Cybersecurity

Responsive Image
Professional Certification Courses
Responsive Image
End-User Training
Responsive Image
Laws and Regulation
Responsive Image
Vendor-Specific Courses
For Company-wide Cybersecurity Literacy
1 Day Course

Cybint Security (Protection) is the leading cyber security programme in the cyber education industry. This programme is the product of a collaboration between Israeli military-trained cyber security experts and education experts and is trusted around the globe. The programme brings real-world threats and scenarios to equip them with the skills to protect themselves in the cyberworld. LHUB brings this programme to Singapore through a partnership with Cybint.​

1 Day Course

Introducing the Cybersecurity Essentials for Business and Finance Professionals (CEBFP) Workshop, a 1-Day live virtual training program designed to tackle human error by providing your employees with advanced understanding and skills to protect themselves and your organization against the most common cyber threats.

Professional Certification Courses for Cybersecurity Professionals

Validate your abilities in cybsersecurity and increase your value with highly industry-recognised certifications from ISACA, IAPP, Cloud Security Alliance and many more. Propel your career now.
Responsive Image
For Information Security
5 Day Course

CISSP is the most-esteemed cybersecurity certification in the world. It recognises information security leaders who understand cybersecurity strategies, as well as hands-on implementations. It shows that one has the knowledge and experience to design, develop and manage the overall security posture of an organisation.

5 Day Course

Demonstrate your information security management expertise. The management-focused CISM certification is unique in promoting international security practices and recognising the individual who manages, designs, oversees and assesses an enterprise’s information security.

For Risk Management
4 Day Course

CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them as strategic partners to the enterprise.

For IT Governance
5 Day Course

CGEIT recognises a wide range of professionals for their knowledge and application of enterprise IT governance principles and practices. As a CGEIT certified professional, one is capable of bringing IT governance into an organisation— grasping the complex subject holistically and therefore enhancing one’s value to the enterprise.

For IT Audit
5 Day Course

The CISA designation is a globally recognised certification for IS audit control, assurance and security professionals. Being CISA certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.

For Software Development Security
2 Day Course

Learn the purpose, benefits, concepts, and vocabulary of DevSecOps; particularly how DevSecOps roles fit with a DevOps culture and organisation. At the end of this course, you will understand using security as code with the intent of making security and compliance consumable as a service.

Strengthen your Weakest Link with our End-User Cyberliteracy Training

Studies predicts that the Global cost of Cybercrimes will hit a massive 6 trillion dollars by 2021. And 90% of Cyberattacks are caused by user errors or behaviours.

Technology alone is not enough to prevent major data breaches and cyber-attacks. The weakest link in the organisation is often the end-users.

NTUC LearningHub has partnered with Israel’s leading cybersecurity education provider to create an impactful course that will transform your organisation in cybersecurity literacy.

Responsive Image

For MICE Industry

1 Day Course
The course is designed especially for MICE employees. The objective is to manage and assess Cyber security risks and apply countermeasures at an ongoing Event. It comprises a one full day or 8 hours of a facilitated workshop. The course encompasses 5 topics that cover all the essential elements of the cybersecurity compliance requirements, basic concepts of Cybersecurity, the requirements of the MICE industry, the good practices of Cybersecurity for MICE, provisions of Data Privacy and compliance requirements and practicing the Cyber and Data Privacy hygiene habits.

Find out more...

Laws and Regulation

Under the Personal Data Protection Act 2012 (PDPA), organisations are required to develop and implement policies and practices that are necessary to meet its obligations under the PDPA. In particular, organisations are required to designate at least one individual, known as the data protection officer (DPO), to oversee the data protection responsibilities within the organisation and ensure compliance with the PDPA.

Data Protection Regulation in Singapore
2 Day Course

Under the Personal Data Protection Act 2012 (PDPA), organisations are required to develop and implement policies and practices that are necessary to meet its obligations under the PDPA. In particular, organisations are required to designate at least one individual, known as the data protection officer (DPO), to oversee the data protection responsibilities within the organisation and ensure compliance with the PDPA.

The course will provide a good overview and understanding of the PDPA and how it may be applied to the organisations for compliance. Areas covered in the training include key legislative and regulatory requirements of PDPA and compliance and alignment with PDPA, as well as prepares management report for follow-up.

1 Day Course

The course will provide students a good overview and understanding of the Cybersecurity Act and how it applies to organisations for their compliance. Areas covered in the training include main objectives of the Cybersecurity Act, its key legislative provisions and how it affects organisations. The course also explains how learners can help ensure compliance with the Cybersecurity Act, as well as how to prepare a management report for follow-up.

3 Day Course

The CCSK certificate is widely recognized as the standard of expertise for cloud security and provides you with the foundations you need to secure data in the cloud. How you choose to build on that knowledge is your choice.

Vendor Specific Certifications

Certification from market leading cybersecurity vendors to solidify your mastery of the technology.

Responsive Image

5 Day Course

The Network Security Professional (NSE 4) designation recognises the ability to install and manage the day-to-day configuration, monitoring, and operation of a FortiGate device to support specific corporate network security policies.
Responsive Image

5 Day Course

NICF – Cisco CCNA Security (IINS) (SF)

Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognise threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasises core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.

Find out more…