CYBER

Vulnerability Assessment

Enquiry
Programme Code D32
Domain
Cybersecurity
Level
Foundation
Learning Partner(s)
Singapore Polytechnic
Singtel Cyber Security Institute
Duration
2 Days
Format Online
Rating
Competencies
SOC Operations
Job Roles
Software Engineer Security Testing Engineer Red Team Engineer Quality Engineer Project Manager (Agile) ICT&SS Professional Digital Business Analyst DevOps Engineer Delivery Manager Cybersecurity Policy Developer Cybersecurity Engineer Cloud Infrastructure Architect Solutions Architect Chief Information Security Officer

Overview

Develop practical cybersecurity skills through hands-on examples and practical sessions. Organisations must protect their digital assets and infrastructure. Build your skills and knowledge to be cybersecurity-savvy, so that you can play a part in protecting your organisation's network and systems infrastructure.

While many instructor-led cybersecurity programmes are offered today, not many are lab-based. To pick up the technical skills in cyber security, you must have opportunities for hands-on practical sessions.

This programme is practical-based with hands-on examples for you to try out how attackers can gain access and steal data from improperly managed systems. You will understand how to avoid such system misconfiguration. The focus of this programme is on fixing VA scans on internet-facing servers. You will be given hands-on practical skills on network protocols, software vulnerabilities, and basic penetration testing knowledge to protect computer and network resources. In the ICT Skills Framework, the programme will cover skills in Security Assessment and Testing (Proficiency Level 2).

Key Takeaways

At the end of this programme, you will be able to:
  • Achieve competency in interpreting VA reports, fixing reported vulnerabilities and verifying fixes
  • Fix common weakness such as SSL/TLS ciphers configuration and web applications vulnerabilities
  • Procure and install SSL certificates
  • Understand how vulnerabilities can be exploited

Who Should Attend

  • Please refer to the job roles section.
  • Cyber Risk Analysts and Managers.
  • Senior Security Engineers and Security Engineers.
  • Associate Security Analysts.
  • Security Operations Analysts and Managers.

Prerequisites

Basic experience and knowledge in networking, system administration and understanding of IT security concepts.


Programme Structure

This programme is delivered via virtually instructor-led, covering the following topics:

  • Introduction to VA
  • Reduce VA scan surface
  • SSL / TLS certification
  • SSL / TLS vulnerabilities
  • Web and other vulnerabilities
  • Assessment



Fees


Full Fee

Full programme fee

S$3200

9% GST on nett programme fee

S$288

Total nett programme fee payable, including GSTS$3488

With effect from 1 Jan 2024


NOTE
Funding is available for this programme. Please visit the Learning Partner’s website to find out about the updated programme fee funding breakdown, eligibility, terms and conditions.

How To Register


Agency-sponsored

Step 1 Apply through your organisation's training request system.

Step 2 Your organisation's training request system (or relevant HR staff) confirms your organisation's approval for you to take the programme.

Your organisation will send registration information to the academy.

Organisation HR L&D or equivalent staff can register directly through the learning partner's registration portal.

Click here to register for 26 to 27 August 2024 run.


Step 3 The learning partner will inform you whether you have been successful in enrolment.

Testimonials

This programme teaches us about useful tools for scanning vulnerabilities and the types of preventive measures we can take to mitigate potential risks.

,

It was useful to learn how vulnerabilities are discovered in web applications and servers, how to mitigate these vulnerabilities, and how to decipher CVSS and its use in classifying risks. Additionally, I learned about the different types of certifications and which should be used in an organisation, as well as which cipher suites are superior.

,

I learnt about the basics of Vulnerability Assessment and how to plan related activities, as well as gaining a high-level understanding of common vulnerabilities and how to find remediation recommendations.

,