IBFIT07: CYBER SECURITY PROTECTION CERTIFICATE (CSPC)-P210531GVA
CYBER SECURITY PROTECTION CERTIFICATE (CSPC)-P210531GVA
Course Duration
Mode of Assessment
Participants will be required to complete a web-based written assessment during class.
A final assessment will be embedded in the online training platform, allowing the organization to test the knowledge and skills of each trainee, identify knowledge gaps and to evaluate the organizations cyber security resilience.
Who Should Attend
Anyone who wants to acquire a basic understanding of Cyber Security.
What's In It for Me
Programme Code: P190714SZU
Following the completion of the training, you will earn a Cyber Security (Protection) Certification. Once you have passed the final exam, you will receive an e- certification with the title: Cyber Security Protection Certified (CSPC).
A Safer Digital World Starts With You
Cybint understands that any mission worth working toward starts with collaboration. Over the years, we have been working across the globe with education partners to bring the best cybersecurity learning solutions and skills to their communities.
Course Overview
Technology alone is not enough to prevent major data breaches and cyber-attacks. Security is dependent on employee education and training. Cybersecurity is one of the fastest growing industries and sensitive topics across nearly all professional sectors. Understanding the cyber terminology, threats and opportunities is now critical for professionals.
Cybersecurity researchers estimate that the average payment following a ransomware attack in 2020 rose 171% to $312,493, compared to $115,123 in 2019. Not surprisingly, a significant portion of ransomware attacks stems from an innocent-looking phishing e-mail.
Apart from losing access to both business and personal data (think about those precious photographs and memories!), attackers have been known to exfiltrate and sell their victim’s data on the dark web. The perpetrators of the NetWalker ransomware, for example, exposed confidential business data of more than 100 organisations around the world.
Cybint Security (Protection) is the leading cyber security programme in the cyber education industry. This programme is the product of a collaboration between Israeli military-trained cyber security experts and education experts and is trusted around the globe.
The programme brings real-world threats and scenarios to equip them with the skills to protect themselves in the cyberworld. LHUB brings this programme to Singapore through a partnership with Cybint.
Cybint Introductory Courses
CSPC (Level 1) IBFIT07 |
CEBFP (Level 2) IBFIT25 |
|
What are the differences between the courses? |
|
|
Who should attend this course? |
|
|
Next available schedule
Course Objectives
At its core, the Cyber Security Protection Certified (CSPC) consists of training, assessment, certification and tools that will teach learners how to improve their online security practices. The program addresses cyber security at the employee level creating a deep and powerful network of cyber security expertise beyond the typical technical expertise.
Pre-requisites
None. Basic understanding of IT is recommended, but not mandatory.
Hardware & Software
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download
Minimum Specs |
Recommended Specs |
|
Processor / CPU |
1.6 GHz or faster, 2-core Intel Core i3 or equivalent |
1.8 GHz, 2-core Intel Core i3 or equivalent |
Memory |
4 GB RAM |
8 GB RAM |
Hard Disk |
10 GB available storage space |
|
Display |
1280 x 768 screen resolution |
|
Graphics |
2GB Graphics Card |
|
Others |
|
|
Software |
|
Course Outline
Best Practices in Cyber Security
- Cybersecurity landscape in Singapore
- Cyber Culture and Cyber Hygiene in an Organization
- Role of the Chief Information Security Officer
- Risk Assessment
- Employee Protection and Education
- Security Technologies
- Regulatory Developments on cybersecurity
- Incident Preparedness and Response
Introduction to Cyber Security and Cyber Crimes
- Introduction to Cyber Security
- Common Cyber Security Threats
- Cyber Criminals
- Famous Attacks
Demo #1 – Google Hacking and Shodan Hacking
- Finding leaked credentials
Demonstration to showcase the exposure of leaked credentials in online repositories (e.g. Pastebin.com) or in online shared work spaces (e.g. Trello.com).
- Google Hacking
Demonstration on how simple it is to hack a network printer/router/web camera using Google Hacking techniques and default credentials.
- Shodan
Demonstration to present Shodan.io – The search engine for IoT and present how it can be used to easily detect and hack network devices.
Accounts and Credentials Security
- Password cracking techniques – Brute Force and Dictionary Attack
- Tools to test and create a strong password
- Leaked Credentials
- From one account to all accounts
- Account breach detection methods
- Prevention and protection methods
Hardware Exploits and Mobile Security
- USB Drives
- Wearable Devices
- Remote Takeover
- Shodan Search Engine
Demo #2 – Wi-Fi Security Man in The Middle
- Demonstration to show the trainees how easy it is for hackers to steal sensitive information from unaware users by setting up traps in the form of WiFi networks
Wi-Fi Security and Safe Browsing
- What is WiFi
- Attacking WiFi Networks
- Attacking via WiFi (Man in The Middle attacks, Evil Twin)
- Prevention methods (VPN, SSL, etc.)
Demo #3 – Social Networks Profiling for Social Engineering
- Demonstration to show the trainees how much information about them is exposed on the internet through social networks and online databases, that can be used for planning sophisticated Social Engineering campaigns against them
Social Engineering and Ransomware
- Social Engineering
- Phishing
- Spoofing of email address, phone numbers, voice, etc.
- Avoidance Techniques
Demo #4 – Phone spoofing, and Email Spoofing demonstration
- Demonstration is to show that the methods hackers employ to mask their email address and phone number to increase the efficacy of their scams.
Certificate Obtained and Conferred by
- Certificate of Completion from NTUC LearningHub
Upon meeting at least 100% attendance and passing the assessment(s), participants will receive Certificate of Completion from NTUC LearningHub
- External Certification Exam
NA
undefined
Additional Details
Medium of Instruction & Trainer
Medium of Instruction: English
Trainer: Trainee Ratio is 1:25
Mode of Delivery: Virtual Live Class (VLC) via Zoom
As this is a government subsidised programme, the entire training programme will be video recorded for audit purposes by the relevant funding agency. To ascertain their presence, Trainees / Participants are required to
- Turn on web camera to show real-time video, as opposed to using a profile picture / video for the entirety of the training and assessment session.
- Ensure that their faces are fully visible (not just the forehead / eyebrows)
- Use their full name as per NRIC / Passport as their Screen Name on Zoom
Courseware & Labs
A softcopy of the learners guide will be provided on canvas. No Lab required for this course.
Price
Course Fee and Government Subsidies |
||||
Individual Sponsored Trainee |
Company Sponsored Trainee |
|||
Before GST |
With GST |
Before GST |
With GST |
|
Full Course Fee
|
$450.00 |
$490.50 |
$450.00 |
$490.50 |
For Singapore Citizens aged 39 years |
$225.00 |
$265.50 |
$225.00 |
$265.50 |
For Singapore Citizens aged 40 years and above |
$135.00 |
$175.50 |
$135.00 |
$175.50 |
*With effect from 3rd October 2022:
|
Funding Eligibility Criteria
Individual Sponsored Trainee |
Company Sponsored Trainee |
|
|
Remarks
Union Training Assistance Programme (UTAP)
NTUC members enjoy UTAP* benefit of up to $250 each year when you sign up for courses with NTUC LearningHub
* UTAP supports 50% of the course fees paid cap at $250 per year. You must be a union member throughout the course duration and at the time of claim. You must achieve a minimum of 75% attendance for each application and have sat for all prescribed examinations. Other terms and conditions apply.
Terms & Conditions apply. NTUC LearningHub reserve the right to make changes or improvements to any of the products described in this document without prior notice.
Prices are subject to other LHUB miscellaneous fees.
Batch ID | Course Period | Course Title | Funding Available |
Duration (Hours) |
Session (Hours) |
Venue | Available Seats |
Online Payment |
---|
What Others Also Enrolled In
NICF - CYBERSECURITY AWARENESS PROGRAMME (SF) (SYNCHRONOUS E-LEARNING)
View detailIDENTIFY UNETHICAL PRACTICES AND MITIGATE BUSINESS RISKS THROUGH ETHICAL CONTROLS
View detailDEVELOP AND IMPLEMENT ORGANISATIONAL-LEVEL DATA GOVERNANCE STRATEGY AND STRUCTURE
View detailDEVELOP AND ENHANCE COMPLIANCE PROCESSES IN BUSINESS OPERATIONS AND DATA PROTECTION REQUIREMENTS
View detailMONITOR AND ASSESS ORGANISATION’S PERSONAL DATA PROTECTION POLICIES AND PRACTICES
View detailDEVELOP AND IMPLEMENT A DATA PROTECTION MANAGEMENT PROGRAMME (DPMP)
View detailIMPLEMENT PERSONAL DATA SHARING POLICIES TO GENERATE BUSINESS VALUE FOR THE ORGANISATION
View detailCOMPLY WITH LOCAL DATA PROTECTION REQUIREMENTS WHILE DEVELOPING INNOVATIVE PRODUCTS AND SERVICES
View detail(CEBFP) CYBERSECURITY ESSENTIALS FOR BUSINESS AND FINANCE PROFESSIONALS-P200817WPR
View detailNICF - CERTIFIED INFORMATION SYSTEMS AUDITOR (CISA) (SF) (SYNCHRONOUS E-LEARNING)
View detailNICF - CERTIFIED INFORMATION SECURITY MANAGER® (CISM®) (SF) (SYNCHRONOUS E-LEARNING)
View detailNICF - CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT (CGEIT) (SF)
View detailNICF - CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROL® (CRISC®) (SF) (SYNCHRONOUS E-LEARNING)
View detailNICF - CYBERSECURITY AWARENESS PROGRAMME (SF) (SYNCHRONOUS E-LEARNING)
View detailFUNDAMENTALS OF THE PERSONAL DATA PROTECTION ACT (2020) (SYNCHRONOUS E-LEARNING)
View detailIDENTIFY RISKS ASSOCIATED WITH COLLECTION, USE, DISCLOSURE AND STORAGE OF PERSONAL DATA
View detail