IBFIT25: (CEBFP) CYBERSECURITY ESSENTIALS FOR BUSINESS AND FINANCE PROFESSIONALS-P200817WPR
(CEBFP) CYBERSECURITY ESSENTIALS FOR BUSINESS AND FINANCE PROFESSIONALS-P200817WPR
Course Duration
Mode of Assessment
Learner will be required to complete a paper-based/online assessment towards the end of the class.
Who Should Attend
- Employees and managers who want to protect themselves and their organizations from cyber-attacks.
- Individuals who would like to upskill their knowledge of cybersecurity best practices
What's In It for Me
- Get familiar with cyber threats and counter defense tools
- Learn how to keep your accounts and credentials safe
- Understand how to avoid common, yet dangerous threats and malicious scams which target individuals and organizations
Course Overview
Introducing the Cybersecurity Essentials for Business and Finance Professionals (CEBFP) Workshop, a 1-Day live virtual training program designed to tackle human error by providing your employees with advanced understanding and skills to protect themselves and your organization against the most common cyber threats.
Next available schedule
Course Objectives
- Understand what cybersecurity is and why is it important for individuals and organizations
- Learn best practices to protect accounts and credentials in an organization
- Learn how to avoid hardware and mobile attacks
- Learn how to surf securely in the web via Wi-Fi networks when working remotely
- Understand the different kinds of social engineering attacks and how to avoid them
- Explain cybersecurity best practices to customers and/or stakeholders
- Identify relevant channels in the organization to report and initiate corrective actions
- Get special guidance and techniques on how to stay safe and secure in financial institutions and organizations
Pre-requisites
Basic understanding in computers and the internet.
(A) Hardware & Software
- Operating System: Please refer to this link
- Virtual Live Classes – Web camera must be turn on 100% of the time.
(B) Courseware and Labs
- Course Material: Provided on canvas
- Online Labs: N.A.
(C) Assessment
- Assessment will be conducted on Canvas
- Candidates who fail, there is a reassessment fee of $214
Course Outline
Module 1 – Introduction to Cybersecurity
Learning Objectives:
- Get to know the cybersecurity landscape from ethical hackers to dark markets
- Understand an entire cyber-attack chain
- Describe the main principles of cybersecurity and understand relevancy to personal, professional, and organizational levels
- Classify and give examples of types of cybercrimes, of cybercriminals and their motivations
Demos:
- Live Cyber Threat Map: A cyber threat map, also known as a cyber-attack map, is a real-time map of the computer security attacks that are occurring at any given time
- Finding Leaked Organization Credentials: Demonstration on how easy it is to identify credentials which have been leaked from organizations, using an example of a Singaporean financial institution
- Dark Web Markets: Learners will experience a walkthrough of dark web markets to understand how hackers sell the data they steal
Module 2 – Protecting Credentials in an Organization
Learning Objectives:
- How hackers can acquire your passwords
- How to protect yourself against such attacks
- How to tell if your accounts have been compromised, including email and social media
- Best practices to protect personal, financial, and professional accounts
- Tools to test, create and manage strong passwords
Demos:
- Leaked Passwords: Presentation on how to create strong passwords, showing statistics on the most common and overused weak passwords and patterns
- One Account to All Accounts: How to check where your credentials are being used, and how this tool can be exploited by hackers
- How Secure Is My Password? How to evaluate the strength of personal and professional credentials
Module 3 – Securing IoT Devices
Learning Objectives:
- Best practices for protecting IoT devices including webcams, printers, and wearable devices
- How to defend mobile devices from cyber threats
- How to protect workplace environments from remote take-over attacks
Demo:
- IoT Hacking: Demonstrating how easy it is to find sensitive information online which allows hackers to infiltrate printers, routers, or webcams
Module 4 – Remote Security: Wi-Fi + VPN
Learning Objectives:
- How to safely browse using public Wi-Fi networks
- Best practices for working remotely
- How to secure your own Wi-Fi network
- How and when to use a VPN for both private and professional use
Module 5 – The Human Element of Cyber-Attacks
Learning Objectives:
- How hackers take advantage of the human element to infiltrate organizations and financial institutions
- Types of social engineering including phishing, vishing, pretexting and clickjacking
- How to defend against different types of social engineering attacks
Demos:
- Identifying Phishing Emails: Participants will learn how to identify malicious social engineering attempts
- Vishing Detection: Participants are shown various professional and personal situations and taught how to detect vishing efforts
Certificate Obtained and Conferred by
Learner may take an online assessment offered by and NTUC LearningHub, and upon passing the exam will receive a Cybersecurity Essentials for Business and Finance Professionals (CEBFP)
Additional Details
Medium of Instruction & Trainer
Medium of Instruction: English
Trainer: Trainee Ratio is 1:25
Mode of Delivery: Virtual Live Class (VLC) via Zoom
As this is a government subsidised programme, the entire training programme will be video recorded for audit purposes by the relevant funding agency. To ascertain their presence, Trainees / Participants are required to
- Turn on web camera to show real-time video, as opposed to using a profile picture / video for the entirety of the training and assessment session.
- Ensure that their faces are fully visible (not just the forehead / eyebrows)
- Use their full name as per NRIC / Passport as their Screen Name on Zoom
Courseware & Labs
A softcopy of the learners guide will be provided on canvas. No Lab required for this course.
Price:
Course Fee and Government Subsidies |
||||
Individual Sponsored Trainee |
Company Sponsored Trainee |
|||
Before GST |
With GST |
Before GST |
With GST |
|
Full Course Fee
|
$800.00 |
$872.00 |
$800.00 |
$872.00 |
For Singapore Citizens aged 39 years |
$400.00 |
$472.00 |
$400.00 |
$472.00 |
For Singapore Citizens aged 40 years and above |
$240.00 |
$312.00 |
$240.00 |
$312.00 |
*With effect from 3rd October 2022:
|
Funding Eligibility Criteria
Individual Sponsored Trainee |
Company Sponsored Trainee |
|
|
Remarks
Union Training Assistance Programme (UTAP)
NTUC members enjoy UTAP* benefit of up to $250 each year when you sign up for courses with NTUC LearningHub
* UTAP supports 50% of the course fees paid cap at $250 per year. You must be a union member throughout the course duration and at the time of claim. You must achieve a minimum of 75% attendance for each application and have sat for all prescribed examinations. Other terms and conditions apply.
Terms & Conditions apply. NTUC LearningHub reserve the right to make changes or improvements to any of the products described in this document without prior notice.
Prices are subject to other LHUB miscellaneous fees.
Batch ID | Course Period | Course Title | Funding Available |
Duration (Hours) |
Session (Hours) |
Venue | Available Seats |
Online Payment |
---|
What Others Also Enrolled In
NICF - CYBERSECURITY AWARENESS PROGRAMME (SF) (SYNCHRONOUS E-LEARNING)
View detailIDENTIFY UNETHICAL PRACTICES AND MITIGATE BUSINESS RISKS THROUGH ETHICAL CONTROLS
View detailDEVELOP AND IMPLEMENT ORGANISATIONAL-LEVEL DATA GOVERNANCE STRATEGY AND STRUCTURE
View detailDEVELOP AND ENHANCE COMPLIANCE PROCESSES IN BUSINESS OPERATIONS AND DATA PROTECTION REQUIREMENTS
View detailMONITOR AND ASSESS ORGANISATION’S PERSONAL DATA PROTECTION POLICIES AND PRACTICES
View detailDEVELOP AND IMPLEMENT A DATA PROTECTION MANAGEMENT PROGRAMME (DPMP)
View detailIMPLEMENT PERSONAL DATA SHARING POLICIES TO GENERATE BUSINESS VALUE FOR THE ORGANISATION
View detailCOMPLY WITH LOCAL DATA PROTECTION REQUIREMENTS WHILE DEVELOPING INNOVATIVE PRODUCTS AND SERVICES
View detail(CEBFP) CYBERSECURITY ESSENTIALS FOR BUSINESS AND FINANCE PROFESSIONALS-P200817WPR
View detailNICF - CERTIFIED INFORMATION SYSTEMS AUDITOR (CISA) (SF) (SYNCHRONOUS E-LEARNING)
View detailNICF - CERTIFIED INFORMATION SECURITY MANAGER® (CISM®) (SF) (SYNCHRONOUS E-LEARNING)
View detailNICF - CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT (CGEIT) (SF)
View detailNICF - CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROL® (CRISC®) (SF) (SYNCHRONOUS E-LEARNING)
View detailNICF - CYBERSECURITY AWARENESS PROGRAMME (SF) (SYNCHRONOUS E-LEARNING)
View detailFUNDAMENTALS OF THE PERSONAL DATA PROTECTION ACT (2020) (SYNCHRONOUS E-LEARNING)
View detailIDENTIFY RISKS ASSOCIATED WITH COLLECTION, USE, DISCLOSURE AND STORAGE OF PERSONAL DATA
View detail