Course Details
LU1 Organization’s Cyber Security Policies and Procedures
Topic 1: Security Principles
- Common security principles
- Cybersecurity frameworks and industry-accepted best practices
- Vulnerabilities, threats, and common attacks
- Recognize social engineering attacks
- Access management principles and procedures
- How encryption protects the confidentiality and integrity of data
LU2 Implementation of Organization’s Cyber Security Policies and Procedure
Topic 2: Securing the Network
- Identify vulnerabilities associated with commonly used protocols
- The role of addressing in network security
- The purpose and function of network security technologies
- Validate the security of wireless networks
- Examine network security logs to identify anomalies
Topic 3: Securing Endpoint Devices
- Apply security settings to harden operating systems
- Use endpoint tools to gather security assessment information
- Use packet capture utilities to identify anomalies
- Demonstrate familiarity with endpoint security policies and standards
- Interpret system logs to identify anomalies
- Perform malware removal
LU3 Assessment and Continuous of Organization’s Cyber Security Policies and Procedure
Topic 4: Vulnerability Assessment and Risk Management
- Use threat intelligence sources to identify potential network vulnerabilities
- Risk management
- Penetration testing process
Topic 5: Incident Handling
- Monitor security events to determine if escalation is required
- Digital forensics process and attack frameworks
- Elements of cybersecurity incident response
- Importance of disaster recovery and business continuity planning
- Assist users in restoring data after an incident
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
Job Roles
- Cybersecurity Specialist
- IT Security Analyst
- Network Security Engineer
- Information Security Officer
- Security Operations Center (SOC) Analyst
- Vulnerability Analyst
- Penetration Tester
- Incident Response Analyst
- Risk Management Consultant
- Cyber Threat Intelligence Analyst
- Digital Forensics Specialist
- Security Compliance Auditor
- Security Administrator
- Cybersecurity Trainer
- IT Governance Specialist
- Endpoint Security Engineer
- Systems Security Architect
- Chief Information Security Officer (CISO)
- Disaster Recovery Specialist
- Cloud Security Engineer
Trainers
Shawn Koh Boon Hiap: Shawn Koh Boon Hiap is a ACTA certified trainer and used to be a specialist trainer in RSAF training specialists and officers. He was also invited by Prime Minister Office on Dec 2019 as guest speaker for Smart Nation event held in Downtown East. Throughout his career in the corporate world, he was also coach and mentor to many others, often relinquishing his leadership to take on more challenging tasks after imparting his knowledge and skillsets to his successors. Shawn is skilled in IoT integrations and development, network administration, system administration, website development, software development, multimedia production, information security, entrepreneurship, corporate leadership and project management.
He is a corporate leader and turned as entrepreneur, is the founder of I.O.T. Workz, a Smart Nation ambassador, offering integrated IoT solutions for residential, commercial and industrial. He was a self-learned programmer and won the National Software Competition North Zone Champion in 1990. He developed the first predictive online-data reduction system in 1996 for the Command and Control (C2) Center in RSAF to provide real-time system health monitoring in the data center. He also formed the Ground-Based Radar System team in ST Electronics (InfoSoft) to provide software maintenance for all radar systems in Singapore between 2003 and 2006. He was also the solution architect for multiple generations of Derivatives Clearing Systems, Head of Enterprise Solutions and held a couple of other leadership roles in SGX between 2007 and 2018. Throughout his years of exposure with Technology, he had mastered many different programming languages, acquired electronics troubleshooting skills and earn professional certifications in PMP, Information Security, Linux Administration and many others.
Man Guo Chang: Man Guo Chang is also an ACTA certified trainer, currently providing STEM training to adult learners in the area of Computer Vision, Internet of Things, Embedded Electronics, and Python Programming. He graduated from Nanyang Technological University, School of Electrical and Electronic Engineering, major in Computer Engineering.
He has more than 25 years of working experience in the Semiconductor field, specialized in IC Testing, Inline Electrical Testing, Product & Yield Engineering, Data Analysis, System Engineering, and Software Development.
Customer Reviews (9)
- Will Recommend Review by Course Participant/Trainee
-
need to allocate extra time incase troubleshooting is needed if there is problem with the software compatibility. (Posted on 6/18/2019)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
1. Must well prepare and confirm which version of software and library used in this course. The participance can download and install from home before the training start.1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment
2. Deep explanation on IoT MQTT platform must do better in practicals. Without understanding the terms and concept may cause the participance lost.
3. Node-RED too less cover in this course and need to improve. It's should be cover more due to the course title is Arduino IoT Training with Node-RED.
More hands-on and deep explanations on related course. (Posted on 6/18/2019) - Will Recommend Review by Course Participant/Trainee
-
. (Posted on 5/21/2019)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
Raspberry PI image should be pre loaded with examples.1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment
Since 1 day crash course, more important to demonstrate what Node Red can do rather than hands on. Instructor has achieved this.
Instructor's Node Red examples are excellent, however need to receive via email, so go back still to wait to receive and famaliarise with import... Hopefully same examples (Posted on 5/21/2019) - Might Recommend Review by Course Participant/Trainee
-
More information on IoT and a section on the latest trends (Posted on 3/14/2018)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
More cloud data management (Posted on 3/11/2017)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommnd Review by Course Participant/Trainee
-
All seems good. No improvement is needed. (Posted on 12/25/2016)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - The course was well organized and teacher showed a lot of commitment on his part. All up up :) Review by Course Participant/Trainee
-
Can maintain an alumni portal/forum for better interaction. Can add one or two videos how to prepare breadboard for specific task (Posted on 11/25/2016)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Might Recommend Review by Course Participant/Trainee
-
Better location. I found the course very interesting, it would have helped either having two days or less content to allow to go deeper (Posted on 11/21/2016)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment








