Service: Cybersecurity Training

Train Your Team.
Reduce Human Risk.

Give your team the skills to recognise threats, avoid mistakes, and prevent breaches before they happen.

Technology alone isn’t enough

Security tools can block most threats — but one careless click, one reused password, or one delayed report can still open the door to an attack.

Security training helps employees spot risks early, act safely, and respond faster when something feels wrong.

Most breaches don’t start with broken systems — they start with everyday mistakes.

Human error still causes breaches

Human error still causes breaches

Attackers often succeed by targeting people, not just systems. One wrong action can bypass even strong controls.
Threats now look more convincing

Threats now look more convincing

Phishing emails, fake login pages, scam calls, and impersonation messages are harder to spot than ever.
Hybrid work increases risk

Hybrid work increases risk

Remote work, public Wi-Fi, personal devices, and cloud tools create more chances for mistakes and data exposure.
Fast reporting reduces damage

Fast reporting reduces damage

When employees know what to do and report early, your team can contain issues faster and reduce the impact.

Practical training your team can apply immediately in 1 day

We focus on real-world scenarios your employees face every day — from phishing emails to unsafe tools and risky behaviour. Each module is designed to be simple, practical, and easy to apply.

The Hacker's Psychology

Understanding cognitive biases, the attack lifecycle, and dissecting real phishing attempts. Includes local case studies — Macau Scams, Boss Scams via WhatsApp.
  1. Social Engineering
  2. Phishing
  3. OSINT
The Hacker's Psychology

Locking the Digital Front Door

Passphrases over passwords, credential stuffing risks, MFA hierarchy, and live setup of password managers and authenticator apps.
  1. Passwords
  2. MFA
  3. Access Control
Locking the Digital Front Door

The Mobile Minefield

Sideloading dangers, APK scams targeting Malaysians, app permission audits, smishing, vishing, and juice jacking.
  1. Mobile Security
  2. Smishing
  3. App Permissions
The Mobile Minefield

You Are What You Share

OSINT techniques attackers use, the oversharing audit — badge photos, travel plans, workplace photos leaking sensitive info.
  1. OpSec
  2. Digital Footprint
  3. Social Media
You Are What You Share

Safe Work, Anywhere

PDPA 2010 refresher, data classification, file encryption practices, and the "coffee shop" threat model — visual hacking, public Wi-Fi, VPN usage.
  1. PDPA
  2. Data Classification
  3. Remote Work
Safe Work, Anywhere

The No-Blame Game

The "Golden Hour" principle, incident categories, internal and external reporting channels including MyCERT (NSRC 997).
  1. Incident Response
  2. Reporting
  3. No Blame Culture
The No-Blame Game

The Connected Life — IoT & Automotive Security

Smart home security (cameras, voice assistants, network segmentation), automotive risks (infotainment data sync, relay attacks on keyless entry), wearable privacy, and real-world video case studies.
  1. IoT
  2. Smart Home
  3. Automotive
  4. Wearables
The Connected Life — IoT & Automotive Security

Not your typical awareness training

We focus on real behavioural change, not just checkbox compliance.

Malaysia specific

Malaysia specific

Real local case studies — Macau Scams, LHDN impersonation, WhatsApp profile cloning, and SMS scams targeting Malaysians.
Behavioral change

Behavioral change

Not just awareness — we build practical daily security habits that stick long after the training ends.
Hands-on demos

Hands-on demos

Live phishing dissection, MFA setup on personal accounts, password manager walkthroughs, and permission audits.

Train your team without the full cost burden

e-Lock is a registered HRD Corp training provider. Eligible Malaysian employers can claim training costs through their levy, making it easier to build security awareness without stretching internal budgets.

What you need to know
Training programme no

Training programme no

10001663483

The Human Firewall: Smart Habits for a Secure Malaysian Workplace
Scheme code

Scheme code

HRD Corp Claimable Courses: Skim Bantuan Latihan Khas

Grant application via eTRiS at least 1 day before training
Training format

Training format

In-house (on-site) or public workshop

Customisable to your organisation's needs and industry
Duration

Duration

1 full day (8 hours)

Can be adapted to half-day or multi-session formats
Who can claim

Who can claim

HRD Corp registered employers with levy balance

Mandatory for companies with 10+ Malaysian employees
How to claim

01

Get a quotation

We provide the course outline and required documents.

02

Apply in eTRIS

Submit your grant application (min 1 day before training).

03

Attend the training

Your team joins the approved session.

04

Claim processed

HRD Corp reimburses based on approval.

Frequently asked questions

Is this just basic awareness training?

+

Who should attend this training?

+

Is this HRD Corp claimable?

+

How is this training delivered?

+

What will our team gain from this?

+

Looking to strengthen your cybersecurity?

Schedule a training session for your organisation today.
Let's Chat