Cyber Safety: Empowering Employees in Digital Defence

Be Informed.
Be Protected.

Keep your organisation protected with essential cybersecurity awareness knowledge.

In partnership with: 

View Course BrochureView Course Brochure


Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Learning Outcomes: 

Organisation-specific Content

  • Explanation and showcase of current cybersecurity initiatives by technical team
  • Tailored to address specific cybersecurity risks and policies relevant to the organisation
  • Meet internal audit requirements quickly & effectively

Interactive & Practical Learning

  • Hands-on cybersecurity awareness activities
  • Real-world scenarios to demonstrate risks
  • Interactive discussion to contextualise and reinforce learning within teams

Facilitation

  • Facilitator-led to ensure knowledge retention
  • Emphasis of behavioural risks compromise organisational cybersecurity
  • Learn up-to-date information from cybersecurity personnel

Comprehensive Course Materials

  • Provision of cybersecurity quick reference guides for post-course reference
  • Checklists for phishing email identification
  • Tips for maintaining digital hygiene

Real-world Phishing Exercises

  • Context-specific phishing demonstrations
  • Post-training phishing exercise

Follow-Up Support

  • Access to online tools and reading resources for continuous learning and reinforcement of cybersecurity best practices
Question text goes here
  • Become familiar with different attack scenarios

Course Syllabus:

Chapter 01
Understanding Cyber Threats

Core Business Operations and Cybersecurity:

  • Identify Core Business Activities Tied to Cybersecurity
  • Assessment of Organisation’s Cybersecurity Knowledge
  • Overview of Cybersecurity Threats
  • Real-life Case Studies

IT Asset Management:

  • Identify and list essential business assets.
  • Best practices for asset management.
  • Regularly updating the company's asset list.

Industry-Specific Cybersecurity and Privacy Regulations:

  • Define your industry concerning cybersecurity.
  • Recognize and comply with industry-specific regulations.
  • Understand and protect sensitive business information.

IT Assets, Business Operations, and Regulations Synthesis:

  • Identify key software and hardware.
  • Assess IT asset downtime impact.
  • Understand Service Level Agreements (SLAs) and potential breach impacts.

Business Resilience Planning:

  • Develop a Maintenance Plan.
  • Recognize incidental security features.
  • Understand regulatory impacts and potential cybersecurity failures.

Financial Aspects of Cybersecurity:

  • Business Continuity Planning (BCP) basics and importance.
  • Disaster Recovery Plan (DRP) importance and formulation.
  • Evaluate cybersecurity costs, risks, and risk assessment.

Corporate Cyber Hygiene:

  • Introduction to cyber hygiene.
  • Best practices for enhancing cybersecurity.
  • Address human risk factors and fostering a cyber-safe culture.

Open-source Intelligence (OSINT)

  • Phishing Awareness with live demonstration
  • Types of Online Information
  • OSINT Tools Overview
  • Hands-on Exercise with Shodan

Linux Fundamentals

  • Role in Modern IT Systems
  • Overview of Linux Distributions
  • Hands-on: Basic Command Practice

Password Security

  • Importance of Password Hygiene
  • Brute Force Attacks: Introduction, Demonstration, and Defence
  • Password Best Practices
  • Creating & Managing Passwords
  • Using Password Managers
  • Secure Password Sharing

MITRE ATT&CK Framework

  • Real-World Use Cases
  • Practical Application

CIA Triad Framework

  • Introduction
  • Real-World Case Studies
  • Application in Business Cybersecurity

Cyber Response Playbook

  • The Need for a Playbook
  • Responding to Business Email Compromise (BEC)
  • Creation of BEC Standard Operating Procedures (SOPs)
  • Cultivating Cyber Vigilance

Email Cybersecurity

  • Procedures for Inspecting Suspicious Emails
  • Importance of Email System Hygiene
  • Introduction to Secure Email Gateway (SEG)
  • Protocols for Incident Reporting

Simulated Cybersecurity Threat Scenario

  • Defence Strategy Against Simulated Cyberattacks
  • Identifying and Addressing Breaches
  • Investigation and Reporting Protocols

Chapter 02
Cyber Threats & Defence Techniques
Question text goes here
  • Become familiar with different attack scenarios
Chapter 03
Question text goes here
  • Become familiar with different attack scenarios
Chapter 04
Question text goes here
  • Become familiar with different attack scenarios
Chapter 05
Question text goes here
  • Become familiar with different attack scenarios

Training Schedule:

Tailored To Client
Question text goes here

Training Methodology:

Interactive Training

  • Demonstration of real cybersecurity scenarios
  • Continuous engagement and hands-on training
  • Real-time simulation of cyber risks

Threat & Adversary Alignment

  • Based on real-world cyber threats
  • Understanding of latest risk vectors
  • Practical and effective defence solutions
Question text goes here
  • Become familiar with different attack scenarios

FAQs:

What is the minimum pax for this programme?

  • A minimum of 20 pax is required for this programme

Who is this programme for?

  • This programme is for organisations that would like to enhance their cybersecurity protection amongst non-technical staff members. It is suitable for both managerial and non-managerial positions.

Can this programme be conducted online?

  • Yes, we can deliver the programme online if preferred by you.

Any Funding Available?

  • This cybersecurity awareness training is HRDF claimable for Malaysian companies.

Question text goes here
  • Become familiar with different attack scenarios
Quick Info
Programme Fee
Custom Pricing
Duration
Tailored To Client
Schedule
Tailored To Client
Teacher-to-Student Ratio
1:30
Delivery Mode
Online or On-site
Entry Requirement
Register Now

Secure Your Future

Find out more about how we can help you secure your future in cybersecurity

Talk to us on
WhatsApp!