Cyber Security Foundation Course in Singapore
Our 2 days cyber security foundation course equips you with knowledge about various modern digital security threats and provides you with insight about actions to mitigate these threats. The course is focused on non-network technical staff and aimed at people from business and IT. The course provides various options available to deal with myriads of threats including open source and commercial tools.
Cyber security is a vast field and this course helps participants get an understanding of the overall landscape and also to narrow down on areas where they should be focusing on in the near term. Protection of critical infrastructure from data breaches is generally known as cyber security.
Enhanced Funding Support for Professionals aged 40 and above and SMEs
Professionals aged 40 and above (i.e. self-sponsored individuals) and SMEs who are sponsoring their employees for training (i.e. organisation-sponsored trainees) will be entitled to CITREP enhanced funding support of up to 90% of the nett payable course and certification fees. This is applicable for Singapore Citizens and Permanent Residents (PR’s). Please find FY17 CITREP+ funding support details as per following:
|Organisation- sponsored||Non SMEs||course + exam Up to 70% of the nett payable course and certification fees, capped at $3000 per trainee||exam only Up to 70% of the nett payable certification fees, capped at $500 per trainee||Singapore Citizen and Permanent Residents (PRs)|
|SMEs||Up to 90% of the nett payable course and certification fees, capped at $3000 per trainee||Up to 70% of the nett payable certification fees, capped at $500 per trainee|
|Self-Sponsored||Professionals (Citizens and PRs)||Up to 70% of the nett payable course and certification fees, capped at $3000 per trainee||Up to 70% of the nett payable certification fees, capped at $500 per trainee||Singapore Citizen and Permanent Residents (PRs)|
|Professionals (Citizens 40 years old and above)* as of 1 Jan of the current year||Up to 90% of the nett payable course and certification fees, capped at $3000 per trainee||Up to 70% of the nett payable certification fees, capped at $500 per trainee|
|Students (Citizens) and/or Full-Time National Service (NSF)||Up to 100% of the nett payable course and certification fees, capped at $2500 per trainee||Up to 100% of the nett payable certification fees, capped at $500 per trainee|
Cyber Security Foundation Course
Our Cyber security foundation course addresses common breaches in an enterprise and steps to prevent breaches.
A typical breach remains undiscovered for over 200 days. What does that say about your current defense strategy? More likely that the attackers may be using completely different methods than what you are used to. This critical gap between current enterprise defense strategy and the evolution in adversary tactics is responsible for a growing number of successful intrusions
Let’s assume that your organization has invested significant amount of money in Malware detection. A malware is a piece of software that has been downloaded in your network probably because a user clicked on a link. The piece of software could be sending out critical information periodically. A proactive security analyst or your malware detection software may be able to identify and eliminate the presence of this malware. However, research suggests that Malware is responsible for only 40% of breaches, and external attackers are increasingly leveraging malware-free intrusion approaches to blend in and “fly under the radar” by assuming insider credentials within victim organizations.
Emulating legitimate users
The idea behind a malware-free intrusion is very simple—malware, even if it’s unknown to antivirus, is still very noisy. The obvious answer is that you break in without using malware, emulating legitimate insiders. Insider detection has always been one of the hardest problems to solve in cyber security because the attacker, by definition, looks like someone who is supposed to be inside your network and is doing things that are largely legitimate and expected. Thus, wherever the adversaries can emulate this behavior, they are quite successful in achieving their objective of stealth.
The objective of this course is to apprise the participant of the various components that have enabled the services we use, as well as to explain how these very same tools have simultaneously been diverted for malicious purposes.
How does Phishing work?
Cyber Security Foundation
- Course Name: Cyber Security Foundation
- Duration:3 days classroom + online
- Refreshments: Lunch and Snacks
- Delivery Mode: Instructor Led
- Prior Coding experience: Not required
- Course Price: S$ 2255 (Including tax and exam fees)
- Approx fees after funding (Above 40 yrs): S$ 350
- Approx fees after funding (Less than 40 yrs): S$750
- Minimum requirements:none
- Pass Guarantee:Yes. Check for conditions
- Pass Rate: 100% last 5 months. 98% past 2 years
- Funding: 70% – 90% funding for course and exam fees (Singapore citizens and PRs)
Cyber Security Foundation
Cyber Security Lifecycle
We examine the components of technology that are being diverted. We start with application code and how it can best be protected with isolation approaches. We look at the general principles of a secure system and then how hackers approach such systems. We follow with an examination of the various forms of infection, including viruses, worms, bots, and Trojans. We then examine encryption, using the Rivest–Shamir–Adelman (RSA) algorithm as our working example. Internet Protocol Security (IPSec)—which is at the heart of the secure virtual private network (VPN) connectivity widely employed by Singapore businesses—is discussed, along with the contrasting use by hackers of their own undetectable VPN, example, the Terracotta VPN, which makes the hackers’ activity appear to be normal traffic entering and traversing “protected” systems.
We will examine web applications, complete web systems, domain name systems (DNSs), and the general structure of the public Internet. And, given that the world has rapidly migrated into a totally mobile, instantaneous communication and download, we examine the present vulnerability of the ubiquitous “smart” devices.
Cyber Security Foundation course outline
|9:30 – 10:00||Defense-in- depth||Exercise||Defense in depth is an information assurance strategy in which multiple layers of defense are placed throughout an IT system. Defense in Case study depth addresses security vulnerabilities in personnel, technology, and operations for the duration of the system’s life cycle.||Case study|
|10:00 – 10:30||Cyber Security Functions||Theory||Collectively, these roles allow for both proactive and reactive security management. Proactive security is much more beneficial and less expensive than reactive measures are.||Modern Organizational Structure|
|10:30 – 10:45 Tea break|
|10:45 – 11:30||Cyber Security Policy||Exercise||Strategically, the cybersecurity policy must support the guiding principles and goals of the organization. Tactically, it must be relevant to those who must comply. Introducing a policy to a group of people who find nothing recognizable in relation to their everyday experience is a recipe for disaster.||Develop at least 3 cyber security policies|
|11:30 – 12:30||
Access Control Programme Management
Least Privilege and Separation of Duties
|Discussion||What could be more essential to security than managing access to information and information systems? The primary objective of access controls is to protect information and information systems from unauthorized access (confidentiality), modification (integrity), or disruption (availability).||Case study|
|12:30 – 13:30 Lunch|
|13:30 – 14:30||
Infrastrcuture Access Controls
|Exercise||A network infrastructure is defined as an interconnected group of hosts and devices. The infrastructure can be confined to one location or, as often is the case, widely distributed, including branch locations and home offices.||Layered Security|
|14:30 – 15:15||User AccessControls||Discussion||The objective of user access controls is to ensure that authorized users are able to access information and resources while unauthorized users are prevented from access to the same. User access control and management is an enterprise-wide security task.||Identity and Access (IAM)|
|15:15 -15:30 Tea break|
|15:30 – 16:30||
Cyber Security Risk Management
Probability and Impact Assessment
|Exercise||Effective cybersecurity management relies on accurate capture and escalation of priority risks. If significant issues or problems are not consistently captured at an individual level and appropriately escalated when necessary, the executive management team will operate in an uninformed environment, with no sense of the true gaps and their comparative priorities.||Risk Register|
|16:30 – 17:30||Developing Cyber Risk Counter measures||Theory||Risk acceptance indicates that the organization is willing to accept the level of risk associated with a given activity or process. Generally, but not always, this means that the outcome of the risk assessment is within tolerance. There may be times when the risk level is not within tolerance, but the organization will still choose to accept the risk because all other alternatives are unacceptable.||Update Risk Register|
|9:00 – 10:00||Cyber Security Organizational Framework||Theory||Cybersecurity frameworks tend to break the steps involved in building an effective cybersecurity system into five or more stages. 1. Identify 2.Protect, 3.Detect, 4.Respond, 5.Recover||Techniques for rolling cyber security strategy|
|10:00 – 10:30||Information Classification||Exercise||Each group information is not of equal value. If we want to get our cybersecurity posture correct, we need to create categories that help us to differentiate the value and danger inherent in each major set of information we have.||Confidentiality Integrity Availability|
|10:30 – 10:45 Tea break|
|10:45 – 11:30||Endpoint Detection and Response Solutions||Demo||Endpoint Detection and Response solutions (EDRs) are new security solutions in the cybersecurity market that are answering the need for continuous detection and gation of security issues and suspous activities in endpoints.||Provide demo|
|11:30 – 12:30||Cryptography and the RSA Algorithm||Theory||Credit card fraud describes cases in which a threat actor gains unauthorized access to a credit card in order to obtain money or property. Threat actors primarily use unsecured websites to obtain the required information.||Discuss Threats|
|12:30 – 13:30 Lunch|
|13:30 – 14:30||Advanced Persistence Threats (APTs)||Discussion||An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders establishes an illicit long-term presence on a network in order to mine highly sensitive data. The targets of these assaults, which are very carefully chosen and researched typically include large enterprises or governmental networks.||Examples of APTs|
|14:30 – 15:15||Denial of Service (DoS)||Exercise||A denial of service (DoS) attack is often used to hide a bigger financial fraud activity. It is an attempt by the threat actor to keep the IT and security department busy while they are performing financial fraud.||Case Study|
|15:15 -15:30 Tea break|
|15:30 – 17:00||Malwares||Discussion||Malicious software – commonly referred to as malware – is used by threat actors to perform malicious activities on a host system. These malicious activities include compromising the corporate network, identity theft and data exfiltration.||Case studies of Malwares|
|17:00 – 17:30||Applying Cyber Security Best Practices – Case studies of Malwares||Project||Amazon Web Services – Identity and Access Management||Project|
|9:00 – 10:00||Delegate Access Across AWS Accounts Using IAM Roles||Exercise||This module teaches you how to use a role to delegate access to resources that are in different AWS accounts that you own (Production and Development). You share resources in one account with users in a different account. By setting up cross-account access in this way, you don’t need to create individual IAM users in each account.||AWS IAM|
|10:00 – 10:45||Create and Attach Your First Customer Managed Policy||Exercise||In this module, you use the AWS Management Console to create a customer managed policy and then attach that policy to an IAM user in your AWS account. The policy you create allows an IAM test user to sign in directly to the AWS Management Console with read-only permissions.||Managed Policy|
|10:45 – 11:00 Tea break|
|11:00 – 12:00||Configure MFA||Exercise||You can enable your users to self-manage their own multi-factor authentication (MFA) devices and credentials on the My Security Credentials page. You can use the AWS Management Console to configure credentials (access keys, passwords, signing certificates, and SSH public keys) and MFA devices for your users.||multi-factor authentication|
|12:00 – 13:00 Lunch|
|13:00 – 14:30||Inline Policies||Exercise||Managed Policies and Inline Policies When you need to set the permissions for an identity in IAM, you must decide whether to use an AWS managed policy, a customer managed policy, or an inline policy. The following sections provide more information about each of the types of identity-based policies and when to use them.||Inline Policies|
|14:30 -14:45 Tea break|
|14:45 – 16:00||Troubleshooting Amazon EC2 IAM Issues||Exercise||If you created a role by using the IAM CLI or API, verify that you created an instance profile and added the role to that instance profile. Also, if you name your role and instance profile differently, you won’t see the correct role name in the list of IAM roles in the Amazon EC2 console.||EC2 IAM|
|16:00 – 17:30||Anonymous Access to an Amazon S3 Bucket||Exercise||You use an Amazon S3 bucket policy that specifies a wildcard (*) in the principal element, which means anyone can access the bucket. With anonymous access, anyone (including users without an AWS account) will be able to access the bucket.||S3 IAM|
|17:30 -18:30 Exam|
AI and Machine Learning Algorithms in Cyber Security
Big data and cyber security complement each other and play a vital role in each other’s relevance and utility. As more and more devices are getting digitally connected, they are generating more data (volume); the data generated by these connected devices needs to be processed in neartime (velocity) and it follows a variety of forms such as structured, unstructured, and semi-structured (variety). These three Vs constitute Big Data in general which lead to Value as fourth V. The cyber security systems require that the Big Data is processed in its entirety in order to provide actionable insights into the security infrastructure of an enterprise and to help in detecting anomalies and preventing attacks on an organization’s computing assets.
Rules-based alerts and monitoring systems are not sufficient to deal with the cyber security attacks and for protecting CIs. The machine learning models need to be trained based on the historical data (supervised learning) in order to predict the occurrence of malicious activities in advance or in near real time when the intrusion is in progress. The machine learning and AI transitions the cyber security systems to predictive analysis which helps in preventing the attacks.
Machine learning to deal with Phishing
These attacks can be prevented by using machine learning algorithms. The user’s email headers and content can be used as the training data and can train the model to understand the common patterns. This learning can help in detecting the phishing attempt based on the behavioral trends in the historical emails.
Machine learning to deal with Lateral Movement
Machine learning algorithms can be trained with lateral movements to trace data and detect the suspicious user movements. If these movements are tracked by streaming the live network logs through the processing systems, the intrusion can potentially be detected in near real time.
Machine learning to deal with Injection attacks
The malicious code is supplied into the target application via form fields or other input mechanisms. SQL injection is a special case of injection attack where the SQL statements are pushed into the system via field inputs and the SQL commands can get the dump of the sensitive data outside of the network. The attacker can get access to the authentication details if they reside in the database. Despite all the field validations and filtering at the web server layer, the injection attacks are frequent and one of the leading types of attack. The database logs can be used to train machine learning models based on statistical user profiles which can be built over a period of time as the users interacts with the databases.
There is obvious visible information, which one is conscious of and there is information that comes off you. Example, from your phone one can determine which website you visited, who you called, who your friends are, what apps you use. Data science takes it further to reveal how close you are to someone, are you an introvert or an extrovert, when during the day are you most productive, how often do you crave for ice cream, what genre of movies you like, what aspects of social issues interest you the most etc.,
With the possibility of adding sensors to everything, now there is deeper insight into what is going on inside your body. Spending 10 minutes with a doctor who gives you a diagnosis based on stated or observed symptom is less useful than a system that has data about everything going on inside your body. Your health diagnosis is likely to be more accurate with analysis of data collected through devices such as fitbits and implantables.
The amount of data available with wearables and other devices provides for rich insight about how you live, work with others and have fun.
Big Data and analytics is made possible due to the digital breadcrumbs we leave. Digital breadcrumbs include things like location data, browsing habits, information from health apps, credit card transactions etc.,
The data lets us create mathematical models of how people interact, what motivates us, what influences our decision making process and how we learn from each other.
Big Data versus Information
One can think of Big Data as the raw data available in sufficient volume, variety and velocity. Volumes here refer to terabytes of data. Variety refers to the different dimensions of data. Velocity refers to the rate of change.
A bank can use credit card information to develop models that’s more predictive about future credit behavior. This provides better financial access. What you purchased, frequency of purchase, how often do you pay back, where do you spend money are better predictors of payment credibility than a simple one dimensional credit score.
This course also covers the basics of encryption and cryptography for protecting data and services
Encryption has come as a welcome solution to securing data and communication in organizations and also for individuals. It has been accepted as the most trusted way of securing data against the threats that are in existence today. Cryptography, which is the practice of using encryption and decryption, is often one of the last security measures that organizations employ just in case hackers are able to breach through other layers of security. Encryption, which is the process of converting data from plain text to cipher text, is one of the elements used to add reliability and non-repudiation in communication.
This course will take u through the detailed version of encryption from its early methods and gives us a brief idea of how far it has evolved, covering various techniques along with the challenges.
Frequently Asked Questions
Cyber Security is a vast field. In this foundation class, we will be covering the theoretical of attacks and counter measures. As such, we don’t require participants to have a background in coding or system administration.
No. The optional technical modules don’t have additional costs. However, to work through the optional technical modules, you need to have a background in programming.
You don’t need to be from IT to avail funding. For CITREP+ funding, you must be a Singapore citizen or Permanent Residents (PR’s). CITREP+ funding is based on a claim that you will make after passing the exam. This means you will pay us the full course fees and IMDA will reimburse 70% or 90% of the course and exam fees after you make a claim. We will assist you with the claim process.
ITPACS Certified Associate in Cyber Security – Attacks and Counter measures basics
Yes, the funding applies to all Singapore citizens and Permanent Residents (PR’s) irrespective of the industry.
The course does not have an academic minimum requirement. However, you need to be familiar with basic technology such as client-server.
The difficulty level of the concepts depends on your background. If your job involves IT, you are likely to find the course easy.
No. This is an introductory course. Cyber security is an extensive field and can take years to be an expert. Many experts specialize in one particular domain. This course provides you with an overview of what is involved in Cyber security.
The course covers the theoretical aspects of a Cyber Security Solution. The technical aspects of building a Cyber security solution is not covered because there are so many different architectures and technologies.
Most of the participants are managers in companies across different industries who are evaluating opportunities for improving cyber security. These managers are either exploring the application of solutions within their own domain or are already working with cyber security experts. Upon completion of the course, these managers are in a better position to drive cyber security projects in their context. Most of these managers represent the business side.
Cyber Security Foundation Course: We offer a pass guarantee for this exam. In case a participant fails the exam, they have two more attempts to clear the exam at no additional cost. The objective of the foundation course is to facilitate entry into the Cyber Security field for people with no IT background. As such, the exam itself is not difficult. The exam does not have any coding. In the unlikely scenario wherein the participant fails the third time, we will refund the full course fees.
The funding process is done online. After course completion, you will upload some documents such as Invoice, receipt etc., on to IMDA’s system. The funding is a reimbursement made to you by IMDA after course completion. The reimbursement takes 2-4 weeks. This means you have to pay the full amount first and then get the reimbursement. We will support you for through the administrative process for submitting your claim.
Yes. If you are currently in-between jobs, we provide additional discount on the course fees. During registration, let us know about your situation and we will accommodate additional discount.
Recent studies in neuroscience demonstrate that we can change our brain just by thinking. Our concept of “self” is etched in the living latticework of our 100 billion brain cells and their connections. Picking up new skills is about making new connections in the mind. By the time you complete the course, you have changed your brain permanently. If you learned even one bit of information, tiny brain cells have made new connections between them, and who you are is altered. The act of mental stimulation through learning is a powerful way you can grow and mold new circuits in your brain. Growing new circuits is vital to growth and state of being.
There is a small chance that you may be in what a growing body of knowledge point to as “survival mode”. When we live in survival, we limit our growth, because the chemicals of stress will always drive our big-thinking brain to act equal to its chemical substrates. Chronic long-term stress weakens our bodies. We choose to remain in the same circumstances because we have become addicted to the emotional state they produce and the chemicals that arouse that state of being. Far too many of us remain in situations that make us unhappy, feeling as if we have no choice but to be in stress. We choose to live stuck in a particular mindset and attitude, partly because of genetics and partly because a portion of the brain (a portion that has become hardwired by our repeated thoughts and reactions) limits our vision of what’s possible.
We can change (and thus, evolve) our brain, so that we no longer fall into those repetitive, habitual, and unhealthy reactions that are produced as a result of our genetic inheritance and our past experiences. Scientists call this neuroplasticity—the ability to rewire and create new neural circuits at any age—to make substantial changes in the quality of your life.
Learning a new skill allows new experiences and in turn fires new circuits related to curiosity, creativity etc,
The brain is structured, both macroscopically and microscopically, to absorb and engage novel information, and then store it as routine. When we no longer learn new things or we stop changing old habits, we are left only with living in routine. When we stop upgrading the brain with new information, it becomes hardwired, riddled with automatic programs of behavior that no longer support a healthy state of being. If you are not learning anything new, your brain is constantly firing the same old neurons related to negative states such anxiety, stress and worry. We are marvels of flexibility, adaptability, and a neuroplasticity that allows us to reformulate and repattern our neural connections and produce the kinds of behaviors that we want.
Research is beginning to verify that the brain is not as hardwired as we once thought. We now know that any of us, at any age, can gain new knowledge, process it in the brain, and formulate new thoughts, and that this process will leave new footprints in the brain—that is, new synaptic connections develop. That’s what learning is. In addition to knowledge, the brain also records every new experience. When we experience something, our sensory pathways transmit enormous amounts of information to the brain regarding what we are seeing, smelling, tasting, hearing, and feeling. In response, neurons in the brain organize themselves into networks of connections that reflect the experience. feelings. Every new occurrence produces a feeling, and our feelings help us remember an experience. The process of forming memories is what sustains those new neural connections on a more long-term basis. Memory, then, is simply a process of maintaining new synaptic connections that we form via learning irrespective of age.
The reality is that if you are not making new neural connections, the brain cells are decaying or firing the same old routine patterns. This leads to physically aging faster than usual and other health problems.
Contrary to the myth of the hardwired brain, we now realize that the brain changes in response to every experience, every new thought, and every new thing we learn. This is called plasticity. Researchers are compiling evidence that the brain has the potential to be moldable and pliable at any age.
AI has two sides. Research and application. Research is about in depth knowledge of how something works. You could spend years in research to find out how electricity and waves works and finally create a microwave. Consumers then use these microwaves to cook various food. A consumer doesn’t need to have extensive knowledge on the inner working of a microwave. They can get creative about the end result of using the microwave. This is the application side of things. Currently, as a result of extensive research, there is plethora of microwaves in the market. Attending a university courses is like creating another microwave, reinventing the wheel. You would rather focus your effort on the application side of AI. Take the already built algorithms and use it for your use cases. The way we teach our course is to apply these algorithms to solves business problems rather than go in-depth into calculus, matrices and trigonometry that make up an algorithm.