Call +65 6100 0613 Email: enquiry@tertiaryinfotech.com

Instructor-led Classroom Adult Training in Singapore - Modular Fast Track Skill-Based Trainings

Basic Cyber Security Course

Cyber attack is one of the biggest risk to organizations as organizations  increasingly pursue digitization to drive efficiency, reduce costs and build data-driven businesses, they simultaneously move into the “target zone” of cyber attacks

Cyber Security is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

This basic course on Cyber Security will increase the awareness of various cyber security threats and the best practices to protect from cyber attacks and online scams.

Course Highlights:

  • Cyber Security Threats such as Malware, Phishing, Network Security
  • Protection Against Cyber Security Threats
  • Cryptography
  • Digital Forensics

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant Applications

Click the links below to apply. Note that you need to register the course first.

For Singaporeans: SkillsFuture Credit

For Company: SSG Training Grant

For NTUC Members: UTAP

Course Code: CRS-N-0042519

Course Booking

$298.00 (GST-exclusive)
$318.86(GST-inclusive)

Course Date

Course Time

* Required Fields

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Topic 1 - Cyber Security Threats

  • Introduction to Cyber Security
  • Computer Viruses and Worms
  • Trojan Horse and Spyware
  • Hoaxes and Phishing Scams
  • Mobile and Wireless Security Threats
  • Remote Access Threats
  • Social Media and Social Engineering Threats
  • Online Scams

Topic 2 - Protection Against Cyber Security Threats

  • User ID and Passwords Protection
  • Home Computer and Information Protection with Firewalls
  • Best Practices Against Malware, Computer Viruses and Worms
  • Trojans and Spyware Protection
  • Protection from Hoaxes and Phishing
  • Mobile Devices and Wireless Protection
  • Remote Access Protection with SSL
  • Social Media and Online Scams Protection

Topic 3 - Security Management for Businesses

  • Identify Organizations Assets from Cyber Attacks
  • Secure Personal Data
  • Secure Sockets Layer
  • Security Governance
  • Business Continuity Planning
  • IDS/IPS Systems & Penetration Testing

Topic 4 - Introduction to Cryptography

  • What is Cryptography
  • Types of Cryptography
  • Secret Key Cryptography
  • Public Key Cryptography
  • Hashing Functions
  • Digital Signature and Certificate

Topic 5 - Introduction to Digital Forensics

  • What is Digital Forensics
  • Gathering Evidence
  • Analyzing Evidence

Course Admin

Nil

Who Should Attend

  • Cyber Security Staff
  • Network Engineers
  • IT Administrators

Trainers

Cyber SecurityTrainerTruman Ng graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philipines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.
As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.
Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.

Cyber Security TrainerTerence Ee has delivered IT training in Singapore and Myanmar. He has also facilitated faith formation courses for Christians in Singapore and Myanmar. As a trainer, his mission is to co-create insightful and actionable learning experiences with his learners.His current areas of focus include project management, information security management, quality management and office productivity applications.

Terence has more than 25 years of corporate IT experience. He has held senior management roles in the public and private sectors. He holds a Master of Science in Technology Management, a Bachelor of Science in Computer and Information Sciences, a Diploma in Family Education, and the Advanced Certificate in Training and Assessment (ACTA). Part of his spare time goes towards tutoring his children in their studies (while learning a thing or two along the way). He is also imparting to them the essential skills for thriving in a digital world.

Cyber Security TrainerYaw Hon Sing started his IT training career back in 1996 attached to New Horizons Computer Learning Centre (NHCLC) Malaysia. Achieved his Microsoft Certified Trainer (MCT) status back in 1997 delivering Microsoft backend server trainings (Windows NT/2000/2003 & Exchange Server & ISA Server) for the enterprise deployment. Moving forward he achieved vendor neutral certification COMPTIA A+, Network+, Security+ and Server+ to endorse his knowledge in the relevant fields. After years with server-based trainings, Yaw moved onto network /internetworking and network storage solutions with Cisco Systems & Netapp training & certification. He was a Cisco Systems & NetApp certified system instructor. He was certified in CCNA and CCNP majoring in routing & switching, Wireless LAN, Network Security, and Service Provider internetworking. At the recent training career, he diversified into Huawei Technologies’ carrier network solutions. Attaining his full range of Huawei Technologies professional certification tracks: Huawei Certified HCNA, HCNP and HCIE in Routing & Switching series. At present, he is continuously pursuing his security practitioner certification CISSP.

Cyber Security TrainerSim Cher Khern (Sim CK) has over 20 years of working experience in a number of product development lifecycles, involving embedded firmware and FPGA programming, as well as high speed embedded system hardware design and PCB layout, where EMI/EMC considerations are critical for product delivery. He has also gained much project management experience and knowledge working with various operating systems (Windows, Linux, RTOS), networking technologies and web interface while developing the products.

Being a technology enthusiast, he keeps up with emerging technologies and likes to get his hands dirty with projects. In the process, he has picked up knowledge in full stack web development and its deployment to the cloud platform. He has also acquired knowledge on Cybersecurity threats, Network Defense and Ethical Hacking.

CK holds a MSc in Embedded Systems from Nanyang Technological University (NTU), as well as Cybersecurity certifications from EC-Council (ECSS, CND, CEH and CHFI).

His current area of interests include Cybersecurity, Embedded system hardware and firmware, IoT, Web technologies and Machine learning. They are intertwined in today’s business systems setup.

Customer Reviews (91)

will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 4/5/2020)
wil recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 3/12/2020)
might recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 2/13/2020)
might recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 2/13/2020)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More practicals

Provide a roadmap how we can progress in the area of cyber security (Posted on 2/2/2020)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
:) (Posted on 2/2/2020)
very comprehensive overview of Basic Cybersecurity. Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Perhaps more case studies

Unexpectedly very comprehensive overview of Basic Cybersecurity. (Posted on 1/16/2020)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 1/4/2020)
Very Appreciate to have a nice lecturer like him Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
He very acknowledgeable already (Posted on 12/14/2019)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
very good (Posted on 12/14/2019)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 12/12/2019)
will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 11/24/2019)
Trainer is knowledgeable Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Having videos

Trainer is knowledgeable and able to make lesson interactive! Thanks:) , hope the school allow the trainer to amend the slides (Posted on 11/24/2019)
Might Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Hoping to have more hands on activity, and activities which we can do by ourself. Lots of theory which makes it dry but understood that it is the foundation of cyber security. (Posted on 10/10/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More workshop, provide business example (Posted on 10/10/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 9/12/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 9/12/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 8/15/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 7/29/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 7/29/2019)

Items 1 to 20 of 91 total

per page
Page:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

Write Your Own Review

You're reviewing: Basic Cyber Security Course

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

Tags

Use spaces to separate Subjects. Use single quotes (') for phrases.

You May Be Interested In These Courses

Next generation Networks, IMS and VoLTE

Next generation Networks, IMS and VoLTE

$498.00 (GST-exclusive)
$532.86(GST-inclusive)
Python Network Programming Training

Python Network Programming Training

6 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Machine Learning for Network Security

Machine Learning for Network Security

15 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Advanced Cyber Security Course

Advanced Cyber Security Course

16 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
IPv4 Network Administrator Training

IPv4 Network Administrator Training

15 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Next Generation IPv6 Network Administrator Training

Next Generation IPv6 Network Administrator Training

5 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Generative Adversarial Networks (GAN) Course for Beginners

Generative Adversarial Networks (GAN) Course for Beginners

$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Enterprise Local Area Network (LAN) Essentials Training

Enterprise Local Area Network (LAN) Essentials Training

22 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Building a Scalable Virtual Private Network (VPN)

Building a Scalable Virtual Private Network (VPN)

13 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Software Defined Networking (SDN) Training

Software Defined Networking (SDN) Training

4 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Advanced Software Defined Networking (SDN) Training

Advanced Software Defined Networking (SDN) Training

1 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Huawei Certified Network Associate (HCNA) Certification Prep

Huawei Certified Network Associate (HCNA) Certification Prep

3 Review(s)
$598.00 (GST-exclusive)
$639.86(GST-inclusive)
Cisco Certified Network Associate (CCNA) Prep

Cisco Certified Network Associate (CCNA) Prep

$1,800.00 (GST-exclusive)
$1,926.00(GST-inclusive)
Python Network Automation Training

Python Network Automation Training

2 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Ansible for Networking

Ansible for Networking

1 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)
Cyber Security Awareness Course for Personal and Businesses

Cyber Security Awareness Course for Personal and Businesses

$350.00 (GST-exclusive)
$374.50(GST-inclusive)