Time: 9.00am – 5.00pm
Duration: 9 Days
Organisations are investing in cybersecurity solutions and strategy. However, the only way to ensure these are functional is by testing them. Therefore, skillful pen-testers who can simulate attacks and determine ways to infiltrate the network undetected are needed.
In this module, participants will learn about the cyber kill chain and practice using it through a series of steps and components.
Participants will analyse case studies and, most importantly, understand the attacker’s mindset and way of thinking. An analyst who can think like an attacker can better identify possible weaknesses, spot anomalies, define alerts and understand the attacker’s behavior during investigation.
With a good understanding of the attacker’s mindset and the possible actions the attacker might take, cybersecurity analysts will be better equipped to identify the actions taken by the attacker during an investigation and more quickly locate the attacker’s assets.
This course will teach the learner to be an active member of the red team and look for vulnerabilities in the network.
The course will teach learners on:
- Mastering the network kill chain
- Obtaining a deep understanding of each of the attacker’s steps
- Gaining practical experience in attack tools and techniques
- Obtaining familiarity with case studies
- Understanding the attacker’s mindset
- Cyber kill-chain
- External reconnaissance
- Initial compromise (credentials, hashes, client-side exploits)
- Initial reconnaissance
- Initial foothold (privilege escalation, persistence)
- Lateral movements (fingerprinting, pivoting)
- Establish foothold (command and control, multi-staging)
- Network/endpoint evasion
- Protocol vulnerabilities
Who Should Attend
- Cyber Security Analyst
- Red Team members
- Python programming experience
- Networking experience
- Operating system experience
(Click their photos to view their short biographies)
Mr Dvir Chikvashvili
Mr Dvir Chikvashvili is a cyber security professional specializing in cloud security and currently is the Program Manager at DART.
He started programing at 13 and attained the CCNA certification at 14. He also wrote his first malware at the age of 15.
He has varied experiences both from the IDF and Israel’s wider tech industry.
During his career, he has consistently found a way to integrate his tech skills with his passion for teaching. He has lectured and trained other cyber security professionals in the IDF, Israeli colleges and more recently in Singapore.
He is interested in artificial intelligence, philosophy, woodworking, and biking.
Mr Gur Sharon
Mr Gur Sharon is a cyber defense expert with practical experience in SOC, IR, forensics, threat assessment and is a Senior Trainer at DART.
He has a deep passion for network security, with extensive knowledge in network protocols, network security products and network traffic analysis.
After several years in the IDF’s cyber units leading Incident Response and Threat Hunting operations, Gur retired and dedicated himself to cyber security training, coaching hundreds of cyber experts all over the world.
In his free time, Gur solves puzzles, plays different instruments and enjoys exploring Singapore on his bicycle.
Mr Rony Munitz
After a decade of different operational roles in red teams, incident response, and threat hunting operations, both as an expert and a team leader, Rony dedicated his time training the next generation of cyber experts. He is currently a Program Manager at DART.
As a researcher, he found several vulnerabilities and developed attack techniques on Windows, Mac and IoT devices. During his career he was a researcher and team leader in IDF Intelligence Corps top cybersecurity unit, Accenture, Novartis and XM Cyber.
Rony is a Japanese food enthusiast and a K-drama fan.
Mr Ron Suhodrev
Mr Ron Suhodrev is a cybersecurity professional with over 10 years of experience. His first exposure to programming was at 12 years old at Ben Gurion University. At 16, Ron started working as a freelance developer and at 18 joined a prestigious cybersecurity unit in the Intelligence Crops in the IDF.
After his time in the unit, Ron worked as a researcher in leading cybersecurity companies as Trusteer (IBM) and Perception Point while on his spare time tutored computer science university students.
Before moving to Singapore, Ron was the founder of two different startups – one in medical education and another in cybersecurity training and recruitment.
In Singapore, Ron successfully led a two-year-long cybersecurity program and is now acting as Chief Scientist in DART.
Ron’s interests include cutting-edge technology, education, longevity research, philosophy, and diving.
Mr Zhuang Weiliang
Mr Zhuang Weiliang has more than 10 years of experience in Intelligence, Weiliang started out in Singapore Armed Forces (SAF) as an Intelligence Officer specializing in analyzing information and production of Intelligence products related to the region.
He transited to the Defence Cyber Organisation (DCO) in MINDEF later in his career, dealing with intelligence collection and analysis of cyber threats pertaining to Singapore. He has also set up the collection and analysis systems while he was there.
He later joined Ensign as a Lead Consultant where he started the Cyber Threat Intelligence (CTI) team providing intelligence products to clients and kept abreast of potential cyber threats. He was also involved in Incident Response and Malware Analysis during his time in Ensign.
As a Lead Trainer at DART, Weiliang’s focus is to train new cyber experts and researchers.
Outside of work Weiliang spends most of his time in Crossfit, Ultimate Frisbee, and keeping up to date with the latest technologies.
Insight from Instructor
“A talented pen tester could simulate a potential attacker and find possible threats, holes and security breaches. Thanks to the pen testers work, the security team could cover those breaches and better protect the network.
This course will cover the entire cyber kill-chain, the students will gain hands on experience with the different parts of an attack and will practice the attacker’s mind set.
With the technical skills and with the attacker’s thinking and point of view, the analysts could better assess the network and find security threats real attackers might use.”
Total Nett Programme Fee Payable, Including GST, after additional funding from the various funding schemes
Participants must fulfill at least 75% attendance and pass all assessment components to be eligible for SSG funding.
To enquire, email firstname.lastname@example.org
To register, click Register
TGS-2020503220 (Synchronous e-learning)
Select Short Course / Modular Course -> Apply for Myself -> Browse Academic Modules / Short Courses-> Module/Course Category -> Short Courses -> Browse Courses-> Strategic Tech Mgt Institute (Faculty/Department / Unit)
Please download the user guide for NUS Online Application Portal after you click ‘Apply for Myself’ if you need assistance.
Course Fee Breakdown
Singapore Citizens39 years old or younger
Singapore Citizen40 years old or older