Product
Express Cyber Security
5 weeks part time / 2 weeks full time per module Instructor-led Live & Mentor-led Blended Learning
Learn Cyber Security fundamentals, Threat detection, Incident management and how to implement security on various Microsoft platforms.
What do I Get?
Acquire Cyber Security Skills
Learn Cyber Security fundamentals to protect current threat landscape by demonstrating hardening tactics to make a breach more difficult and costly for a hacker to execute and learn early threat detection, classify the extent of a system breach and respond to security incident effectively to minimize the business impact
Mentor-Led Blended Learning Delivery
We deliver blended learning through a combination of self-paced e-learning, instructor-led flipped classes and personalised mentoring from industry experts to greatly increase your efficiency and effectiveness in applying Cyber Security knowledge and skills
Up to 70% Funding
Singapore Citizens / Permanent Residents can receive up to 70% funding* from SkillsFuture Singapore and further subsidies using your SkillsFuture credit and Post-Secondary Education Account.
*Terms and Conditions apply
Become Microsoft Certified Professional in Cybersecurity
Validate your technical expertise through rigorous, industry-proven, and industry-recognized exams and become Microsoft Certified Professional in Cybersecurity
- MS- 900 - Microsoft Certified: Microsoft 365 Fundamentals
- MD101 - Microsoft Certified: Managing Modern Desktops
- AZ-900T00 - Microsoft Certified: Micorost Azure Fundamentals
- AZ-104 - Microsoft Certified: Microsoft Azure Administrator
- AZ-500 - Microsoft Certified: Microsoft Security Administrator
- AZ-500 - Microsoft Certified: Azure Security Engineer Associate
- MS - 100 - Microsoft Certified: Microsoft 365 Certified Enterprise Administrator Expert
Audience and Certificates
Target Audience
- PMEs who need to improve security posture in a Microsoft 365 environments - System Administrator - Infrastructure Engineer - IT Operation Analyst - Security Administrator - Network Engineer - System Engineer - IT Consultant - Project Manager - IT Risk Analyst - IT Auditor - IT Manager
Prerequisite
- One year experience in IT managing Microsoft platforms
- Basic understanding of cloud computing.
Graduation Requirements
- Minimum attendance of 75% for all sessions in each of the modules.
- Should be assessed Competent (C) in each of the modules
Certificate(s)
- Statement of Attainment by SSG, Singapore: ICT-OUS-3015-1.1 Threat Intelligence and Detection
- Statement of Attainment by SSG, Singapore: ICT-OUS-3003-1.1 Cyber Incident Management
- Statement of Attainment by SSG, Singapore: ICT-DIT-3013-1.1:Security Programme Management
- Statement of Attainment by SSG, Singapore: ICT-OUS-3012-1.1:Security Administration
- Statement of Attainment by SSG, Singapore: ICT-SNA-5021-1.1 : Security Strategy
Blended Learning Journey
E-Learning
60 Hours
Projects / Assignments
93 Hours
Flipped Class/Mentoring
87 hours
Assessment
2 hours
Modules
NICF-Cyber security Planning (SF) (Synchronous and Asynchronous E-Learning) (TGS-2018504983)
The learner will learn how to improve security posture in a Microsoft 365 environment and how Microsoft 365 could support your organization’s digital transformation and how to do a technical vulnerability assessment in a Microsoft 365 environment.
Session Plan
Learning Outcome
Knowledge
By the end of this module, the learner should be able to gain the following knowledge:
- Understand the fundamental concepts of Confidentially, integrality and Availability, and Multi-layer Defense from Governance, Risk and Compliance perspective
- Learn to create privacy solutions that are aligned with organizational goals and risk appetite with the ability to implement privacy by design to enable organizations to enhance privacy technology platforms that provide benefits to consumers, build trust and advance data privacy
- Learn the various types of Threats, Attacks, and Vulnerabilities of computer systems using Lockheed Martin Kill Chain and MITRE ATT@CK attack framework
Skills
By the end of this module, the learner should be able to apply the following skills:
- Implement cybersecurity control using the Center of Internet Security (CIS) Framework Version 7.1 for a secure Workplace.
- Prepare, manage and respond to a Cyber Incident using NIST SP800-60 Framework
- Conduct a Technical Security Assessment to assess an organization security posture using Microsoft CSAT with hand-on Lab Assignment in a cyber range and perform a simulated real-life cybersecurity Assessment Project
Other Information
Funding Validity Period: Until 22-Nov-2024
Course Developer: Lithan Academy
NICF-Cyber security Administration (SF) (Synchronous and Asynchronous E-Learning) (TGS-2018504984)
Learn how to plan, implement, and manage security in Office 365. You will also learn best practices on how to use PowerShell securely and how to use PowerShell to enhance security. As you build a cybersecurity defense plan, learn best practices around Active Directory, Azure Active Directory, and identity management.
Session Plan
Learning Outcome
Knowledge
By the end of this module, the learner should be able to gain the following knowledge:
- Windows PowerShell Fundamentals
- PowerShell Operational Security
- Windows PowerShell based Exploits
- Identity as a Service Privilege
- Identity Access Management
- Active Directory Security
- Active Directory And Kerberos Protocol
- Introduction to Security in Office 365
- Microsoft Advanced Threat Protection
- Microsoft Threat Intelligence
- Security and Compliance Center
- Advanced Security Management
Skills
By the end of this module, the learner should be able to apply the following skills:
- Managing Local Script Execution
- Managing Remote Execution
- Implementing PowerShell-based
- Security Mitigating
- PowerShell-based exploits
- Managing Identity Securing Active Directory
- Securing Azure Active Directory
- Implementing Microsoft 365
- Advanced Threat Protection Using Microsoft 365
- Threat Intelligence Implementing audit, insights, and alerts in Azure
- Implementing Advanced Security Management
- Authenticating Users
- Authorizing Users to Access Resource
- Protecting Data with encryption
- Conducting a Simulated Cyber Attack
Other Information
Funding Validity Period: Until 22-Nov-2024
Course Developer: Lithan Academy
NICF-Host and Cloud Cyber security (SF) (Synchronous and Asynchronous E-Learning) (TGS-2018504985)
Dive into the new security architecture and features of Windows 10, and learn how to enable them, as you explore today’s security threat landscape. Take a deep dive into the new layers of protection built into Windows Server 2016. Learn to further safeguard against security breaches by blocking malicious attacks and enhancing the security of your virtual machines, applications, and data. Understand the current nature of the security threat landscape and study the new security architecture and features of Microsoft Azure.
Session Plan
Learning Outcome
Knowledge
By the end of this module, the Learner should be able to gain the following knowledge:
- Process for site preparation
- Capacity and performance tests for on-site systems
- Impact analysis of new infrastructure deployment or removal
- Safety and quality standards
- Installation tests on infrastructure components
- Diagnostic tools for infrastructure-related problems
- Security risks, threats and vulnerabilities
- Linkage of business processes to security systems
- Techniques and considerations in security programme design
- Application of information security and assurance architectures
Skills
By the end of this module, the Learner should be able to apply the following skills:
- Prepare the site location in ensuring that necessary infrastructure is in place
- Test on-site systems performance and capacity to support requirements
- Conduct basic impact analysis of new infrastructure deployment or removal
- Deploy and decommission infrastructure components and associated equipment in accordance to a set plan and safety and quality procedures
- Perform simple deactivation of system components, if required
- Conduct installation tests on infrastructure components to check for performance
- Document malfunctions in infrastructure components, and their corrections deployed
- Resolve simple to semi-complex problems in infrastructure components and associated equipment using appropriate tools
- Identify security risks, threats and vulnerabilities relevant to organisation operations and systems
- Assess gaps in existing security controls and their potential business impact
- Translate security objectives and assessment of gaps into specific security programmes or guidelines
- Develop a detailed action plan for a security programme, making periodic updates with technological or regulatory changes
Other Information
Funding Validity Period: Until 22-Nov-2024
Course Developer: Lithan Academy
NICF- Cyber Security Management Capstone Project (SF) (Synchronous and Asynchronous E-Learning) (TGS-2020505008)
Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all Information Management Professional have to endure. This Capstone Project aims to produce top-level information security executives. Learner will be equipped with Knowledge and Skills to build a successful information management program for various size organizations. The Capstone project does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. This session will cover the GRC framework (Governance, Risk and Compliance) with the NIST Cybersecurity framework (Identify, Protect, Detect, Respond and Recover) and strategic program development to create a secured workplace for a digital enterprise. The capstone project was developed for current and aspiring Information Security Manager.
Session Plan
Learning Outcome
Knowledge
By the end of this module, the learner should be able to gain the following knowledge:
- Goal setting and objectives of organization security
- Best practices and emerging technologies in security control
- Information security and assurance strategy
- Best practices and emerging technologies in security control
- Gap analysis in organization security
- Implications and impact of security gaps
Skills
By the end of this module, the learner should be able to apply the following skills:
- Formulate security goals and objectives based on an integrated understanding of business priorities, the overarching security vision and strategy directions, and defined security management benchmarks
- Establish standards and practices to protect the integrity, authenticity and confidentiality of Information
- Manage compliance with information security guidelines and classification or permission rules
- Lead communication of security goals and objectives to the organisation
- Develop strategies and plans to resolve security gaps
Other Information
Funding Validity Period: Until 18-Jul-2022
Course Developer: Lithan Academy