Course Details
Topic 1: Comparing Security Roles and Security Controls
- Compare and contrast information security roles
- Compare and contrast security control and framework types
Topic 2: Explaining Threat Actors and Threat Intelligence
- Explain threat actor types and attack vectors
- Explain threat intelligence sources
Topic 3: Performing Security Assessments
- Assess organizational security with network reconnaissance tools
- Explain security concerns with general vulnerability types
- Summarize vulnerability scanning techniques
- Explain penetration testing concepts
Topic 4: Identifying Social Engineering and Malware
- Compare and contrast social engineering techniques
- Analyze indicators of malware-based attacks
Topic 5: Summarizing Basic Cryptographic Concepts
- Compare and contrast cryptographic ciphers
- Summarize cryptographic modes of operation
- Summarize cryptographic use cases and weaknesses
- Summarize other cryptographic technologies
Topic 6: Implementing Public Key Infrastructure
- Implement certificates and certificate authorities
- Implement PKI management
Topic 7: Implementing Authentication Controls
- Summarize authentication design concepts
- Implement knowledge-based authentication
- Implement authentication technologies
- Summarize biometrics authentication concepts
Topic 8: Implementing Identity and Account Management Controls
- Implement identity and account types
- Implement account policies
- Implement authorization solutions
- Explain the importance of personnel policies
Topic 9: Implementing Secure Network Designs
- Implement secure network designs
- Implement secure routing and switching
- Implement secure wireless infrastructure
- Implement load balancers
Topic 10: Implementing Network Security Appliances
- Implement firewalls and proxy servers
- Implement network security monitoring
- Summarize the use of SIEM
Topic 11: Implementing Secure Network Protocols
- Implement secure network operations protocols
- Implement secure application protocols
- Implement secure remote access protocols
Topic 12: Implementing Host Security Solutions
- Implement secure firmware
- Implement endpoint security
- Explain embedded system security implications
Topic 13: Implementing Secure Mobile Solutions
- Implement mobile device management
- Implement secure mobile device connections
Topic 14: Summarizing Secure Application Concepts
- Analyze indicators of application attacks
- Analyze indicators of web application attacks
- Summarize secure coding practices
- Implement secure script environments
- Summarize deployment and automation concepts
Topic 15: Implementing Secure Cloud Solutions
- Summarize secure cloud and virtualization services
- Apply cloud security solutions
- Summarize infrastructure as code concepts
Topic 16: Explaining Data Privacy and Protection Concepts
- Explain privacy and data sensitivity concepts
- Explain privacy and data protection controls
Topic 17: Performing Incident Response
- Summarize incident response procedures
- Utilize appropriate data sources for incident response
- Apply mitigation controls
Topic 18: Explaining Digital Forensics
- Explain key aspects of digital forensics documentation
- Explain key aspects of digital forensics evidence acquisition
Topic 19: Summarizing Risk Management Concepts
- Explain risk management processes and concepts
- Explain business impact analysis concepts
Topic 20: Implementing Cybersecurity Resilience
- Implement redundancy strategies
- Implement backup strategies
- Implement cybersecurity resiliency strategies
Topic 21: Explaining Physical Security
- Explain the importance of physical site security controls
- Explain the importance of physical host security controls
Final Assessment
- Written Assessment - Short Answer Questions (WA-SAQ)
- Practical Performance (PP)
Course Info
Promotion Code
Promo or discount cannot be applied to WSQ courses
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions with minimum Computer Literacy Level 2 based on ICAS Computer Skills Assessment Framework
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Year Group : 21-65 years old
Minimum Software/Hardware Requirement
Softtware: Windows / Mac
Hardware: Laptop
CompTIA Exam Fee
The course fees do not cover the cost of the CompTIA Security+ (SY0-701) Exam Voucher. Those interested in taking these exams can purchase the exam voucher at a LOW PRICE here.
Exam duration: 90 Mins per Exam
Exam format: Maximum of 90 questions per exam. Multiple choice questions (single and multiple response), drag and drops and performance-based
Passing score: 750 (on a scale of 100-900)
Find out more information about the CompTIA Security+ exams.
About Progressive Wage Model (PWM)
The Progressive Wage Model (PWM) helps to increase wages of workers through upgrading skills and improving productivity.
Employers must ensure that their Singapore citizen and PR workers meet the PWM training requirements of attaining at least 1 Workforce Skills Qualification (WSQ) Statement of Attainment, out of the list of approved WSQ training modules.
For more information on PWM, please visit MOM site.
Funding Eligility Criteria
| Individual Sponsored Trainee | Employer Sponsored Trainee |
|
|
|
SkillsFuture Credit:
PSEA:
|
Absentee Payroll (AP) Funding:
SFEC:
|
Steps to Apply Skills Future Claim
- The staff will send you an invoice with the fee breakdown.
- Login to the MySkillsFuture portal, select the course you’re enrolling on and enter the course date and schedule.
- Enter the course fee payable by you (including GST) and enter the amount of credit to claim.
- Upload your invoice and click ‘Submit’
SkillsFuture Level-Up Program
The SkillsFuture Level-Up Programme provides greater structural support for mid-career Singaporeans aged 40 years and above to pursue a substantive skills reboot and stay relevant in a changing economy. For more information, visit SkillsFuture Level-Up Programme
Get Additional Course Fee Support Up to $500 under UTAP
The Union Training Assistance Programme (UTAP) is a training benefit provided to NTUC Union Members with an objective of encouraging them to upgrade with skills training. It is provided to minimize the training cost. If you are a NTUC Union Member then you can get 50% funding (capped at $500 per year) under Union Training Assistance Programme (UTAP).
For more information visit NTUC U Portal – Union Training Assistance Program (UTAP)
Steps to Apply UTAP
- Log in to your U Portal account to submit your UTAP application upon completion of the course.
Note
- SSG subsidy is available for Singapore Citizens, Permanent Residents, and Corporates.
- All Singaporeans aged 25 and above can use their SkillsFuture Credit to pay. For more details, visit www.skillsfuture.gov.sg/credit
- An unfunded course fee can be claimed via SkillsFuture Credit or paid in cash.
- UTAP funding for NTUC Union Members is capped at $250 for 39 years and below and at $500 for 40 years and above.
- UTAP support amount will be paid to training provider first and claimed after end of class by learner.
Appeal Process
- The candidate has the right to disagree with the assessment decision made by the assessor.
- When giving feedback to the candidate, the assessor must check with the candidate if he agrees with the assessment outcome.
- If the candidate agrees with the assessment outcome, the assessor & the candidate must sign the Assessment Summary Record.
- If the candidate disagrees with the assessment outcome, he/she should not sign in the Assessment Summary Record.
- If the candidate intends to appeal the decision, he/she should first discuss the matter with the assessor/assessment manager.
- If the candidate is still not satisfied with the decision, the candidate must notify the assessor of the decision to appeal. The assessor will reflect the candidate’s intention in the Feedback Section of the Assessment Summary Record.
- The assessor will notify the assessor manager about the candidate’s intention to lodge an appeal.
- The candidate must lodge the appeal within 7 days, giving reasons for appeal
- The assessor can help the candidate with writing and lodging the appeal.
- he assessment manager will collect information from the candidate & assessor and give a final decision.
- A record of the appeal and any subsequent actions and findings will be made.
- An Assessment Appeal Panel will be formed to review and give a decision.
- The outcome of the appeal will be made known to the candidate within 2 weeks from the date the appeal was lodged.
- The decision of the Assessment Appeal Panel is final and no further appeal will be entertained.
- Please click the link below to fill up the Candidates Appeal Form.
Job Roles
- Information Security Analyst
- Network Administrator
- Systems Administrator
- IT Manager
- Security Consultant
- Cybersecurity Analyst
- IT Auditor
- Security Engineer
- Network Engineer
- Help Desk Technician
- Security Specialist
- IT Project Manager
- Security Administrator
- Risk Analyst
- Compliance Analyst
Trainers
Mohan Pothula: Mohan Pothula is an experienced network and cybersecurity specialist with more than 18 years of expertise in IT infrastructure, system administration, and enterprise security. He has implemented and managed secure network architectures for multinational organizations across finance, education, and technology sectors. His areas of proficiency include threat management, intrusion detection, and security policy implementation. As a CompTIA Certified Trainer and WSQ-accredited educator, Mohan is known for his ability to simplify complex cybersecurity concepts and deliver engaging, hands-on learning experiences.
In “CompTIA Certified Security+ Training,” Mohan helps participants build a strong foundation in information security principles and best practices. His sessions cover network defense, cryptography, risk management, and identity protection through real-world simulations and case studies. With his practical teaching approach and industry experience, he ensures learners gain the technical skills and confidence needed to protect organizational assets and succeed in the Security+ certification exam.
Truman Ng: Truman Ng is a senior IT consultant and cybersecurity architect with over 20 years of experience in network infrastructure, system security, and cloud architecture. A PMP, ACTA, and Huawei HCIE-certified professional, he has led large-scale cybersecurity and automation projects across global enterprises. His expertise spans intrusion prevention, vulnerability assessment, and secure cloud deployment. Truman’s deep understanding of enterprise systems makes him an effective instructor for professionals seeking to build robust cybersecurity capabilities.
In “CompTIA Certified Security+ Training,” Truman equips learners with essential cybersecurity knowledge covering risk mitigation, encryption, and incident response. His sessions emphasize hands-on labs and security configuration exercises using real-world tools and frameworks. By combining technical rigor with practical insights, he prepares participants to identify, assess, and defend against cybersecurity threats while achieving the globally recognized CompTIA Security+ credential.
Agus Salim: Agus Salim is an IT systems engineer and certified cybersecurity professional with over 15 years of experience in network administration, IT governance, and security compliance. A WSQ-accredited trainer and Microsoft Certified Professional, he has delivered numerous programs in IT infrastructure management, network security, and data protection. Agus is passionate about empowering learners with practical cybersecurity skills applicable to modern digital environments.
In “CompTIA Certified Security+ Training,” Agus guides learners through the fundamentals of security architecture, access control, and risk management. His sessions focus on understanding threats, configuring defenses, and applying security protocols across IT systems. Through practical demonstrations and step-by-step exercises, he helps learners develop a strong grasp of cybersecurity best practices and prepares them to achieve certification success.
Alec Tan Chee Wee: Alec Tan is an IT consultant and cloud infrastructure engineer with more than 15 years of experience in network security, cloud deployment, and system administration. He has implemented secure infrastructure solutions for enterprise clients using AWS, Microsoft Azure, and Cisco technologies. His expertise includes firewall management, intrusion detection, and vulnerability analysis. Alec’s training approach emphasizes hands-on application and real-world problem-solving.
In “CompTIA Certified Security+ Training,” Alec focuses on teaching learners how to apply security principles across network and cloud environments. His sessions cover threat analysis, secure configuration, and incident response frameworks. By combining theoretical concepts with practical scenarios, he ensures learners develop the competence to secure enterprise environments and meet the CompTIA Security+ certification standards.
Dr. Alfred Ang: Dr. Alfred Ang is a distinguished technology leader, cybersecurity expert, and educator with over 20 years of experience in IT systems, information security, and digital transformation. As the Chief Technology Officer and CIO of Tertiary Infotech Pte Ltd, he has led the development of more than 500 WSQ-accredited programs in cybersecurity, cloud computing, and AI systems. Dr. Ang holds a Ph.D. in Information Systems and multiple professional certifications, including CISSP, CEH, and CompTIA Security+, reflecting his deep expertise in both academic and enterprise cybersecurity.
In “CompTIA Certified Security+ Training,” Dr. Ang provides strategic and technical insights into modern cybersecurity challenges. His sessions cover governance, risk management, cryptography, and incident handling using real-world case studies and industry frameworks. By merging academic rigor with practical security implementation, he equips learners to understand, design, and manage secure systems that align with international standards and professional certification requirements.
Customer Reviews (4)
- will recommend Review by Course Participant/Trainee
-
. (Posted on 9/3/2025)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
. (Posted on 9/1/2025)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
/ (Posted on 3/7/2025)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
. (Posted on 1/10/2025)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment








