Call +65 6100 0613 Email: enquiry@tertiaryinfotech.com

Instructor-led Classroom Adult Training in Singapore - Modular Fast Track Skill-Based Trainings

Basic Cyber Security Course

Cybersecurity refers to the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, related personnel, organizational infrastructure, applications, services, telecommunications systems and networks. It also includes transmitted and/or stored information in the cyber environment.

Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

Course Highlights:

  • Introduction to Information Security Concepts and Principles
  • Introduction to Cryptography
  • Physical and Environmental Security
  • Security Management
  • Communications and Network Security
  • Digital Forensics

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant Applications

Click the links below to apply. Note that you need to register the course first.

For Singaporeans: SkillsFuture Credit

For Company: SSG Training Grant

For NTUC Members: UTAP

Course Code: CRS-N-0042519

Course Booking

$298.00 (GST-exclusive)
$318.86(GST-inclusive)

Course Date

Course Time

* Required Fields

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Module 1: Introduction to Information Security Concepts and Principles

  • Definition of Security
  • Concept of Cyberspace
  • Concept of Cybercrime
  • Introduction to Cyber-security and its importance in today’s world.

Module 2: Introduction to Cryptography

  • Public Key Cryptosystem
  • Private Key Cryptosystem
  • Hashing Functions
  • Popular Algorithms

Module 3: Physical and Environmental Security

  • Identifying Assets, Threats and Vulnerabilities
  • Computer and Physical security
  • Firewalls
  • VPNs

Module 4: Security Management

  • Security Governance
  • Risk Management
  • Business continuity Management
  • Laws and Regulations

Module 5: Communications and Network Security

  • Types of Malware
  • Wireless/ Wired Network Attacks
  • IDS/IPS systems
  • Secure Network Protocols

Module 6: Digital Forensics

  • Introduction to Digital Forensics
  • Gathering and Analyzing Evidence

Course Admin

Nil

Who Should Attend

  • Cyber Security Staff
  • Network Engineers
  • IT Administrators

Trainers

Cyber SecurityTrainerTruman Ng graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philipines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.
As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.
Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.

Cyber Security TrainerTerence Ee has delivered IT training in Singapore and Myanmar. He has also facilitated faith formation courses for Christians in Singapore and Myanmar. As a trainer, his mission is to co-create insightful and actionable learning experiences with his learners.His current areas of focus include project management, information security management, quality management and office productivity applications.

Terence has more than 25 years of corporate IT experience. He has held senior management roles in the public and private sectors. He holds a Master of Science in Technology Management, a Bachelor of Science in Computer and Information Sciences, a Diploma in Family Education, and the Advanced Certificate in Training and Assessment (ACTA). Part of his spare time goes towards tutoring his children in their studies (while learning a thing or two along the way). He is also imparting to them the essential skills for thriving in a digital world.

Cyber Security TrainerYaw Hon Sing started his IT training career back in 1996 attached to New Horizons Computer Learning Centre (NHCLC) Malaysia. Achieved his Microsoft Certified Trainer (MCT) status back in 1997 delivering Microsoft backend server trainings (Windows NT/2000/2003 & Exchange Server & ISA Server) for the enterprise deployment. Moving forward he achieved vendor neutral certification COMPTIA A+, Network+, Security+ and Server+ to endorse his knowledge in the relevant fields. After years with server-based trainings, Yaw moved onto network /internetworking and network storage solutions with Cisco Systems & Netapp training & certification. He was a Cisco Systems & NetApp certified system instructor. He was certified in CCNA and CCNP majoring in routing & switching, Wireless LAN, Network Security, and Service Provider internetworking. At the recent training career, he diversified into Huawei Technologies’ carrier network solutions. Attaining his full range of Huawei Technologies professional certification tracks: Huawei Certified HCNA, HCNP and HCIE in Routing & Switching series. At present, he is continuously pursuing his security practitioner certification CISSP.

Cyber Security TrainerDr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Customer Reviews (80)

will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 11/24/2019)
Trainer is knowledgeable Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Having videos

Trainer is knowledgeable and able to make lesson interactive! Thanks:) , hope the school allow the trainer to amend the slides (Posted on 11/24/2019)
Might Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Hoping to have more hands on activity, and activities which we can do by ourself. Lots of theory which makes it dry but understood that it is the foundation of cyber security. (Posted on 10/10/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More workshop, provide business example (Posted on 10/10/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 9/12/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 9/12/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 8/15/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 7/29/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 7/29/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 7/28/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 6/23/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Provide step-by-step written procedures or videos on how to use the software
of the course so that participants can revise at home. (Posted on 6/23/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 6/22/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Have more hands on

Trainer is very nice and very knowledgeable. He makes lesson interesting and i definitely learned more about cyber security from him (Posted on 6/14/2019)
Might Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 6/14/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Need to have more hands-on exercises. (Posted on 3/31/2019)
Might Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
It was okay

The west sun was really bad after 4pm, some binds or curtains will help (Posted on 1/11/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 1/11/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 1/11/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More time can be spent on lab (Posted on 1/11/2019)

Items 1 to 20 of 80 total

per page
Page:
  1. 1
  2. 2
  3. 3
  4. 4

Write Your Own Review

You're reviewing: Basic Cyber Security Course

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

Tags

Use spaces to separate Subjects. Use single quotes (') for phrases.

You May Be Interested In These Courses

Machine Learning for Network Security

Machine Learning for Network Security

14 Review(s)
$298.00 (GST-exclusive)
$318.86(GST-inclusive)