EC-Council, a global leader in cybersecurity certifications and training and the inventor of the world acclaimed Certified Ethical Hacking (C|EH) credential, in association with the National Cyber Security Agency (NACSA), grants USD 1 million worth of scholarships towards a shared vision of safeguarding Malaysia’s digital landscape.
According to recent reports, Malaysia witnessed a 47% increase in cyber crime in the past year alone. This significant rise in cyber incidents highlights the pressing need for a strong and skilled cybersecurity workforce.
To address the challenges, the Prime Minister announced the drafting of a Cyber Security Bill, empowering NACSA with clear legal authority to regulate and enforce cybersecurity laws. This aims to effectively combat cyber threats and ensure the safety and security of Malaysia’s digital landscape.
In line with these strategic cybersecurity initiatives, the collaboration between EC-Council and NACSA to offer scholarships to deserving individuals represents a significant milestone for Malaysia’s cybersecurity landscape.
Through this transformative scholarship program, aspiring cybersecurity professionals in Malaysia will have the opportunity to acquire the knowledge and skills necessary to effectively combat cyber threats.
Successful awardees will receive a full scholarship to cover the cost of EC-Council’s job-based and skill-based cybersecurity learning paths co-developed with leading industry experts.
Get Any One Learning Path with Your Fully Funded Scholarship
- Vulnerability Assessment and Penetration Testing
Pentesting Agent
Penetration testing is becoming one of the most important roles in information security with the increased need for and importance of companies and organizations to secure their digital infrastructure. There is a massive demand for skilled penetration testers, and this vital security activitiy has emerged as a lucrative career option for current and future IT professionals who have an enthusiasm for cybersecurity and have intentions to shape their career in this field.
- 19 Premium Courses
- 95 Hours
- Security Architecture and Operations
Becoming an Information Security Specialist
This learning path with guide you through the entire process of administering an effective ISRM process, covering risk identification, evaluation, mitigation, and monitoring. You’ll also learn how to deal with risks emerging from third-party vendors as well as M&A scenarios, while you’ll also learn to implement the NIST Framework for risk management.
- 18 Premium Courses
- 80 Hours
- Cybersecurity
Mastering Digital Forensics
Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. It is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid any possible future incidents.
- 3 Premium Courses
- 10 Hours
- Governance, Risk, and Compliance
Information Security Specialist: Novice to Pro
- 7 Premium Courses
- 23 Hours
- Web Development
Programming Fundamentals and Security
If you are planning to build a successful career in software development, learning the fundamentals of programming is the first step in your long journey. It’s also crucial to ensure that while you master the programming fundamentals, you also learn how to write a secure code.
- 3 Premium Courses
- 23 Hours
- Security Architecture and Operations
Mastering Threat Intelligence
The news is full of tragic stories of organizations that failed to properly collect and act on cyber threat intelligence. Your organization wants to ensure the integrity and availability of its services and protect brand reputation in the face of ever-more-present cyber threat actors.
- 3 Premium Courses
- 14 Hours
- Security Architecture and Operations
Mastering Network Security
Many IT professionals do not understand how to perform a network security assessment and implement various countermeasures to prevent cyber-attacks and threats. This learning path will teach you how to implement various technologies to reduce the risk of a cyber-attack from a threat actor. Overall, you will learn how to master network security and gain the skills needed for the industry.
- 5 Premium Courses
- 20 Hours
- Web Development
Programming for Ethical Hackers
Programming skills are vital for ethical hackers, as they are required to connect to and analyze systems and programs, discover vulnerabilities, automate time-consuming tasks and write exploits. If you are an ethical hacker, this learning path will take care of all your programming needs. You’ll learn how to code in C, C++ and Java. You’ll master JavaScript, Python and its applications in offensive security. You’ll learn Ruby on Rails, while you’ll gain acquire shell scripting and PowerShell scripting skills. You’ll also gain a detailed understanding of the Secure Software Lifecycle. By the end of this learning path, you’ll attain programming skills that will help you gain further ground in your ethical hacking career.
- 16 Premium Courses
- 80.5 Hours
How to Apply for This Scholarship in 3 Simple Steps
02
Get Accepted
03
RedeemYour Voucher
Redeem your unique voucher code (which you will receive via email) on EC-Council’s online learning platform and get access to your selected learning path.
Apply for the Scholarship Now
"*" indicates required fields
Showcase Your Skills with a Certificate of Achievement
After completing each course in the bundle, you’ll be awarded a certificate of achievement from EC-Council. Share it with potential employers and your community to showcase your skills and gain a competitive edge.
Terms and Conditions of This Scholarship
- Scholarships are limited in number and subject to availability.
- Vouchers issued under this scholarship cannot be redeemed for their monetary value.
- Only citizens of Malaysia are eligible for this scholarship. You must submit proof of citizenship if deemed necessary. Failing to do so will result in the immediate disqualification of your application.
- This scholarship is only open to applicants who have not yet started their studies with an EC-Council certification.
- The applicants should be at least 18 years of age at the time of application.
- Candidates are requested to furnish true and accurate information. Failing to do so will result in the immediate disqualification of their application.
- Scholarships will be granted at the sole discretion of EC-Council and National Cyber Security Agency (NACSA).
- The selected candidates must share their honest feedback in written/video reviews with EC-Council on the successful completion of their program. EC-Council reserves the right to publish these reviews on all digital channels.
- Scholarships are not available with any other discount or special pricing offer. Decisions about scholarships are final, and no further correspondence will be considered.
- Scholarships are non-transferable and non-refundable.
Frequently Asked Questions about Scholarship Program
All of our courses come with professional EC-Council certificates of achievement that verify that you completed the course and passed the final exam (if applicable). You will then be able to share these certificates on social media with your peers and future employers.
Your access to any learning path lasts for one year which means that you will have access to your courses (including all updates) for an entire year before your subscription is expired.
No, you get complete access to your learning materials online and take the assessment exam online.
Be rest assured there are no hidden costs. EC-Council and National Cyber Security Agency (NACSA) want to give back to the cybersecurity community that has been supportive of us. And hence, we have launched a full-funded cybersecurity scholarship.
Absolutely! EC-Council’s learning paths are suitable for professionals of all knowledge levels, especially beginners. The structured curriculum will help you build all foundational skills from scratch and take you to more advanced concepts and hands-on practice.
Yes! EC-Council’s learning paths are suitable for professionals of all knowledge levels. The structured curriculum will help you build all foundational programming and cybersecurity skills from scratch and take you to more advanced concepts and hands-on practice.
We are glad to answer all your queries. Please email us at [email protected] and we will get back to you with the answer at the earliest.