NTUC LearningHub

Course Overview

 

This 2-day course offers a comprehensive review of information systems security concepts, industry best practices, and essential terminology. It introduces terminologies and concepts commonly used by cybersecurity practitioners, providing a strong foundation for further learning and specialization in this dynamic field.

 

Course Objectives

 

Upon successful completion of this course, participants will be well-prepared to sit for an external exam by ISC2, with two exam attempts included. The course covers the following five domains of the entry-level cybersecurity certification exam:

  • Security Principles
  • Incident Response, Business Continuity, and Disaster Recovery Concepts
  • Access Control Concepts
  • Network Security
  • Security Operations

 

Pre-requisites

 

Learners are assumed to have no specific prerequisites for this course. It's open to individuals with a basic understanding of Information Technology (IT), making it accessible to a wide range of learners.

But it is recommended that participants know:

  • Simple typing using the keyboard
  • Navigating using the mouse
  • Managing files and creating folders
  • Hardware & Software
    • This course will be conducted as a Virtual Live Class (VLC) via Zoom platform.
    • Participants must own a Zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. Download from zoom.us/download.

System Requirement

Must-have:
Please ensure that your computer or laptop meets the following requirements.

  • Operating system: Windows 10 or MacOS (64 bit or above)
  • Processor/CPU: 1.8 GHz, 2-core Intel Core i3 or higher
  • Minimum 20 GB hard disk space
  • Minimum 8 GB RAM
  • Webcam (camera must be turned on for the duration of the class)
  • Microphone
  • Internet Connection: Wired or Wireless broadband
  • Latest version of Zoom software to be installed on computer or laptop prior to the class.

Good-to-have:

  • Wired internet connection
    Wired internet will provide you with stable and reliable connection.
  • Dual monitors
    Using a dual monitor setup will undoubtedly improve your training experience, enabling you to simultaneously participate in hands-on exercises and maintain engagement with your instructor.

Not recommended:
Using tablets are not recommended due to their smaller screen size, which could cause eye strain and discomfort over the course of the program's duration.

 

Course Outline

 

Domain 1: Security Principles

 

  • Covers core security concepts such as confidentiality, integrity, availability, authentication, non-repudiation, and privacy.
  • Explores the risk management process, risk identification, assessment, and treatment.
  • Examines various security controls, including technical, administrative, and physical controls.
  • Introduces the (ISC)2 Code of Ethics, emphasizing professional code of conduct.
  • Dives into governance processes, including policies, procedures, standards, regulations, and laws.

 

Domain 2: Business Continuity (BC), Disaster Recovery (DR), & Incident Response Concepts

 

  • Explores business continuity (BC) concepts, its purpose, importance, and components.
  • Delves into disaster recovery (DR) concepts, including purpose, importance, and components.
  • Examines incident response, emphasizing purpose, importance, and key components.
  • Domain 3: Access Control Concepts

 

  • Understands physical access controls, including physical security controls, monitoring, and authorized vs. unauthorized personnel.
  • Explores logical access controls, covering the principle of least privilege, segregation of duties, DAC, MAC, and RBAC.

 

Domain 4: Network Security

 

  • Covers computer networking, including networks, ports, and applications.
  • Explores network (cyber) threats and attacks, types of threats, identification, and prevention.
  • Understands network security infrastructure, including on-premises, design, and cloud solutions.

 

Domain 5: Security Operations

 

  • Covers data security, including encryption, data handling, and logging and monitoring security events.
  • Explores system hardening, configuration management, and best practice security policies.
  • Provides insights into security awareness training, its purpose, importance, and key concepts.

 

Certificate Obtained and Conferred by

 

  • Upon meeting at least 75% attendance and passing the assessment(s), Statement of Attainment (SOAs) will be issued by SkillsFuture Singapore (SSG) to certify that the participant has achieved the following Competency Standard(s): Cyber Risk Management: ICT-SNA-4007-1.1
  • Upon meeting the attendance and assessment(s) criteria, participants will be awarded with a digital Certificate of Completion from NTUC LearningHub.
Categories
More Information
  • NTUC LearningHub
  • No comments yet.
  • Add a review
    error: Content is protected !!