5 days
40 hours
1. Comparing Security Roles and Security Controls
2..Explaining Threat Actors and Threat Intelligence
3. Performing Security Assessments
4. Identifying Social Engineering and Malware
5. Basic Cryptographic Concepts
6. Implementing Public Key Infrastructure
7. Implementing Authentication Controls
8. Implementing Identity and Account Management Controls
9. Implementing Secure Network Designs
10. Implementing Network Security Appliances
11. Implementing Secure Network Protocols
12. Implementing Host-Security Solutions
13. Implementing Secure Mobile Solutions
14. Summarizing Secure Application Concepts
15. Implementing Secure Cloud Solutions
16. Explaining Data Privacy and Protection Concepts
17. Performing Incident Response
18. Explaining Digital Forensics
19. Summarizing Risk Management Concepts
20. Implementing Cybersecurity Resilience
21. Explaining Physical Security
Upon the completion of the course, the learner would be able to:
1. Compare security roles and security controls.
2. Differentiate the types and capabilities of threat actors and threat intelligence.
3. Assess organizational security with network reconnaissance tools.
4. Analyse social engineering techniques and indicators of malware-based attacks.
5. Choose appropriate cryptographic technologies to meet organizational security goal.
6. Implement public key infrastructure (PKI) management.
7. Implement authentication technologies.
8. Implement identity and account management controls.
9. Implement secure network designs.
10. Implement network security appliances.
11. Implement secure network protocols.
12. Implement host-security solutions.
13. Implement secure mobile device connections.
14. Implement secure script environments.
15. Apply cloud security solutions.
16. Assess privacy factors when collecting and storing data.
17. Perform incident response according to the best practices in the industry.
18. Perform digital forensics to investigate unauthorised access incidents according to established procedures.
19. Implement risk management concepts to mitigate possible threats and establish the right corrective measures to avoid losses and liabilities.
20. Implement cybersecurity resilience.
21. Analyse physical security to build resilient against man-made and natural disasters.
Course Fee Payable | ||
---|---|---|
Original Fee | Before GST | With GST (9%) |
Course Fee | $2,500.00 | $2,725.00 |
Individual Pricing (Fee payable to Training Provider) | Before GST | With GST (9%) |
SkillsFuture >=21 years old | $1,250.00 | $1,475.00 |
Midcareer | $750.00 | $975.00 |
Corporate Pricing (Fee payable to Training Provider) | ||
SME | Before GST | With GST (9%) |
SME | $750.00 | $975.00 |
SME (MIdcareer) | $750.00 | $975.00 |
Non-SME | Before GST | With GST (9%) |
Non-SME | $1,250.00 | $1,475.00 |
Non-SME (MIdcareer) | $750.00 | $975.00 |