Course Details
Topic 1: Essential Security Principles, Incomplete section
- Define essential security principles.
- Explain common threats and vulnerabilities.
- Explain access management principles.
- Explain encryption methods and applications.
Topic 2: Basic Network Security Concepts
- Describe TCP/IP protocol vulnerabilities.
- Explain how network addresses impact network security.
- Describe network infrastructure and technologies.
- Set up a secure wireless SoHo network.
- Implement secure access technologies.
Topic 3: Endpoint Security Concepts
- Describe operating system security concepts.
- Demonstrate familiarity with appropriate endpoint tools that gather security assessment information.
- Verify that endpoint systems meet security policies and standards.
- Implement software and hardware updates.
- Interpret system logs.
- Demonstrate familiarity with malware removal.
Topic 4: Vulnerability Assessment and Risk Management, Incomplete section
- Explain vulnerability management.
- Use threat intelligence techniques to identify potential network vulnerabilities.
- Explain risk management.
- Explain the importance of disaster recovery and business continuity planning.
Topic 5: Incident Handling, Incomplete section
- Monitor security events and know when escalation is required.
- Explain digital forensics and attack attribution processes.
- Explain the impact of compliance frameworks on incident handling.
- Describe the elements of cybersecurity incident response.
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
Job Roles
- Cybersecurity Analyst
- Network Security Engineer
- Endpoint Security Specialist
- Vulnerability Analyst
- Risk Manager
- Incident Response Coordinator
- Security Operations Center (SOC) Analyst
- IT Compliance Specialist
- Systems Security Administrator
- Malware Analyst
- Disaster Recovery Manager
- Digital Forensics Expert
- Security Risk Consultant
- Secure Infrastructure Designer
- Access Management Specialist
- Threat Intelligence Analyst
- Wireless Network Security Engineer
- Cybersecurity Trainer
- Security Policy Auditor
- Security Architect
Trainers
Terence Ee: Terence Ee is a ACTA certified trainr that has delivered IT training in Singapore and Myanmar. He has also facilitated faith formation courses for Christians in Singapore and Myanmar. As a trainer, his mission is to co-create insightful and actionable learning experiences with his learners.His current areas of focus include project management, information security management, quality management and office productivity applications.
Terence has more than 25 years of corporate IT experience. He has held senior management roles in the public and private sectors. He holds a Master of Science in Technology Management, a Bachelor of Science in Computer and Information Sciences, a Diploma in Family Education, and the Advanced Certificate in Training and Assessment (ACTA). Part of his spare time goes towards tutoring his children in their studies (while learning a thing or two along the way). He is also imparting to them the essential skills for thriving in a digital world.
Praveen Dayal: Praveen Dayal is a ACTA certified trainer. Praveen Dayal have over 30 years of experience in PMP,PMI-ACP,CISA,CISM,CRISC and CDPSE. Praveen Dayal Have designed solutions for Banking & Finance, ICT, Manufacturing industry verticals and are facilitating training programs such as Project Management (PMP, ACP, ASM, pMF), Risk Management (PMI-RMP, CRISC), Information and Cyber Security (CISM, CSA) and IS Audits and Compliance (CISA).
Agus Salim: Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.
Truman Ng: Truman Ng is a ACTA certified trainer that graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.
Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.
Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philipines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.