Course Details
Topic 1: Defense in Depth
- Identify core security principles
- Define and enforce physical security
- Identify security policy types
- Identify attack types
- Identify backup and restore types
Topic 2: Operating System Security
- Identify client and server protection
- Configure user authentication
- Manage permissions in Windows and Linux
- Facilitate non-repudiation using audit policies and log files
- Demonstrate knowledge of encryption
Topic 3: Network Device Security
- Implement wireless security
- Identify the role of network protection devices
- Identify network isolation methods
- Identify protocol security concepts
Topic 4: Secure Computing
- Implement email protection
- Manage browser security
- Install and configure anti-malware and antivirus software
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
Job Roles
- Cyber Defense Analyst
- Physical Security Policy Manager
- OS Security Specialist
- Network Security Administrator
- IT Backup and Recovery Specialist
- Encryption Specialist
- Wireless Network Security Engineer
- Network Isolation Consultant
- Protocol Security Analyst
- Email Security Specialist
- Browser Security Manager
- Anti-Malware Deployment Technician
- Security Policy Strategist
- Audit and Compliance Analyst
- Linux/Windows Permission Administrator
- Non-Repudiation Specialist
- Threat Assessment Analyst
- Secure Computing Trainer
- Incident Recovery Expert
- Network Protection Device Operator
Trainers
Truman Ng: Truman Ng is a ACTA certified trainer that graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.
Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.
Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philippines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.
Saw Chaik Lee: Saw Chaik Lee is a ACTA certified trainer. Saw Chaik Lee has 38 years experiences in the IT industry serving in both end-user and vendor environments. He has been in the training industry in the last 18 years, teaching courses in Cisco, Riverbed, Blue Coat, Check Point, CompTIA, Mile2, IAPP, Nokia and SUN Microsystems. He worked in several senior positions providing technical support (designing, implementing, maintenance), technical consulting and project management for local and multi-national system integrator companies, and MNCs in manufacturing and financial sector. Have diverse set of expertise covering Routing and Switching, Security, System administration (Windows/Unix), Voice and Data center virtualization. Developed and conducted over 40 plus courses ranging from Infocomm security essential, Telecommunication and Internet related topics.
Agus Salim: Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.
Ben Law Beng Tjin: Ben is an experienced IT Infrastructure professional with more than 20 years of working experience in IT sector. Due to Corporate Digital Transformation and COVID-19 during early 2020 he shifted his focus to Cloud Computing specialized in Cloud Infrastructure Solutioning. He is an AWS Certified Solution Architect Associate, Google Certified Cloud Engineer, Microsoft Certified Azure Fundamentals and Alibaba Cloud Associate.
Alfred Yap Swee Leong: Alfred Yap is an ACLP certified trainer with strong financial and shopper marketing domain background and extensive experience in information technology. In addition, he is both an IBM certified Cloud Computing Practitioner and an IBM Enterprise Design Thinking Practitioner.
Alfred Yap has spent decades teaching adult learners since the 90s. Kickstarting his teaching career as a trainer for Oracle University. Thereafter, he has had vast experience conducting ICT related training to various companies in the Consulting, Media, and Training industry.
Alfred Yap earned his undergraduate degree from USF, America and master degree from NTU, Singapore majoring in Knowledge Management. His current interests include Cyber Security, Cloud computing and Blockchain.
Customer Reviews (3)
- Might Recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment