Course Description
This course will offer a great opportunity for individuals and organisations to invest in the awareness on various cyber-criminal and cyber-terrorism techniques and trends being practiced in today’s world. On the other hand, individuals who undertake this course will enhance their chances to find career opportunities by showing knowledge and capabilities to contribute to the information security awareness of the organisation and the respective team which they will eventually form part of.
This continual professional development (CPD) Award is ideal for:
- C-Level, Senior and Middle Managers
- Law Enforcement Officers
- Information Security Professionals
- Compliance Officers
- Accountants, Internal and External Auditors
- Members of Audit/IT Security Committees
Duration
43 contact hours split into 12 evening sessions (17:30 – 20:45), between 21st May and 3rd September 2018.
Accreditation and MQF level
A CPD Award accredited with 6 ECTS credits (MQF Level 5) by the National Commission for Further and Higher Education (NCFHE) in Counter Cybercrime and Terrorism will be presented to delegates who successfully attend all modules and obtain a minimum pass in a final 3 hour written examination (70% of aggregate mark) and in in-class group case study assessments (30% of aggregate mark).
Entry requirements
Minimum of 5 O-Levels and knowledge of IT and/or IT Auditing and/or Information Security.
Venue
Hilltop Gardens
Triq l-Inkwina, Naxxar, Malta. (view map)
(Free parking available)
Course Outline & Dates
Module 1: Introduction to Cybercrime and Cyber-Terrorism
Dates: 21st and 28th May 2018
Time: 17:30 to 20:45
Trainer: Keith Cutajar
ECTS credits: 1
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Have a basic understanding of what is the cyber-world and criminals are exploiting it;
- Have a basic understanding on the evolution of crime;
- Grasp an understanding of the difference between the terrorist and the criminal;
- Have some basic knowledge detailing various cyber-incidents which occurred in the Maltese scenario.
- Understand the structure and evolution of the Internet and its basic operations in the context of the emerging crime threats and trends in cyberspace
Module 2: Background and the Motivation of the cyber-criminal/terrorist
Dates: 4th and 11th June 2018
Time: 17:30 to 20:45
Trainer: Keith Cutajar
ECTS credits: 1
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Better understand the criminal/terrorist’s reasoning and motivation behind its acts;
- Have a basic understanding of the background and motivation from which the criminal/terrorist is coming from;
- Grasp a more detailed understanding of how financing of criminal and terrorist organisations is materialising today;
- Grasp a better understanding of how crypto-currencies work;
- Have a sound knowledge of how to handle media reporters during information security breaches.
Module 3: Technologies available today
Dates: 18th and 25th June 2018
Time: 17:30 to 20:45
Trainer: Keith Cutajar
ECTS credits: 1
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Understand various malware types around
- Understand how social engineering works
- Understand the basics of penetrative attacks
- Understand the scope of DDoS along with their ransom purpose
- Understand Open-Source Intelligence as their primary tool to know the target better
- Understand better steganography-based communication
Module 4: The benefits of Digital Forensics
Dates: 2nd and 9th July 2018
Time: 17:30 to 20:45
Trainer: Keith Cutajar
ECTS credits: 1
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Advise management about the possible results obtained from Windows-based incident analysis;
- Advise management about the possible results obtained from Linux/Unix-based incident analysis;
- Advise management about the possible results obtained from Network-based analysis and data capturing practices;
- Advise management about the possible results from Mobile-based data analysis involving smartphones and tablet devices;
- Advise management about the possible results from Malware reverse-engineering practices.
Module 5: Pro-activeness as a means of Information Security
Dates: 30th July and 6th August 2018
Time: 17:30 to 20:45
Trainer: Keith Cutajar
ECTS credits: 1
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Advise the management on the importance of information security policy documents;
- Be able to identify the difference between a vulnerability scan and a penetration test;
- Advise on the need and scoping for information security awareness training to the company employees;
- Contribute towards to better know how criminals are observing our activity from a public’s perspective.
Module 6: Preparing for the incident – IR, BC and DR plans in the Cyber-Context
Dates: 27th August and 3rd September 2018
Time: 17:30 to 20:45
Trainer: Keith Cutajar
ECTS credits: 1
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Advise management on the importance of documents such as:
- Incident Response plan;
- Business Continuity plan;
- Disaster Recovery plan;
- Assist in the development of a tailor-made plan which is specifically suited and designed for the organisation at hand;
- Contribute towards the awareness of such documents to all of the organisation’s levels;
- Assist in the Organisation of a proper Incident response team;
- Assist in the planning and execution of Incident response tests.
Trainers
Keith Cutajar

Keith is a Cyber-Security specialist, focusing in the fields of Cybercrime, Digital Forensics and Cyber-Terrorism. He has been working on various IT projects, both from an employed perspective as well as on his own private ventures as a consultant. He is currently involved in one of Malta’s first Data Security Companies specialising in Data Security, Cybercrime and Digital Forensics services whereby he is the direct point-of-contact with clients and victims of cyber incidents. Keith has finalised his reading of an MSc in Information Security at the Royal Holloway University (University of London), with the dissertation title as “A pro-active approach towards Cyber-Terrorism:Defining a policy document to assist decision-makers”.
Course Funding Options
-
GET QUALIFIED SCHEME
Candidates can benefit from a 70% rebate of the course fee via tax credit. Get Qualified is an initiative that supports the personal development of individuals for the achievement of qualifications and certifications required by industry.
Learn more about this scheme »
-
TRAINING PAYS SCHEME (TPS)
Eligible candidates satisyfing a list of criteria can benefit from a 75% rebate on direct training cost.
Learn more about this scheme »