Facebook Express Cyber Security - Products - eduCLaaS Skip to Content

SPActivityHub SPActivityHub

Enquire Now

Hi there!

How would you like to engage with us?

Email

Product Product

Express Cyber Security


5 weeks part time / 2 weeks full time per module Instructor-led Live & Mentor-led Blended Learning



Learn Cyber Security fundamentals, Threat detection, Incident management and how to implement security on various Microsoft platforms.

What do I Get?

Acquire Cyber Security Skills

Learn Cyber Security fundamentals to protect current threat landscape by demonstrating hardening tactics to make a breach more difficult and costly for a hacker to execute and learn early threat detection, classify the extent of a system breach and respond to security incident effectively to minimize the business impact

Mentor-Led Blended Learning Delivery

We deliver blended learning through a combination of self-paced e-learning, instructor-led flipped classes and personalised mentoring  from industry experts to greatly increase your efficiency and effectiveness in applying Cyber Security knowledge and skills 

Up to 70% Funding

Singapore Citizens / Permanent Residents can receive up to 70% funding* from SkillsFuture Singapore and further subsidies using your SkillsFuture credit and Post-Secondary Education Account.

*Terms and Conditions apply

Become Microsoft Certified Professional in Cybersecurity

Validate your technical expertise through rigorous, industry-proven, and industry-recognized exams and become Microsoft Certified Professional in Cybersecurity

- MS- 900 - Microsoft Certified: Microsoft 365 Fundamentals

- MD101 - Microsoft Certified: Managing Modern Desktops  

- AZ-900T00 - Microsoft Certified: Micorost Azure Fundamentals

- AZ-104 - Microsoft Certified: Microsoft Azure Administrator 

- AZ-500 - Microsoft Certified: Microsoft Security Administrator 

- AZ-500 - Microsoft Certified: Azure Security Engineer Associate

- MS - 100 - Microsoft Certified: Microsoft 365 Certified Enterprise Administrator Expert 

Audience and Certificates

Target Audience

  • PMEs who need to improve security posture in a Microsoft 365 environments - System Administrator - Infrastructure Engineer - IT Operation Analyst - Security Administrator - Network Engineer - System Engineer - IT Consultant - Project Manager - IT Risk Analyst - IT Auditor - IT Manager

Prerequisite

  • One year experience in IT managing Microsoft platforms

 

  • Basic understanding of cloud computing.   

Graduation Requirements

  • Minimum attendance of 75% for all sessions in each of the modules.
  • Should be assessed Competent (C) in each of the modules

Certificate(s)

  • Statement of Attainment by SSG, Singapore: ICT-OUS-3015-1.1 Threat Intelligence and Detection

  • Statement of Attainment by SSG, Singapore: ICT-OUS-3003-1.1 Cyber Incident Management

  • Statement of Attainment by SSG, Singapore: ICT-DIT-3013-1.1:Security Programme Management

  • Statement of Attainment by SSG, Singapore: ICT-OUS-3012-1.1:Security Administration

  • Statement of Attainment by SSG, Singapore: ICT-SNA-5021-1.1 : Security Strategy

Blended Learning Journey

(242 Hours)

E-Learning

60 Hours

Projects / Assignments

93 Hours

Flipped Class/Mentoring

87 hours

Assessment

2 hours

Modules

NICF-Cyber security Planning (SF) (Synchronous and Asynchronous E-Learning) (TGS-2018504983)

The learner will learn how to improve security posture in a Microsoft 365 environment and how Microsoft 365 could support your organization’s digital transformation and how to do a technical vulnerability assessment in a Microsoft 365 environment.

Session Plan

More Details

Learning Outcome

Knowledge

By the end of this module, the learner should be able to gain the following knowledge:

  • Understand the fundamental concepts of Confidentially, integrality and Availability, and Multi-layer Defense from Governance, Risk and Compliance perspective  
  • Learn to create privacy solutions that are aligned with organizational goals and risk appetite with the ability to implement privacy by design to enable organizations to enhance privacy technology platforms that provide benefits to consumers, build  trust and advance data privacy  
  • Learn the various types of Threats, Attacks, and Vulnerabilities of computer systems using Lockheed Martin Kill Chain and MITRE ATT@CK attack framework 

Skills

By the end of this module, the learner should be able to apply the following skills: 

  • Implement cybersecurity control using the Center of Internet Security (CIS) Framework Version 7.1 for a secure Workplace.  
  • Prepare, manage and respond to a Cyber Incident using NIST SP800-60 Framework  
  • Conduct a Technical Security Assessment to assess an organization security posture using Microsoft CSAT with hand-on Lab Assignment in a cyber range and perform a simulated real-life cybersecurity Assessment Project   

Other Information

Funding Validity Period: Until 22-Nov-2024

Course Developer: Lithan Academy  

NICF-Cyber security Administration (SF) (Synchronous and Asynchronous E-Learning) (TGS-2018504984)

Learn how to plan, implement, and manage security in Office 365. You will also learn best practices on how to use PowerShell securely and how to use PowerShell to enhance security. As you build a cybersecurity defense plan, learn best practices around Active Directory, Azure Active Directory, and identity management. 

Session Plan

More Details

Learning Outcome

Knowledge

By the end of this module, the learner should be able to gain the following knowledge:  

  • Windows PowerShell Fundamentals
  • PowerShell Operational Security
  • Windows PowerShell based Exploits
  • Identity as a Service Privilege
  • Identity Access Management 
  • Active Directory Security
  • Active Directory And Kerberos Protocol
  • Introduction to Security in Office 365
  • Microsoft Advanced Threat Protection
  • Microsoft Threat Intelligence
  • Security and Compliance Center
  • Advanced Security Management

Skills

By the end of this module, the learner should be able to apply the following skills: 

  • Managing Local Script Execution
  • Managing Remote Execution
  • Implementing PowerShell-based
  • Security Mitigating
  • PowerShell-based exploits
  • Managing Identity Securing Active Directory
  • Securing Azure Active Directory
  • Implementing Microsoft 365
  • Advanced Threat Protection Using Microsoft 365
  • Threat Intelligence Implementing audit, insights, and alerts in Azure
  • Implementing Advanced Security Management
  • Authenticating Users
  • Authorizing Users to Access Resource 
  • Protecting Data with encryption
  • Conducting a Simulated Cyber Attack   

Other Information

Funding Validity Period: Until 22-Nov-2024

Course Developer: Lithan Academy  

NICF-Host and Cloud Cyber security (SF) (Synchronous and Asynchronous E-Learning) (TGS-2018504985)

Dive into the new security architecture and features of Windows 10, and learn how to enable them, as you explore today’s security threat landscape. Take a deep dive into the new layers of protection built into Windows Server 2016. Learn to further safeguard against security breaches by blocking malicious attacks and enhancing the security of your virtual machines, applications, and data. Understand the current nature of the security threat landscape and study the new security architecture and features of Microsoft Azure.

Session Plan

More Details

Learning Outcome

Knowledge

By the end of this module, the Learner should be able to gain the following knowledge:

  • Process for site preparation
  • Capacity and performance tests for on-site systems
  • Impact analysis of new infrastructure deployment or removal
  • Safety and quality standards
  • Installation tests on infrastructure components
  • Diagnostic tools for infrastructure-related problems
  • Security risks, threats and vulnerabilities
  • Linkage of business processes to security systems
  • Techniques and considerations in security programme design
  • Application of information security and assurance architectures

Skills

By the end of this module, the Learner should be able to apply the following skills:

  • Prepare the site location in ensuring that necessary infrastructure is in place
  • Test on-site systems performance and capacity to support requirements
  • Conduct basic impact analysis of new infrastructure deployment or removal
  • Deploy and decommission infrastructure components and associated equipment in accordance to a set plan and safety and quality procedures
  • Perform simple deactivation of system components, if required
  • Conduct installation tests on infrastructure components to check for performance
  • Document malfunctions in infrastructure components, and their corrections deployed
  • Resolve simple to semi-complex problems in infrastructure components and associated equipment using appropriate tools
  • Identify security risks, threats and vulnerabilities relevant to organisation operations and systems
  • Assess gaps in existing security controls and their potential business impact
  • Translate security objectives and assessment of gaps into specific security programmes or guidelines
  • Develop a detailed action plan for a security programme, making periodic updates with technological or regulatory changes  

Other Information

Funding Validity Period: Until 22-Nov-2024

Course Developer: Lithan Academy  

NICF- Cyber Security Management Capstone Project (SF) (Synchronous and Asynchronous E-Learning) (TGS-2020505008)

Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all Information Management Professional have  to endure. This Capstone Project  aims to produce  top-level information security executives. Learner will be equipped with Knowledge and Skills to build a successful information management program for various size organizations. The Capstone project does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. This session will cover the GRC framework (Governance, Risk and Compliance) with the NIST Cybersecurity framework (Identify, Protect, Detect, Respond and Recover) and strategic program development to create a secured workplace for a digital enterprise.   The capstone project  was developed for current and aspiring Information Security Manager. 

Session Plan

More Details

Learning Outcome

Knowledge

By the end of this module, the learner should be able to gain the following knowledge: 

  • Goal setting and objectives of organization security
  • Best practices and emerging technologies in security control
  • Information security and assurance strategy
  • Best practices and emerging technologies in security control
  • Gap analysis in organization security
  • Implications and impact of security gaps

Skills

By the end of this module, the learner should be able to apply the following skills: 

  • Formulate security goals and objectives based on an integrated understanding of business priorities, the overarching security vision and strategy directions, and defined security management benchmarks
  • Establish standards and practices to protect the integrity, authenticity and confidentiality of Information
  • Manage compliance with information security guidelines and classification or permission rules
  • Lead communication of security goals and objectives to the organisation
  • Develop strategies and plans to resolve security gaps

Other Information

Funding Validity Period: Until 18-Jul-2022

Course Developer: Lithan Academy

Pricing and Funding

SGD 12000.00

Pricing

Fee Description

Detailed Breakdown

SHARE THIS PAGE

Share This