Subscribe e-Newsletter
    Member Login
    Course Catalog
    Email
    Pass
    Forget password? Click here
    Classroom/ Online: Yes/ Yes
    Scheduling Date(s):
    1) Jun 12, 2024 (classroom)
    2) Sep 18, 2024 (classroom)
    3) Dec 18, 2024 (classroom)
    Note: Please click specific date for detailed venue and course fee etc.
    Effective Ways to mitigate Cybersecurity Attacks
    Hackers today get more sophisticated and unpredictable in their persistent attacks and cyber activities. As we move towards a more digitized world, the threats and security risks increases greatly. The breach of personal and company data, disruption to businesses will affect our work, and daily lives. Employees and organization must be able to tackle and handle these cyber-attacks, and prevent information from being hacked or stolen. The need to be prepare and ready for any online threats and vulnerabilities starts with the right training.

    Learn various techniques and tools to identify, prevent, protect and response to cyber attacks, by equipping with the right knowledge, to secure your business, protect your assets and mitigate risk in your systems, networks and devices.
    Objective
    • Gain the right knowledge and understanding of security, type of attacks and vulnerabilities
    • Know the various threats and tools that can protect against it
    • Identify the various malwares, know the weaknesses in your systems, networks or devices.
    • Mitigate security exploits and prevent data breach or falling victim to stolen critical information
    • Protect against malicious attacks and Business Risk
    Outline
    Online Security?
    • Information and Security
    • Information Security - Risks, Threats and Vulnerabilities
    ldentify Security Threats and Vulnerabilities
    • Various Attacks / Types of Threats / Weaknesses
    Data Security
    • Sharing, Storing, Protecting, Transporting Data
    Phishing and Malicious Threats
    • Attachments, Hoaxes, Malware, Symptoms, Social, Mobile, Wireless

    Roles and Responsibilities
    • Guidelines, Control, Procedure

    Other Attack, Demonstration and Hands-on Activities

    After completing this course, learners will be more prepared and equipped to tackle Cyber Security Attacks
    Who should attend
    • This course is design for anyone who is interested to learn about security, physical and cyber security, understand how to prevent and protect against cyber crimes
    • All Staff within an Organisation
    • Managers, Team Leaders, Executives, Officers, Secretaries, Assistants
    • IT Personnel, Operations
    • Anyone involved in info-security, online security
    • Anyone looking to gain knowledge or have skillsets in cyber security
    Methodology
    This is a demo and activity course, so bringing along a laptop is useful. There will be hands-on practices, activities, demonstration for various topics so that you can apply what is being taught.

    A combination of lectures, case examples, videos and hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.

    The trainer will explain on the topic and then guide you through with step-by-step practice or demonstrate on the topic.
    Testimonials
    Swee Chye was effective in delivering complex topics in simple to understand form -ST Electronics

    The practical examples, concepts and skills taught by the Trainer are relevant and useful to everyone - International SOS

    The hands-on activities, and demonstration made the training very realistic and relevant to learn about security -Hitachi Asia
    Particular of Ang Swee Chye
    Certified Technology Trainer, Facilitator and Consultant

    Certifications
    Swee Chye is an experience trainer certified by various organization. He is certified by the following organizations:
    • Microsoft-certified - Microsoft Certified Educator,
    • Apple-certified - Apple Professional Learning Specialist & Apple teacher,
    • IBM-certified - IBM Data Science Practitioner – Instructor & IBM Enterprise Design Thinking Practitioner,
    • Certified EC Council - Computer Hacking Forensic Investigator & Certified Ethical Hacker, CyberSecurity Career Mentor,
    • AWS-certified - AWS Cloud Quest: Cloud Practitioner,
    and also ACTA-certified.

    Education
    He holds an honours degree in Electrical and Electronics Engineering, who possesses a strong passion in ICT Training, and has trained many organizations and customers globally.

    Working Experience
    He has more than 25 years of ICT experience. He has been providing ICT training to government, private institutions and organizations in 5 different continents. He specializes in Cyber Security, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence, Machine Learning, Cloud Computing and Web Development. He focuses on data and data-related training programs to diagnose, analyse and predict (Data Science, Data Analytics, IoT, AI & ML), to protect data and mitigate risk (Cybersecurity) and to automate system and processes (Programming, Robotics & RPA). All these can be scaled and performed on premise or in the cloud.

    Customers/Clients Credentials
    Clients from diverse industries he has trained include GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Proctor & Gamble, Nanyang University, Republic Polytechnic, Singapore Polytechnic, Pavilion Energy, Nanyang Polytechnic, HTX, SPF, and overseas clients like Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, DOW Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG among many others.

    Professional Work
    Apart from being a corporate trainer, Swee Chye does consultancy work in ICT in areas like Cyber Security, Data Analytics, IoT, Robotics, Mobile Application, Data Analytics and Web Development.
    Privacy Policy  |  Terms of Use
    Copyright © 2024 CCISG Pte Ltd  |  ACRA Reg No: 201207591D  |  GST Reg No: 201207591D