Call +65 6100 0613 Email: enquiry@tertiaryinfotech.com

Enhance Your Employability with Certified Skills and Courses in Singapore - WSQ , IBF-STS, Skills Certification

5 Days Cyber Security Specialization

Cybersecurity risk is increasing, driven by global connectivity and usage of cloud services to store sensitive data and personal information. Widespread poor configuration of cloud services paired with increasingly sophisticated cyber criminals means the risk that your organization suffers from a successful cyber attack or data breach is on the rise.

Cyber threats can come from any level of your organization. You must educate your staff about simple social engineering scams like phishing and more sophisticated cybersecurity attacks like ransomware or other malware designed to steal intellectual property or personal data.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant Applications

No funding is available for this course

Course Code: C1197

Course Booking

The course fee listed below is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

$1,500.00 (GST-exclusive)
$1,635.00 (GST-inclusive)

Course Date

Course Time

* Required Fields

Post-Course Support

  • We provide free consultation related to the subject matter after the course.
  • Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts.

Course Cancellation/Reschedule Policy

  • You can register your interest without upfront payment. There is no penalty for withdrawal of the course before the class commerce.
  • We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% for any paid amount.
  • Note the venue of the training is subject to changes due to availability of the classroom

Course Details

Day 1
Topic 1: Cyber Security Fundamental

Topic 1.1 - Cyber Security Threats

  • Introduction to Cyber Security
  • Malwares - Viruses, Worms, Trojan Horse, Ransomware, Spyware
  • Hoaxes and Phishing Scams
  • Social Media and Social Engineering Threats
  • Mobile and Online Scams
  • Wireless Security Threats
  • Network and Remote Access Threats
  • Cyber Warfare

Topic 1.2 - Protection Against Cyber Security Threats

  • User ID and Passwords Protection
  • Home Computer and Information Protection with Firewalls
  • Best Practices Against Malware, Computer Viruses and Worms
  • Trojans and Spyware Protection
  • Protection from Hoaxes and Phishing
  • Mobile Devices and Wireless Protection
  • Remote Access Protection with SSL
  • Social Media and Online Scams Protection

Topic 1.3 - Security Management for Businesses

  • Identify Organizations Assets from Cyber Attacks
  • Secure Personal Data
  • Secure Sockets Layer
  • Security Governance
  • Business Continuity Planning
  • IDS/IPS Systems & Penetration Testing

Day 2
Topic 2: Advanced Cyber Security

Topic 2.1: Port Scanning

  • OSI Model
  • TCP/IP and UDP Protocols
  • IPv4 and IPv6
  • Network Ports
  • Ping and Traceroute
  • Port Scanning Using NMap

Topic 2.2 – Cryptography

  • Overview of Cryptography and Encryption
  • Classic Cryptography
  • Symmetric Key Encryption
  • Asymmetric Key Encryption
  • WiFi Security
  • Secure Key Exchange and Digital Signature
  • Hashing Function Cryptography

Topic 2,3 – Vulnerability Scanning

  • Overview of Vulnerability Scanning
  • Vulnerability Scanning Tools
  • Install Nessus
  • Perform Vulnerability Scanning Using Nessus
  • Common Types of Vulnerabilities
  • Cross Site Scripting (XSS) Vulnerability

Day 3
Topic 3: Network Security Fundamental

Topic 3.1 Network Security Threats and Vulnerabilities

  • Overview of network security perimeters and data encryption
  • Identify network security threats and vulnerabilities

Topic 3.2 Virtual Private Network

  • Introduce Virtual Private Network (VPN)
  • Address network security deficiencies on VPN

Topic 3.3: Network Hardening

  • Implement network hardening measures
  • Configure router and switches

Topic 3.4: Network Security Testing

Introduce network security testing tools
Conduct testing to measure network security performance

Topic 3.5 Network Security Debugging

  • Overview of network security debugging
  • Network sniffing
  • Network IP and port scanning

Topic 3.6 Logging and Incident Management

  • Distributed denial-of-service (DDoS) detection
  • Level of logging
  • Incident management

Day 4
Topic 4: Network Anaysis with Wireshark

Topic 4.1. Introduction to Network Analysis and Wireshark

  • TCP/IP Analysis Checklist
  • Top Causes of Performance Problems
  • Get the Latest Version of Wireshark
  • Capturing Traffic
  • Opening Trace Files
  • Processing Packets
  • The Qt Interface Overview
  • Using Linked Panes
  • The Icon Toolbar
  • Master the Intelligent Scrollbar
  • The Changing Status Bar
  • Right-Click Functionality
  • General Analyst Resources
  • Your First Task When You Leave Class

Topic 4.2. Learn Capture Methods and Use Capture Filters

  • Analyze Switched Networks
  • Walk-Through a Sample SPAN Configuration
  • Analyze Full-Duplex Links with a Network TAP
  • Analyze Wireless Networks
  • USB Capture
  • Initial Analyzing Placement
  • Remote Capture Techniques
  • Available Capture Interfaces
  • Save Directly to Disk
  • Capture File Configurations
  • Limit Your Capture with Capture Filters
  • Examine Key Capture Filters

Topic 4.3. Customize for Efficiency: Configure Your Global Preferences

  • First Step: Create a Troubleshooting Profile
  • Customize the User Interface
  • Add Custom Columns for the Packet List Pane
  • Set Your Global Capture Preferences
  • Define Name Resolution Preferences
  • Configure Individual Protocol Preference

Day 5
Topic 5: Machine Learning for Network Security

Topic 5.1 Artificial Intelligence for Security

  • CIA Security Principles
  • AI for Cyber Security
  • Use Cases of AI Applications on Cyber Security

Topic 5.2 Basics of Machine Learning and AI

  • What is AI
  • Overview Machine Learning Technologies
  • Regression
  • Classification
  • Clustering and Anomaly Detection
  • Synthetic Data Generation
  • Neural Network and Deep Learning

Topic 5.3 Intrusion Detection System

  • Overview of Intrusion Detection System (IDS)
  • Build a Neural Network Model for IDS
  • Train and Evaluate the Model
  • Challenges of AI for Security

Course Info

Prerequisite

The learner must meet the minimum requirement below :

  • Read, write, speak and understand English

Target Audience

  • NSF
  • Full Time Students
  • Data Analysts

Software Requirement

This course will use Google Colab for training. Please ensure you have a Google account.

Job Roles

  • IT Manager
  • Network Administrator
  • Systems Administrator
  • Human Resources Manager
  • Small Business Owner
  • IT Support Specialist
  • Data Protection Officer
  • Risk Management Specialist
  • Compliance Officer
  • Operations Manager
  • Financial Controller
  • Marketing Manager (digital-focused)
  • E-commerce Site Operator
  • Customer Support Manager
  • Software Developer

Trainers

Muhammed Siraj: Muhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well.

Terence Ee: Terence Ee is a ACTA certified trainr that has delivered IT training in Singapore and Myanmar. He has also facilitated faith formation courses for Christians in Singapore and Myanmar. As a trainer, his mission is to co-create insightful and actionable learning experiences with his learners.His current areas of focus include project management, information security management, quality management and office productivity applications.

Terence has more than 25 years of corporate IT experience. He has held senior management roles in the public and private sectors. He holds a Master of Science in Technology Management, a Bachelor of Science in Computer and Information Sciences, a Diploma in Family Education, and the Advanced Certificate in Training and Assessment (ACTA). Part of his spare time goes towards tutoring his children in their studies (while learning a thing or two along the way). He is also imparting to them the essential skills for thriving in a digital world.

Truman Ng: Truman Ng is a ACTA certified trainer that graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philipines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.

Customer Reviews (1)

Great experience. Enjoyed the course. Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Great experience. Enjoyed the course. (Posted on 9/15/2021)

Write Your Own Review

You're reviewing: 5 Days Cyber Security Specialization

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

You May Be Interested In These Courses

Basic Cyber Security Course

Basic Cyber Security Course

152 Review(s)
$298.00 (GST-exclusive)
$324.82 (GST-inclusive)
Advanced Cyber Security Course

Advanced Cyber Security Course

49 Review(s)
$298.00 (GST-exclusive)
$324.82 (GST-inclusive)
WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

121 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
4 Days Wireshark  Network Analysis Specialization

4 Days Wireshark Network Analysis Specialization

19 Review(s)
$1,200.00 (GST-exclusive)
$1,308.00 (GST-inclusive)
Network Security Essential Training

Network Security Essential Training

4 Review(s)
$600.00 (GST-exclusive)
$654.00 (GST-inclusive)