Professional Certificate

Professional Certificate in Cybersecurity Fundamentals and Ethical Hacking

Programme Structure


Programme NameProgramme ScheduleMode of DeliveryProgramme Code
Introduction to Cybersecurity Programme12, 13 and 14 February 2025 | 9 am - 5.30 pmSynchronous e-LearningTGS-2022012743
Ethical Hacking and System Hardening19, 20 and 21 February 2025 | 9 am – 5.30 pmClassroom LearningTGS-2022012263
Duration 6 days

Programme Overview

Are you ready to fortify your understanding of cybersecurity from the ground up? Our comprehensive Professional Certificate is tailor-made for those seeking a profound grasp of cybersecurity essentials and the skills to plan and execute vulnerability assessments and penetration tests.

Foundations of Cybersecurity:
Uncover the bedrock of cybersecurity in the first course by delving into crucial concepts like cryptography, Public-Key Infrastructure (PKI), secure channels with TLS/SSL, network security protocols, and secure programming. Explore the fundamentals of system vulnerabilities and learn to safeguard against malicious attacks by adopting best practises for protecting your systems. Furthermore, observe and practise several cybersecurity tools to understand how relevant techniques work in practice.

Ethical Hacking and System Hardening:
The second course takes a hands-on, practice-oriented approach in understanding how cyberattacks target hosts, networks, and web servers. Actively engage in offensive and defensive tactics using a variety of tools and put the knowledge gained from the first course into practice. Learn to additionally harden your systems using crucial defense measures against potential threats.

Programme Objectives

This programme is designed for those who need to grasp the foundations of cybersecurity, and subsequently plan and conduct vulnerability assessment and penetration testing.

The first course covers the foundations of cybersecurity, and explains important key cybersecurity concepts and basic techniques, including: cryptography, Public-Key Infrastructure (PKI), secure channel using TLS/SSL, network security protocols, access control in Operating Systems, secure programming, as well as Web security. It also illustrates the fundamentals of how systems can fail due to malicious attacks, and how they can subsequently be protected and hardened. Several cybersecurity tools are also used to demonstrate how relevant cybersecurity techniques can work in practice.

The second course is practice-oriented which demonstrates how cyberattacks can target hosts, networks, and web servers. It also demonstrates how the target systems can subsequently be hardened. With its hands-on approach, the course puts cybersecurity knowledge and concepts into practice by employing various offensive and defensive tools in attacking and defending systems, respectively.

At the end of the programme, the learner will be able to:

  • Explain the CIA security requirements and recognise their breaches in recent security incidents
  • Describe and apply key concepts and mechanisms of principal protection mechanisms in cybersecurity, such as encryption, authentication, and secure channel
  • Identify the limitations of classical cryptographic schemes, and also recognize well-known attacks on vulnerable hosts, networks, and web servers
  • Utilise some basic security tools (e.g., OpenSSL, Wireshark) and security-related Linux commands to perform encryption and network traffic analysis
  • Pinpoint flaws in programs due to common insecure programming practices, and suggest improvements using more secure practices instead
  • Explain ethical hacking’s objectives, stages, and available tools
  • Utilise cybersecurity tools for footprinting and enumerating target systems
  • Utilise cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
  • Utilise cybersecurity tools for performing post-exploitation steps on exploited systems
  • Explain and apply possible counter measures against attacks

Job Role Readiness

It will prepare learners in the following job roles to perform their responsibilities more effectively/ It will prepare learners for the following job roles:

  • Associate Security Analyst
  • Penetration Tester

Who Should Attend

Mid-career PMETs and anyone would like to take up the role as Associate Security Analyst / Penetration Tester / Cyber Incident Investigator.

Prerequisites

    • Knowledge of basic computer programming, and preferably some experience in using Linux Operating System
    • Basic Computer networking

Instructors


Dr Sufatrio

Programme Fees


Singapore Citizens Singapore PRs Enhanced Training Support for SMEs International Participants
39 years old or younger 40 years old or older
S$1,765.80 S$685.80 S$1,765.80 S$685.80 S$5,886.00
  1. Total Nett Programme Fee Payable, including GST, after additional funding from various funding schemes.
  2. Participants must fulfill at least 75% attendance and pass all assessment components for all short courses within a professional certificate in order to be eligible for SSG funding.
  3. Please note that all external funding for courses is limited in duration and subject to eligibility and availability.