NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd



Similar documents
Cyber Security Operations Associate

Cyber Security Operations Specialist

Table of Contents. Introduction. Audience. At Course Completion

Cyber Governance Preparing for the Inevitable Perimeter Breach

R49 Using SAP Payment Engine for payment transactions. Process Diagram

The fast track to top skills and top jobs in cyber. Guaranteed.

CYBER SECURITY TRAINING SAFE AND SECURE

MSc Cyber Security. identity. hacker. virus. network. information

A Decision Maker s Guide to Securing an IT Infrastructure

Bellevue University Cybersecurity Programs & Courses

Cyber Security solutions

IT and Cyber Security Training Courses

Hackers are here. Where are you?

CESG Certification of Cyber Security Training Courses

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Deliver Secure, User-Friendly Access to Mobile Business Apps

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

McAfee Security Architectures for the Public Sector

Simplify and Secure Cloud Access to Critical Business Data

EC-Council Certified Security Analyst (ECSA)

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Protect Your Connected Business Systems by Identifying and Analyzing Threats

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION)

Hackers are here. Where are you?

SAP Security Recommendations December Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

CyberNEXS Global Services

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Εmerging Ways to Protect your Network

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

How small and medium-sized enterprises can formulate an information security management system

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Partner Certification to Operate SAP Solutions and SAP Software Environments

SAP Solution Manager: The IT Solution from SAP for IT Service Management and More

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Information Technology Cluster

Information Security. Training

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager

EC-Council. Certified Ethical Hacker. Program Brochure

SuccessFactors Global Human Capital Management (HCM) Academy and Admin Training Schedule (Q3 Q4 2014)

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Learning Without Limits

Microsoft Technologies

The Cyber Threat Profiler

Minnesota State Community and Technical College Detroit Lakes Campus

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Thales Service Definition for PSN Secure Gateway Service for Cloud Services

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Cyber Essentials Scheme

Penetration testing & Ethical Hacking. Security Week 2014

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Cloud Security Specialist Certification Self-Study Kit Bundle

External Supplier Control Requirements

Ethical Hacking Agreement for External Network Security Unannounced Penetration Test

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Analyze. Secure. Defend. Do you hold ECSA credential?

Information Systems Security Certificate Program

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

Price and Revenue Management - Manual Price Changes. SAP Best Practices for Retail

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Hosts HARDENING WINDOWS NETWORKS TRAINING

How To Secure An Rsa Authentication Agent

INFORMATION SECURITY TRAINING CATALOG (2015)

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

43% Figure 1: Targeted Attack Campaign Diagram

HR WSQ Qualifications. Certified HR Professional Programmes

Trend Micro. Advanced Security Built for the Cloud

Security Services. 30 years of experience in IT business

Server Virtualization with Windows Server Hyper-V and System Center (20409) H8B93S

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E April 2016

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Protecting Your Organisation from Targeted Cyber Intrusion

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

IT Security Testing Services

The Business Case for Security Information Management

HP IT Professional Help Desk for SMB Service HP Care Pack Services

Transcription:

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd NICF Cyber Security Operations Specialist Page 1

Cyber Security Operations Essentials 1. Cyber Defence Knowledge Build-up Understand the concept of cyber security 2. Security Tools Hands-On Exercise Familiarise the basic functions of security products NICF-ACCREDITED Cyber Security Operations Specialist 3. Scenario-based Training Experience real cyber-attacks in emulated realworld environment Training Benefits Cyber Security Training based on DigiSAFE Cyber Security Centre s Cyber Trainer System benefits trainees by enhancing their ability to: 1. Appreciate the entire kill-chain of various cyber- attacks 2. Develop improved response to cyber attacks 3. Enhance decision-making in the event of cyber-attacks 4. Enhance the collaboration between teammates working together Who Should Attend Cyber Security Professionals looking to upskill their level of security operations proficiency IT Professionals / Engineers looking to multi-skill themselves in cyber security operations or looking to take on a cyber-security related job role System / Network Administrators requiring a better understanding of cyber security operations Information Security Managers and Executives involved in cyber security operations Project Managers, Risk Managers and Compliance Managers who require an understanding of cyber security operations processes and outcomes NICF Cyber Security Operations Specialist Page 2

Course Focus Real-World, Operations-Centric Cyber Defence Training State-of-the-Art Cyber Training Platform Emulation of real-world conditions such as network structure, network characteristics, and traffic, with real malware and exploits. True and accurate reflection of what it would be like to experience the entire kill-chain of cyberattack(s) in a controlled environment First in Singapore and the region Course Structure Day One a. Cyber Security Imperatives Cyber threats, trends, terms and terminologies CIA, AAA, standards, audit, compliance and regulations Cryptography and applications b. Network Technologies and Security Introduction to network systems, types and devices Secure network protocol (SSL/TLS, SSH) Introduction to network security devices (Firewall, IPS/IDS, SIEM, etc.) c. Server Systems and Logs Types and functions of servers (web, database, mail, AD, etc.) OS, servers and their event logs (Windows, Linux,IIS, Apache, Mssql, sendmail and etc.) Day Two d. Attack Methodology and Types Attack phases Types of vulnerabilities and attacks Web-based attack (OWASP top 10) e. Security Operations Centre and Incident Response Different types of information security incident Information security incident management framework Overview to SOC concepts and operations Threat identification, threat correlation, threat aggregation, threat filtering (through applications and server logs) Incident handling, response management, notification and reporting f. Security Products and Hands-On Checkpoint Firewall, Security Information and Event Management(SIEM) Monitoring tools such as Wireshark, Process Monitor Day Three to Five g. Security Operations Centre Cyber-Attack Scenario-based Exercises Exposure to real-world cyber-attack scenarios Developing detection, and response skills through team-based exercises NICF Cyber Security Operations Specialist Page 3

About the Trainers Trainers conducting the Cyber Security Operations Specialist include: Zhang Youwei Principal Trainer / System Lead Zhang Youwei is a Cyber Security Engineer and Trainer at ST Electronics (Info-Security) Pte Ltd. He is experienced in the hardware aspects of Information Technology particularly quality assurance. More recently, Youwei redirected his focus to information security and cyber security. In his current capacity, Youwei is the Systems Lead for DigiSAFE Cyber Security Centre a Cyber Security Centre of Excellence housing a state-of-the-art Cyber Trainer Platform that delivers cyber scenarios-based experiential training, which is the first, and only-of-its-kind in Singapore and the region. He administers and operates the Cyber Trainer Platform for training, and also supports curriculum development and improvement. From a systems perspective, he is also the anchor in all customer and partner engagement. Prior to his current role, Youwei was with Advanced Micro Devices under the EDB LOT Programme. During his time in AMD, he was part of the Advanced Testing and Characterisation team with the responsibilities of formulating test scripts, analysing data and correlating subsequent results on new products. In that role, he received two awards, one individual and one as part of a group, for process improvement. Zhang Youwei holds a Bachelor of Engineering degree from National University of Singapore. He is also a Qualified Information Security Professional (AISP), and is pursuing a Certified Ethical Hacking (CEH) certification from EC Council. Sangita Hadap Curriculum Manager / Trainer Sangita Hadap is the Curriculum Manager and Trainer, Cyber Security Development at ST Electronics (Info-Security) Pte Ltd. Her key anchor is in curriculum development and also supports training. She has several years of experience in the Systems Server Administration, Networking and Security aspects of Information Technology. Sangita brings along more than a decade of experience in IT training and support. She held positions as an IT Specialist and Senior Training Consultant which involved diversified training methodologies and managing the systems. She has also done her project for Security in Private Clouds which covered the review of different Standards presently practiced in the industry like ISO27001, authentication and authorization protocol languages, data security, compliance and risk issues involved in it. Sangita Hadap holds a Masters in Information Security from University of London Royal College Holloway. She is a Comptia and Microsoft Certified Trainer, ITIL Foundation certified and also holds the ACTA certification from WDA. NICF Cyber Security Operations Specialist Page 4

Course Details COURSE INFORMATION Course Schedule for Year 2015: Time: Venue: 24 28 August 7 11 September 12 16 October 16 20 November 14 18 December Day 1 5: Starts at 9:30am 5-day programme DigiSAFE Cyber Security Centre 80 Jurong East Street 21, #04-02 Devan Nair Institute, Singapore 609607 Singaporeans and Permanent Residents International Students Full Course Fee $4,800.00 $5,136.00 Less: 70% WDA Funding $3,360.00 Net Course Fee $1,440.00 + $100.80 (GST 7% on net course fee) Fee Payable $1,540.80 i) Enhanced Training Support for Small & Medium Enterprises (SMEs) Less: additional 20% funding $960.00 Fee after funding ii) *additional funding to be claimed through SkillsConnect directly by the SME $580.80 (incl. of GST 7% on net course fee) Workfare Training Scheme (WTS) Funding Less: additional 25% funding $1,200.00 Fee Payable General Enquiries / Registration: $340.80 (incl. of GST 7% on net course fee) Ms Jolene Ng joleneng@stee.stengg.com +(65) 6513 9535 Note: (1) Terms and conditions apply for funding. (2) Assessment fee is inclusive as part of the course fee for the first time. Re-assessment fee and booking fee applies for participants who did not pass during the course. (3) Course fee is inclusive of lunch. (4) ST Electronics (Info-Security) Pte Ltd reserves the right to make amendments to the course agenda without prior notice. NICF Cyber Security Operations Specialist Page 5

www.digisafe.com/dcsc DigiSAFE Cyber Security Centre 80 Jurong East Street 21 #04-02 Singapore 609607 Phone : (65) 6513 9535 / (65) 6568 7118 Fax : (65) 6568 7226 Email : info_digisafe@stee.stengg.com No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of ST Electronics (Info- Security) Pte Ltd. The information contained herein may be changed without prior notice. These materials are provided by ST Electronics (Info-Security) Pte Ltd for informational purposes only, without representation or warranty of any kind, and ST Electronics (Info-Security) Pte Ltd shall not be liable for errors or omissions with respect to the materials. The only warranties for ST Electronics (Info-Security) Pte Ltd products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. NICF Cyber Security Operations Specialist Page 6