Technical Writing

Our Products



  • ‣ Full scope of cyber drill system which include CTF and table-top exercise.




  • ‣ Threat intelligence Platform that collect, process, label and correlate multiple threat intelligence feeds sources.
  • ‣ These intel will be share to the customer.




  • ‣ Cloud based vulnerability scanning tools.




  • ‣ Cyber drill tools to customize and spawn multiple VM according to configured requirements and cyber drill or CTF scenarios.




  • ‣ Remote compromised assessment and incident response system




  • ‣ Web based support and incident ticket management system.




  • ‣ Web based phishing campaign simulation system.




  • ‣ Dark web monitoring, alerting, crawling and searching system and data collection for data breach and stolen credential




  • ‣ Honeypot management system.


Our Services

Security Monitoring, Intrusion Detection, Incident Response and Forensics


  • ‣ Intrusion Detection System (IDS) architecture design and implementation.
  • ‣ Security monitoring consolidation of disparate security devices (firewalls, syslog, IDS, etc) via the implementation of Security Information Management Products.
  • ‣ Incident Response Planning.
  • ‣ Review existing security monitoring, IDS and incident response plans for effectiveness.
  • ‣ Provide expert forensics review and post analysis after an incident occurs. Includes isolating, evidence seizure, drive imaging, data analysis, correcting and determining the validity, extent and root cause of security breaches, and providing expert testimony.


Vulnerability Assessments and Penetration Testing


  • ‣ Identifies vulnerabilities that may exist through mis-configuration or poor security practice.
  • ‣ Provides an initial in-depth and rapid assessment of the effectiveness of deployed security controls.
  • ‣ Perform internal network and/or perimeter tests of key systems and network segments
  • ‣ Optionally, Security engineers will work to actually penetrate the target environment to the extent desired by the client.
  • ‣ "War Dialing" of Telecom infrastructure to identify rogue and/or improperly secured modems.
  • ‣ "War Driving" to identify rogue and/or improperly configured wireless access points.
  • ‣ Custom and/or third party application testing, including web-based applications.
  • ‣ Mobile application security testing.
  • ‣ Self Service Terminal / Kiosk Security Assessment.


Computer Emergency Response Team (CERT) Establishment


Computer Emergency Response Teams (CERTs, aka CSIRTs) are the key tool for Critical Information Infrastructure Protection (CIIP) or any other organization such as your company. NetbyteSEC provides:

  • ‣ How to plan, kick-off and establish your own CERT.
  • ‣ Establish good practise on how to operate a CERT.
  • ‣ Recommendations for a basic set of capabilities of CERTS with responsibilities.
  • ‣ Training related to CERT establishment.


Cyber Security Drill Exercise


Cyber security drills on top of theoretical training are useful in facilitating better response and handling of cyberattack incidents, just as how people learn hands-on in many other fields such as driving, cooking and gameplay. NetbyteSEC has conducted many international and national levels for cyber security drills. It is hard to simulate typical cyberattacks and even if an attack is simulated, the responses are focused on operation issues, such as business recovery and continuity, customer service and response and threat to business transactions, rather than what caused or allowed such an attack and how to protect against it, but equipped with NetbyteSEC’s experiences, a smooth and practical cyber security drill can be executed. NetbyteSEC has conducted multiples large-scale cyber exercises in Malaysia. With the expertise of NetbyteSEC team in organization cyber exercise within cross countries cyber simulation and corporation, NetbyteSEC can assured a highly technical and solid implementation of cyber exercise for our costumers.


Custom Software Development


Our dedicated software development teams are experienced in managing both complex and small-scale projects, producing results within tight deadlines with a focus on high quality and brand consistency. At NetbyteSEC, we’re focusing to build custom software development mainly to tackle on cyber security requirement. We have build custom software to handle our clients cyber security requirement for:

  • Cyber Security Malaysia – Quality Management System for Digital Forensic ASCLD.
  • National Security Council – Cyber Drill Exercise System Management.
  • Malaysian Communications and Multimedia Commission – Malware Sandbox Analysis System.
  • Cyber Security Malaysia – Big Data Evidences Search.



Cyber Threat:
Incident Response and Handling Training


Without a doubt, the sophistication and threats caused by malicious attacks have continued to increase at a rapid level. If you plan on responding to a security incident, you must be able to meet the challenges that these sophisticated attackers present. Instead of merely teaching a few hack attack tricks, this course includes a time-tested, step-bystep process for responding to computer incidents; a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them; and a hands-on workshop for discovering holes before the bad guys do. Additionally, the training explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. This challenging training is particularly well suited to individuals who lead or are a part of an incident handling team. Furthermore, general security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks.


Reverse Engineering and Malware Analysis


Reverse engineering and malware analysis are vitally important skills for today's expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries are required in order to properly secure an organization from today's ever evolving threats. In this training, you will gain the necessary malware and unknown binary analysis skills to discover the true nature of any malicious or unknown binary. Malware analysis skills and steps will be taught to help you on understanding malware analysis. After learning these important introductory skills, you will advance to the analysis of:

  • ‣ Hostile Code & Malware, including: Worms, Viruses, Trojans, Rootkits and Bots.
  • ‣ Malware behaviors analysis.


Network Security Pentesting and Exploitation


As cyber attacks increase, so does the demand for information security professionals who possess true network penetration testing and ethical hacking skills. Network Security Pentesting and Exploitation truly prepares you to conduct successful penetration testing and ethical hacking projects. The training starts with proper planning, scoping and recon, and then dives deep into scanning, target exploitation, password attacks and web apps with detailed hands-on exercises and practical tips for doing the job safely and effectively. You will finish up with an intensive, hands-on Capture the Flag exercise in which you'll conduct a penetration test against a sample target organization, demonstrating the knowledge you mastered in this training.


Reversing Android Applications and Malware


The ubiquity of the Android mobile platform and growing threats to mobile applications calls for increased vigilance on the part of organizations analyzing Android malicious applications. Malware author are aiming for users of Android mobile operating system with a malicious application that harvests personal information, controlling the system and sends it to a remote server. Thus, reversing Android malware is interesting challenge to address. In this training, we’ll focus on the static approach to analyze Android malware. In this hands-on course introduces audiences to the Android application framework, architecture and how to analyze and reverse engineer Android malware. The audiences will gain the necessary reverse engineering and binary analysis skills to discover the true nature of any Android malware. The audiences will learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a Android malware. A significant portion of the course is dedicated to lab exercises where students are provided the opportunity to model attacks and perform reverse engineering of real-life Android malware samples.


Honeynet: Catching Suspicious Network Activities


A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. A complete background to the evolution of honeypots followed by an introduction to the Honeynet technologies, which will cover on primary goals fpr using honeynet approach to observe data flow and network analysis. Extracting high interaction activity using Thug, which will focus on web application centric honeypot, analysis of attacks against low interaction honeypots using Dionaea, using honeypots for automated malware collection and analysis, and an introduction to client honeypots. Hopefully, with both informative and fun, aiming to show you how honeypots can be used in the real world to improve your information security.


Network Security Monitoring


Network security is not just about trying to build an impenetrable wall that no attacker can breach. After all, experienced security analysts know that there are no impenetrable walls, and a determined attacker will get into a network eventually. Effective network security requires not just preventing attacks, but catching attackers as soon as they get through and keeping them from getting to sensitive material. Network security monitoring is the collection, analysis, and escalation of indications and warnings in order to detect and respond to intrusions. This training is your guide to deploying, building, and running a network security monitoring operation, no prior experience required. In addition, its focus on open source software and vendor-neutral tools will help you to avoid costly and inflexible solutions.


Web Application (In) Security


The Web Application Penetration Testing course from NetbyteSEC is a totally hands-on learning experience. From the first day to the last day, you will learn the ins and outs of Web App Security and Pen Testing by attending lectures led by an expert instructor. Every lecture is directly followed up by a comprehensive lab exercises. Lab exercises consist of real-world apps that demonstrate a vulnerability commonly found in a web app. You learn how to assess the app much as a black hat hacker would, exploit the app so that you can demonstrate the true risk of the vulnerability to the application owner. Finally, the lab will follow up with remediation steps so that the application owner can properly close down the security hole for good.


Pentesting with Metasploit


Penetration Testing with Metasploit is a training course designed for network administrators and security professionals who need to acquaint themselves with the world mostly used of offensive information security tool, Metasploit. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. Pentesting With Metasploit fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Pentesting With Metasploit will teach you how to:

  • ‣ Find and exploit unmaintained, misconfigured, and unpatched systems.
  • ‣ Perform reconnaissance and find valuable information about your target.
  • ‣ Bypass anti-virus technologies and circumvent security controls.
  • ‣ Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery. Use the Meterpreter shell to launch further attacks from inside the network.


WIFI network (In) Security


The wireless industry continues to grow in leaps and bounds with more and more gadgets evolving to be wireless. Wireless access points, media centers, phones, and even security systems are commonplace in the average household. Unfortunately, the security that is implemented on this equipment is often lacking, opening the devices to severe security vulnerabilities. The training drills deep into packet and protocol-level Wireless Security. This is a technical hands-on class where you will use a variety of industry standard access points, 802.1x protocol assessment devices, breaking into WIFI encryption protocols such as WEP, WPA1 and WPA2.


Digital and Network Forensic


The rate of fraud, abuse and downright criminal activity on IT systems by hackers, contractors and even employees are reaching alarming rates. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics duties on their jobs. Computer crime is here to stay. Computer Forensics Specialists are needed by today's companies to determine the root cause of a hacker attack, collect evidence legally admissible in court, and protect corporate assets and reputation. You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it. After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly. This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media by adversaries.


Our Clients

Get In Touch


Main Branch

NetbyteSEC Sdn. Bhd.

4808-01-25, CBD Perdana 2,

Jalan Perdana,

63000 Cyberjaya,

Selangor Darul Ehsan.

Nilai Branch

NetbyteSEC Sdn. Bhd.

12984, Jalan BBN 1/7E Putra Indah,

71800 Nilai,

Negeri Sembilan Darul Khusus.


+60 6-850 7701