The objective of this 2-day course is to provide an overview of cybersecurity to a broad audience. We will cover foundational topics but will emphasize examples, applications and techniques to raise awareness on the most fundamental cybersecurity concepts, attack vectors and good practices.
The objective of this 2-day course is to provide an overview of cybersecurity to a broad audience. We will cover foundational topics but will emphasize examples, applications and techniques to raise awareness on the most fundamental cybersecurity concepts, attack vectors and good practices.
Objectives:
SUTD is established to advance knowledge and nurture technically grounded leaders and innovators to serve societal needs.
Our Vision and Mission continue to drive us into our next phase of growth. Join us and support us in making an impact to student learning and development of breakthrough innovation.
We partner other universities to deliver a myriad of opportunities for our students, faculty, partners and staff. Collaborations cover the areas of developing and advancing curriculum, research and exchanges.
This programme is also aligned with the plans laid out in the National Cyber Security Masterplan 2018 and one of the key areas of focus is to grow Singapore’s pool of cyber security experts.
This introductory certification course is the fastest way to get up to speed in information security. Written and taught by battle-scarred security veterans, this entry-level course covers a broad spectrum of security topics and is liberally sprinkled with real life examples.
The C|CISO certification program is designed to bring middle managers up to the level of Executive Leaders & hone the skills of existing InfoSec leaders.
This Certified Cloud Security Professional (CCSP) training course is the leading certification by (ISC)². This course will enable you to negate security threats to your cloud storage by understanding information security risks and implementing strategies to maintain data security.
As organisations embrace digitalisation to transform business and operations, it is critical to develop policies, procedures and controls to manage technology-related risks. The frequency and scale of cyber attacks and breaches have escalated.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy