Course Details
Topic 1 Design solutions that align with security best practices and priorities
1.1 Introduction to Zero Trust and best practice frameworks
- Introduction to best practices5
- Introduction to Zero Trust
- Zero Trust initiatives
- Zero Trust technology pillars part 1
- Zero Trust technology pillars part 2
1.2 Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Define a security strategy
- Introduction to the Cloud Adoption Framework
- Cloud Adoption Framework secure methodology
- Introduction to Azure Landing Zones
- Design security with Azure Landing Zones
- Introduction to the Well-Architected Framework
- The Well-Architected Framework security pillar
1.3 Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
- Design solutions with best practices for capabilities and controls
- Design solutions with best practices for attack protection
1.4 Design a resiliency strategy for common cyberthreats like ransomware
- Common cyberthreats and attack patterns
- Support business resiliency
- Ransomware protection
- Configurations for secure backup and restore
- • Security updates
1.5 Case study: Design solutions that align with security best practices and priorities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 2 Design security operations, identity, and compliance capabilities
2.1 Design solutions for regulatory compliance
- Introduction to regulatory compliance
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Address privacy requirements with Microsoft Priva
- Address security and compliance requirements with Azure policy
- Evaluate infrastructure compliance with Defender for Cloud
2.2 Design security solutions for applications and data
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
2.3 Design solutions for identity and access management
- Introduction to Identity and Access Management
- Design cloud, hybrid and multicloud access strategies (including Azure AD)
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Align conditional access and Zero Trust
- Specify requirements to secure Active Directory Domain Services (AD DS)
- Design a solution to manage secrets, keys, and certificates
2.4 Design solutions for securing privileged access
- Introduction to privileged access
- The enterprise access model
- Design identity governance solutions
- Design a solution to secure tenant administration15 min
- Design a solution for cloud infrastructure entitlement management (CIEM)
- Design a solution for privileged access workstations and bastion services
2.5 Design solutions for security operations
- Introduction to Security operations (SecOps)
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design security information and event management (SIEM) solutions
- Design solutions for detection and response
- Design a solution for security orchestration, automation, and response (SOAR)
- Design security workflows
- Design threat detection coverage
2.6 Case study: Design security operations, identity and compliance capabilities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 3 Design security solutions for applications and data
3.1 Design solutions for securing Microsoft 365
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
3.2 Design solutions for securing applications
- Introduction to application security
- Design and implement standards to secure application development
- Evaluate security posture of existing application portfolios
- Evaluate application threats with threat modeling
- Design security lifecycle strategy for applications
- Secure access for workload identities
- Design a solution for API management and security
- Design a solution for secure access to applications
3.3 Design solutions for securing an organization's data
- Introduction to data security5
- Design a solution for data discovery and classification using Microsoft Purview
- Design a solution for data protection
- Design data security for Azure workloads
- Design security for Azure Storage
- Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
3.4 Case study: Design security solutions for applications and data
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 4 Design security solutions for infrastructure
4.1 Specify requirements for securing SaaS, PaaS, and IaaS services
- Introduction to security for SaaS, PaaS, and IaaS
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
4.2 Design solutions for security posture management in hybrid and multicloud environments
- Introduction to hybrid and multicloud posture management
- Evaluate security posture by using Microsoft Cloud Security Benchmark
- Design integrated posture management and workload protection
- Evaluate security posture by using Microsoft Defender for Cloud
- Posture evaluation with Microsoft Defender for Cloud secure score
- Design cloud workload protection with Microsoft Defender for Cloud
- Integrate hybrid and multicloud environments with Azure Arc
- Design a solution for external attack surface management
4.3 Design solutions for securing server and client endpoints
- Introduction to endpoint security
- Specify server security requirements
- Specify requirements for mobile devices and clients
- Specify internet of things (IoT) and embedded device security requirements
- Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
4.4 Design solutions for network security
- Design solutions for network segmentation
- Design solutions for traffic filtering with network security groups
- Design solutions for network posture management
- Design solutions for network monitoring
4.5 Case study: Design security solutions for infrastructure
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Final Assessment
- Written Assessment - Short Answer Questions (WA-SAQ)
- Practical Performance (PP)
Course Info
Promotion Code
Promo or discount cannot be applied to WSQ courses
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target age group: 21-65 years old
Minimum Software/Hardware Requirement
<p
Software:
Sign up for a free Microsoft Account
Hardware: Windows and Mac Laptops
About Progressive Wage Model (PWM)
The Progressive Wage Model (PWM) helps to increase wages of workers through upgrading skills and improving productivity.
Employers must ensure that their Singapore citizen and PR workers meet the PWM training requirements of attaining at least 1 Workforce Skills Qualification (WSQ) Statement of Attainment, out of the list of approved WSQ training modules.
For more information on PWM, please visit MOM site.
Funding Eligility Criteria
Individual Sponsored Trainee | Employer Sponsored Trainee |
|
|
SkillsFuture Credit:
PSEA:
|
Absentee Payroll (AP) Funding:
SFEC:
|
Steps to Apply Skills Future Claim
- The staff will send you an invoice with the fee breakdown.
- Login to the MySkillsFuture portal, select the course you’re enrolling on and enter the course date and schedule.
- Enter the course fee payable by you (including GST) and enter the amount of credit to claim.
- Upload your invoice and click ‘Submit’
SkillsFuture Level-Up Program
The SkillsFuture Level-Up Programme provides greater structural support for mid-career Singaporeans aged 40 years and above to pursue a substantive skills reboot and stay relevant in a changing economy. For more information, visit SkillsFuture Level-Up Programme
Get Additional Course Fee Support Up to $500 under UTAP
The Union Training Assistance Programme (UTAP) is a training benefit provided to NTUC Union Members with an objective of encouraging them to upgrade with skills training. It is provided to minimize the training cost. If you are a NTUC Union Member then you can get 50% funding (capped at $500 per year) under Union Training Assistance Programme (UTAP).
For more information visit NTUC U Portal – Union Training Assistance Program (UTAP)
Steps to Apply UTAP
- Log in to your U Portal account to submit your UTAP application upon completion of the course.
Note
- SSG subsidy is available for Singapore Citizens, Permanent Residents, and Corporates.
- All Singaporeans aged 25 and above can use their SkillsFuture Credit to pay. For more details, visit www.skillsfuture.gov.sg/credit
- An unfunded course fee can be claimed via SkillsFuture Credit or paid in cash.
- UTAP funding for NTUC Union Members is capped at $250 for 39 years and below and at $500 for 40 years and above.
- UTAP support amount will be paid to training provider first and claimed after end of class by learner.
Job Roles
- Cybersecurity Architect
- Information Security Analyst
- Security Consultant
- IT Security Manager
- Network Security Engineer
- Security Analyst
- Chief Information Security Officer (CISO)
- Security Solutions Architect
- Cybersecurity Engineer
- IT Manager
- Systems Administrator
- Risk Manager
- Compliance Officer
- Security Researcher
- Incident Responder
Trainers
Sanjiv Venkatram: Sanjiv i is an ACTA certified experienced leader with a proven track record in business / finance consulting and in developing i) business intelligence (BI) solutions ii) data analytics/analysis solutions and iii) IOT lead BI solutions. Sanjiv's goal through Prudentia Consulting, is to promote the simple joy and excitement of actively using the Microsoft Platform. He believes that the agility afforded by the Microsoft platform helps businesses get time back for deeper business thinking and to spend more time with their end customers
Sanjiv has rich experiences in diverse/complex high-tech businesses, turn around environments and strategic transformations. His functional expertise is in sales analytics, financial planning and analysis, engineering and program management. He has worked across discrete manufacturing, professional services and higher education verticals. He also has a working knowledge of equities portfolio management within the financial services domain.Sanjiv is the CEO of Prudentia Consulting, an organization committed to promoting the active usage of the Microsoft Platform. Prior to this, he has worked at Microsoft (US & APAC: 9.2 years), Cognizant Tech Solutions (3.3 years), Yazaki North America (8 years) and until recently at Oracle. Here are a few of his BI/analytics projects driven at scale: Built APAC wide BI dashboard using the Power BI umbrella tool set (Power BI online, Power BI desktop and Power Pivot) and a KPI lake (SQL DB), Helped develop key KPIs – identified key KPIs and helped land this in the DB, Developed a budget audit tool that captured budget inputs from a host of countries across the globe, Developed a business unit P&L reporting tool (functional architecture) in Business Objects for the world-wide financial planning and analysis team.
Alec Tan: Alec Tan is a ACTA certified trainer, He has a number of Comptia certifications. Since 2002, starting off from IT technical background to pre-sales, sales account manager, system integration, operate IT retail / repair shop business in Sim Lim Square 2008 ~ 2012, and back to IT industry employment, freelance IT Trainer till present.
Kishan Raaj: Kishan Raaj is a seasoned Data Science and SAP Program Manager with over 15 years of experience, currently leading all end-to-end training and projects for Data Science across Asia at LITHAN, Singapore. With expertise in machine learning, data analytics, and cloud technologies, he is well-versed in techniques such as regression, decision trees, clustering, and text mining. He has hands-on experience with tools like Python, R, Tableau, PowerBI, and Microsoft Azure Machine Learning Studio.
As an ACTA certified trainer, Kishan has designed and delivered comprehensive courses for SAP and Data Science programs, managing teams and training in multiple countries, including Singapore, Malaysia, China, India, and Vietnam. His background in SAP, particularly in S4/HANA and ABAP, combined with his expertise in machine learning libraries such as TensorFlow and Keras, positions him as a highly capable leader in technical education and project management across various industries.
Quah Chee Yong: Quah Chee Yong is a ACTA certified trainer. Quah Chee Yong Chee Yong is an experienced professional who has held various Technical, Operations and Commercial positions across several industriesA firm believer that AI can create a better world, he has equipped himself with the Knowledge and Skills in the fields of Data Science, Machine Learning, Deep Learning and Cloud Deployment
He has a deep passion for training & facilitating and is currently a Singapore WSQ certified Adult Educator. He particularly enjoys the interactive engagements with his fellow trainers and learners
Peter Cheong : Peter is a ACLP certied trainer. Specialise In IT related knowlege and conduct IT Training which Include Microsoft Window Server Technology (Wintel) and Linux - Centos/Red Hat. Comptia ,ITIL , Motorola Solution Trunking System and Cisco Networking. I was worked in Motorola Solutions Conduct Motorola Astro 25 Trunking System For Police Force Malaysia (RMPnet),Taiwan Navy, Indonesia METRO POLDA (Police Force). After that Peter Join As IT Group Manager For W-Group which include 17 subsidiaries Companies in Real Estate Developer,Plantation, Building Management Services ,Contruction and also Fiber Opti Service Provider in Sabah,Malaysia.
Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.