Home / Programmes / Cybersecurity

Cybersecurity

Cybersecurity

Overview

Secures the Government through governance, cybersecurity technologies and services, to create a safe digital workplace and enable delivery of secure digitalisation initiatives.

Cybersecurity

 

(ISC)² Certified Cloud Security Professional Common Body of Knowledge (CCSP CBK) Training Seminar

Intermediate As more organisations adopt cloud-based systems, new complexities and challenges surface. The CCSP credential reflects in-depth knowledge derived from hands-on information security and cloud computing experience. It validates practical know-how for professionals whose responsibilities involve cloud security architecture, design, operations and service orchestration.

Duration: 5 days
Full Fee: $4750
Fee (After max subsidy): Visit training provider's website for details


 

(ISC)² Certified Information Systems Security Professional Common Body of Knowledge (CISSP CBK) Training Seminar

Intermediate The official (ISC)2 CISSP® CBK® training seminar covers the 8 CISSP® CBK® domains and serves as a good learning tool for mastering concepts and topics related to all aspects of information systems security.

Duration: 5 days
Full Fee: $4750
Fee (After max subsidy): Visit training provider's website for details


 

(ISC)² Certified Secure Software Lifecycle Professional Common Body of Knowledge (CSSLP CBK) Training Seminar

Intermediate Participants will learn about the tools, processes and on how security should be built into each phase of the software lifecycle. The course details security measures that must be put in place during the requirements, design, implementation, testing and acceptance phases as well as during deployment, operations, maintenance and ultimately disposal.

Duration: 5 days
Full Fee: $4750
Fee (After max subsidy): Visit training provider's website for details


 

(ISC)² Systems Security Certified Practitioner Common Body of Knowledge (SSCP CBK) Training Seminar

Intermediate This course will equip you with the know-how on the operational aspect of cybersecurity. It is suitable for professionals who are new to cybersecurity and also IT professionals or OT engineers who require cybersecurity know-how as a complimentary skill. Today, in fact, it is important for IT professionals and OT engineers to understand security controls and practices to secure the domains under their care.

Duration: 5 days
Full Fee: $4250
Fee (After max subsidy): Visit training provider's website for details


 

Creative Red Teaming

Foundation Participants will receive hands-on experience conducting covert cyber attack simulations that mimic real-world threat actors. They will learn how to bypass advanced network segmentation, multi-factor authentication and application whitelisting, abuse web applications, escalate privileges and steal data while circumventing detection methods. 

Duration: 5 days
Full Fee: $7410
Fee (After max subsidy): No subsidy


 

Essentials of Malware Analysis (Forensics)

Intermediate This course provides a beginner-level introduction to the tools and methodologies used to perform malware analysis on executables found in Windows systems using a practical, hands-on approach. The course introduces learners to disassembly, preparing them for topics covered in more advanced courses, and taught by FLARE malware analysts who are experienced in analysing a diverse set of malware. 

Duration: 4 days
Full Fee: $2137
Fee (After max subsidy): No subsidy


 

Fundamentals of ICS Security

Foundation This course provides IT security professionals and ICS/OT engineers interested in ICS/OT security with the fundamental knowledge and skills required to build and expand an ICS/OT security team. 

Duration: 3 days
Full Fee: $2137
Fee (After max subsidy): No subsidy


 

Hunt Mission Workshop (IR)

Foundation This fast paced entry-level workshop teaches the fundamentals of creating a structured, repetitive, and documented intel-led hunt in your own organisation. Students will learn how to employ a process framework to scope, execute, and validate the results of a network hunting operation and ensure each hunt mission is used to improve the organisation’s overall network security posture.
 

Duration: 2 days
Full Fee: $1425
Fee (After max subsidy): No subsidy


 

ICT Security Risk Assessment & Security By Design Course

Foundation Participants will understand the process of applying the Instruction Manual’s Risk Management Methodology, gain awareness on the basic Security By Design and roles and responsibilities when onboarding SHIP platform.
 

Duration: 2 days
Full Fee: $3200
Fee (After max subsidy): Visit training provider's website for details


 

Incident Response Management

Foundation This course will be practical-based with hands-on examples for participants to try out how to handle security incidents based on reported incidents.
 

Duration: 2 days
Full Fee: $3200
Fee (After max subsidy): Visit training provider's website for details


 

Introduction to Cyber Crime for Executives

Foundation This course is designed to educate senior leaders about cybercrime and incident response. Participants will review a scenario based on real-world intrusions by a sophisticated attacker, examining tactics and technologies from both the attacker’s and victim’s perspectives. This scenario illustrates the most common method that attackers use to establish a foothold and remain undetected in the victim’s network.
 

Duration: 2 days
Full Fee: $1140
Fee (After max subsidy): No subsidy


 

Introduction to Threat Intelligence and Attribution

Foundation The course explores the main components of a threat group and shows how FireEye analysts use raw tactical intelligence and weigh connections and relationships to build a set of related activities that corresponds to a group of threat actors.
 

Duration: 2 days
Full Fee: $1140
Fee (After max subsidy): No subsidy


 

Security and the Software Development Lifecycle

Foundation This course covers different software development methodologies as well as the different places that good security practices can be introduced in any software development methodology as well as how to implement them.
 

Duration: 3 days
Full Fee: $2137
Fee (After max subsidy): No subsidy


 

Windows Enterprise Incident Response

Foundation This course covers different software development methodologies as well as the different places that good security practices can be introduced in any software development methodology as well as how to implement them.
 

Duration: 4 days
Full Fee: $4275
Fee (After max subsidy): No subsidy



SEC541: Cloud Security Attacker Techniques, Monitoring, and Threat Detection

Intermediate SEC541 is a cloud security course that investigates how attackers are operating against Amazon Web Services (AWS) and Microsoft Azure environments, the attacker's characteristics, and how to detect and investigate suspicious activity in your cloud infrastructure. 

Duration: 5 days
Full Fee: $11060
Fee (After max subsidy): No subsidy


 

SEC588: Cloud Penetration Testing

Intermediate SEC588 will equip you with the latest in cloud-focused penetration testing techniques and teach you how to assess cloud environments. 

Duration: 6 days
Full Fee: $11753
Fee (After max subsidy): No subsidy


 

Secure Code Programme

Intermediate This course aims to build learners' skills online with hands-on exercises, receive real-time advice through IDE coaching plug-in tools, verify their skillset through online assessments and certifications and monitor and measure their skill improvements and ROI. 

Duration: Self-paced E-learning
Full Fee: $355
Fee (After max subsidy): No subsidy


 

Security Risk Management Methodology and Security-By-Design

Foundation The course aims to train on security risk assessment methodology using GovTech’s risk assessment framework in IM8, and provides an overview on Security By Design and brief introduction to CI/CD pipeline SHIP.

Duration: 3 x 0.5 days
Full Fee: $3200
Fee (After max subsidy): No subsidy


 

Vulnerability Assessment

Foundation The focus of this course is on fixing Vulnerability Assessment (VA) scans on internet facing servers. Participants will be given hands-on practical skills on network protocols, software vulnerabilities, and basic penetration testing knowledge to protect computer and network resources.

Duration: 2 days
Full Fee: $3200
Fee (After max subsidy): Visit training provider's website for details