Course Details
Topic 1: Defense in Depth
- Identify core security principles
- Define and enforce physical security
- Identify security policy types
- Identify attack types
- Identify backup and restore types
Topic 2: Operating System Security
- Identify client and server protection
- Configure user authentication
- Manage permissions in Windows and Linux
- Facilitate non-repudiation using audit policies and log files
- Demonstrate knowledge of encryption
Topic 3: Network Device Security
- Implement wireless security
- Identify the role of network protection devices
- Identify network isolation methods
- Identify protocol security concepts
Topic 4: Secure Computing
- Implement email protection
- Manage browser security
- Install and configure anti-malware and antivirus software
Final Assesment
- Written Assesment (SAQ)
- Case Study (CS)
Course Info
Register for an Account:
All test candidates must register an account with Certiport. Each person will only ever need one login/username. If you are unsure whether you have previously registered, contact support or a Certiport Solution Provider.
Each Test Candidate double-clicks the applicable desktop icon on the testing computer to begin the exam. The candidate:
- enters his/her username and logs in
- chooses the program, suite and individual exam to be taken
- select whether or not a voucher will be used
Assign Voucher to your Account:
Once you have a voucher, you may assign it to yourself. Doing so secures the voucher from being redeemed fraudulently. Login to your Test Candidate Account, enter your voucher number in the Voucher code field and click on Assign Voucher to Me. Once the voucher is assigned, you will be the only person who can use it. Inform the Proctor at the Testing Center you have assigned the voucher to yourself
Redeem Voucher:
- To redeem your voucher you must visit a Certiport Authorized Testing Center and provide the number to a Certiport Administrator. Exams must be taken prior to the expiration date. See specific instructions below.
- Take the exam at your selected testing center:
- Tell the representative you wish to redeem this voucher # for an exam.
- Schedule a time and date to take this exam.
- A proctoring fee maybe required; this will be determined by the Testing Center.
- At the time of testing, have the Center launch the appropriate exam engine.
- If you have taken a Certiport exam before, enter your Candidate Login information.
- If you have not taken an exam before, start here to register
- The testing center Administrator will either ask one of the following:
- Did you assign the voucher to you?
- Did you bring the voucher with you?
- The testing center Administrator will select the appropriate exams from the drop down box menu, please confirm.
- The testing center Administrator will enter their username and password.
- Upon exam completion, voucher is void.
Appeal Process
- The candidate has the right to disagree with the assessment decision made by the assessor.
- When giving feedback to the candidate, the assessor must check with the candidate if he agrees with the assessment outcome.
- If the candidate agrees with the assessment outcome, the assessor & the candidate must sign the Assessment Summary Record.
- If the candidate disagrees with the assessment outcome, he/she should not sign in the Assessment Summary Record.
- If the candidate intends to appeal the decision, he/she should first discuss the matter with the assessor/assessment manager.
- If the candidate is still not satisfied with the decision, the candidate must notify the assessor of the decision to appeal. The assessor will reflect the candidate’s intention in the Feedback Section of the Assessment Summary Record.
- The assessor will notify the assessor manager about the candidate’s intention to lodge an appeal.
- The candidate must lodge the appeal within 7 days, giving reasons for appeal
- The assessor can help the candidate with writing and lodging the appeal.
- he assessment manager will collect information from the candidate & assessor and give a final decision.
- A record of the appeal and any subsequent actions and findings will be made.
- An Assessment Appeal Panel will be formed to review and give a decision.
- The outcome of the appeal will be made known to the candidate within 2 weeks from the date the appeal was lodged.
- The decision of the Assessment Appeal Panel is final and no further appeal will be entertained.
- Please click the link below to fill up the Candidates Appeal Form.
Job Roles
- IT Security Specialist
- Network Administrator
- Cybersecurity Analyst
- Network Security Engineer
- Risk Management Consultant
- Systems Administrator
- Penetration Tester
- IT Infrastructure Specialist
- Security Compliance Officer
- Incident Response Analyst
- Information Security Consultant
- Cybersecurity Auditor
- SOC (Security Operations Center) Analyst
- Ethical Hacker
- Technical Support Engineer
- IT Project Manager (Cybersecurity)
- Vulnerability Analyst
- Wireless Network Engineer
- Security Operations Specialist
- Cloud Security Specialist
Trainers
Achim Ludwig Dietzenbach: Achim Ludwig Dietzenbach is a cybersecurity and infrastructure specialist with over 25 years of experience in IT management, network architecture, and information security. He has served in leadership and consulting roles across Europe and Asia, helping multinational organizations design secure network infrastructures and implement robust cybersecurity frameworks. Achim holds multiple global certifications in network security, project management, and cloud computing, and is widely recognized for his analytical and structured approach to risk mitigation and system hardening.
In this course, Achim brings his deep expertise in network defense, access control, and threat management to prepare learners for the evolving cybersecurity landscape. His sessions focus on real-world applications of network security principles, including vulnerability analysis, encryption protocols, and security policy design. Learners gain practical skills to identify, assess, and defend against cyber threats while maintaining compliance with industry standards.
Agus Salim: Agus Salim is an accomplished IT consultant and trainer with over 20 years of experience in network engineering, cybersecurity, and cloud infrastructure. He has led numerous enterprise projects involving system integration, penetration testing, and data protection, working with major organizations across Singapore and the Asia-Pacific region. A certified ACLP trainer, Agus is known for his ability to simplify complex technical concepts and translate them into practical learning experiences for IT professionals and aspiring cybersecurity specialists.
In the Pearson VUE Certified IT Specialist – Network Security course, Agus emphasizes practical, hands-on learning in network defense and incident response. His sessions cover intrusion detection, firewall configuration, and best practices for securing digital assets. Learners benefit from his real-world experience in implementing enterprise-grade security solutions that protect systems and data in both on-premise and cloud environments.
Danny Teo Yong Song: Danny Teo Yong Song is a highly experienced cybersecurity specialist and IT infrastructure engineer with more than two decades of expertise in network security, systems administration, and IT compliance. He has led major security transformation projects across industries such as telecommunications, finance, and education, focusing on designing secure, scalable, and high-performing network environments. Danny holds multiple industry certifications in network defense, risk management, and ethical hacking, complementing his extensive field experience with professional credibility.
In this course, Danny trains participants in the practical application of network security frameworks and tools to safeguard organizational assets. His sessions emphasize security architecture design, vulnerability assessment, and defensive network strategies. Learners gain comprehensive exposure to modern cybersecurity challenges and learn to apply systematic approaches to prevent, detect, and respond to threats effectively.
Truman Ng: Truman Ng is a senior IT and cloud systems professional with over 20 years of experience in networking, cybersecurity, and enterprise IT management. He holds multiple professional certifications, including PMP®, Huawei HCIE®, Cisco CCNP®, and AWS Certified Solutions Architect, and has delivered numerous corporate training programs in IT infrastructure and security. Truman’s expertise lies in building secure cloud architectures, deploying network automation, and integrating AI-driven security solutions for large-scale organizations.
In this course, Truman provides learners with a holistic understanding of network security architecture and implementation. His sessions focus on network segmentation, identity management, and security automation across hybrid environments. Participants gain practical knowledge on building and maintaining resilient, secure network infrastructures aligned with international security frameworks and certification standards.
Terence Ee: Terence Ee is a technology governance and cybersecurity leader with more than 25 years of experience in enterprise IT management, compliance, and information assurance. He has served as Chief Information Officer at the Supreme Court of Singapore and Vice President of Information Systems at Senoko Energy, where he was responsible for IT security policy development and digital transformation initiatives. Terence holds a Master of Science in Technology Management and is a certified ACLP trainer known for his strong emphasis on operational governance and cybersecurity risk management.
In this course, Terence equips learners with strategic and operational knowledge to manage cybersecurity frameworks effectively. His sessions cover governance models, compliance standards, and policy-driven approaches to network security. Participants learn to design and implement security strategies that align with business objectives while maintaining compliance with global standards such as ISO 27001 and NIST.








