their tagline.
  5. Selection of Winners
    – Winners will be notified through the social media platform where they entered the contest.
    – The decision of the contest organizers is final and no correspondence will be entered into.
  6. Privacy
    – Personal information collected during the contest will be used for the purpose of this contest and promotional activities and will be kept confidential.
  7. Liability
    The organizers reserve the right to disqualify any participant who violates these terms and conditions or engages in any fraudulent activity.
  8. Modification of Terms
    The organizers reserve the right to modify these terms and conditions at any time. Participants will be notified of any changes through the official GMI social media accounts.
  9. Acceptance
    By participating in the contest, you acknowledge that you have read, understood, and agreed to these terms and conditions.

Consent Declaration:

By signing this consent form, I, as the participant (or the parent/guardian of the participant, where applicable), hereby consent to the collection, use, and processing of the personal information provided solely for the purpose of administering the GMI online quiz competition.

I understand that this data will be handled in accordance with applicable data protection regulations and will only be used for the competition and related communications from GMI.

I acknowledge that:

  1. The information collected during this quiz contest may be used for promotional purposes, including WhatsApp notifications and other marketing activities. By participating, you consent to the use of your data for these purposes.
  2. The information will be securely stored and accessed only by authorized personnel involved in the competition.
  3. GMI is committed to safeguarding personal data in compliance with applicable data protection laws.
  4. I have the right to request access to, correction of, or deletion of the personal data provided by contacting GMI directly.

Data Protection Assurance:

GMI is committed to protecting your personal information. All data collected will be securely stored and managed in accordance with our data protection policy. It will not be shared with third parties without explicit consent unless required by law.

Skip to content