Facebook Bundle Programme - Cyber Security (SGUS) - Products - Lithan Skip to Content

SPActivityHub SPActivityHub

Hi there!

How would you like to engage with us?

Email

Product Product

Bundle Programme - Cyber Security (SGUS)

One month Full time per module (6 months in total) Online Synchronous Sessions by the Instructor & Mentor

What do I Get?

Acquire Cyber Security Skills

Learn Cyber Security fundamentals to protect current threat landscape by demonstrating hardening tactics to make a breach more difficult and costly for a hacker to execute and learn early threat detection, classify the extent of a system breach and respond to security incident effectively to minimize the business impact

Online Synchronous Sessions

We deliver online synchronous sessions by the Instructor & Mentor through a combination of instructor-led flipped classes and personalised mentoring with industry practitioners for the assignments and projects to greatly increase your efficiency and effectiveness in acquiring knowledge and skills.

Job Placement Assistance

We will assist you in getting hired with more than 50 hiring employers working with us.

SGUS Funding

Eligible Singapore Citizens / Permanent Residents can receive funding* under SGUS scheme.  

*Terms and conditions apply. Refer the price column

Audience and Certificates

Target Audience

  • PMETs with a minimum of three years' working experience in an IT Environment want to acquire IT security implementation skills to assume the Job role of Cyber Security Consultant.

Prerequisite

Academic Level: ITE or Polytechnic diploma 

Graduation Requirements

  • Minimum attendance of 75% for all sessions in each of the modules.
  • Should be assessed Competent (C) in each of the modules

Certificate(s)

  • Statement of Attainment by SSG, Singapore: ICT-OUS-3015-1.1 Threat Intelligence and Detection

  • Statement of Attainment by SSG, Singapore: ICT-OUS-3003-1.1 Cyber Incident Management

  • Statement of Attainment by SSG, Singapore: ICT-DIT-3013-1.1:Security Programme Management

  • Statement of Attainment by SSG, Singapore: ICT-OUS-3012-1.1:Security Administration

  • Statement of Attainment by SSG, Singapore: ICT-SNA-4021-1.1: Security Strategy

  • Statement of Attainment by SSG, Singapore: ICT-DIT-2008-1.1: Infrastructure Deployment

  • Statement of Attainment by SSG, Singapore: ICT-SNA-5021-1.1 : Security Strategy

Blended Learning Journey

(363 Hours)

E-Learning

90 Hours

Projects / Assignments

180 hours

Flipped Class/Mentoring

90 hours

Assessment

3 hours

Modules

NICF-CyberSecurity Planning (SF) (Synch & Asynch E-Learning)

The learner will learn how to improve security posture in a Microsoft 365 environment and how Microsoft 365 could support your organization’s digital transformation and how to do a technical vulnerability assessment in a Microsoft 365 environment.

Session Plan

More Details

Learning Outcome

Knowledge

By the end of this module, the learner should be able to gain the following knowledge:

  • Understand the fundamental concepts of Confidentially, integrality and Availability, and Multi-layer Defense from Governance, Risk and Compliance perspective  
  • Learn to create privacy solutions that are aligned with organizational goals and risk appetite with the ability to implement privacy by design to enable organizations to enhance privacy technology platforms that provide benefits to consumers, build  trust and advance data privacy  
  • Learn the various types of Threats, Attacks, and Vulnerabilities of computer systems using Lockheed Martin Kill Chain and MITRE ATT@CK attack framework 

Skills

By the end of this module, the learner should be able to apply the following skills: 

  • Implement cybersecurity control using the Center of Internet Security (CIS) Framework Version 7.1 for a secure Workplace.  
  • Prepare, manage and respond to a Cyber Incident using NIST SP800-60 Framework  
  • Conduct a Technical Security Assessment to assess an organization security posture using Microsoft CSAT with hand-on Lab Assignment in a cyber range and perform a simulated real-life cybersecurity Assessment Project   

Other Information

Course Code: CRS-Q-0035333-ICT

Funding Validity Period: Until 22-Nov-2022

Course Developer: Lithan Academy  

NICF-CyberSecurity Administration(SF) (Sync & Async E-Learning)

Learn best practices on how to use PowerShell securely and how to use PowerShell to enhance security.As you build a cybersecurity defense plan, learn best practices around Active Directory, Azure Active Directory, and identity management.Learn how to plan, implement, and manage security in Office 365.

 

Session Plan

More Details

Learning Outcome

Knowledge

  • Windows PowerShell Fundamentals
  • PowerShell Operational Security
  • Windows PowerShell based Exploits
  • Identity as a Service
  • Privilege Identity Access Management 
  • Active Directory Security
  • Active Directory And Kerberos Protocol
  • Introduction to Security in Office 365
  • Microsoft Advanced Threat Protection
  • Microsoft Threat Intelligence
  • Security and Compliance Center
  • Advanced Security Management

Skills

  • Managing Local Script Execution
  • Managing Remote Execution
  • Implementing PowerShell-based Security
  • Mitigating PowerShell-based exploits
  • Managing Identity
  • Securing Active Directory
  • Securing Azure Active Directory
  • Implementing Microsoft 365 Advanced Threat Protection
  • Using Microsoft 365 Threat Intelligence
  • Implementing audit, insights, and alerts in Azure
  • Implementing Advanced Security Management
  • Authenticating Users
  • Authorizing Users to Access Resource 
  • Protecting Data with encryption
  • Conducting a Simulated Cyber Attack 
     

Other Information

Module Fee: SGD 3000  

Funding Validity Period: Until 22-Nov-2020 

Module Duration: 5 Weeks Part time /  2 Weeks full time   

Course Developer: Lithan Academy 

NICF-Host and Cloud CyberSecurity (SF) (Sync and Async E-Learning)

Dive into the new security architecture and features of Windows 10, and learn how to enable them, as you explore today’s security threat landscape.Take a deep dive into the new layers of protection built into Windows Server 2016. Learn to further safeguard against security breaches by blocking malicious attacks and enhancing the security of your virtual machines, applications, and data.Understand the current nature of the security threat landscape and study the new security architecture and features of Microsoft Azure.

Session Plan

More Details

Learning Outcome

Knowledge

  • The Evolution of attacks
  • Windows 10 software security features
  • Server Hardening Concepts
  • Secure Administration Concepts
  • Containers §Secure virtualisation
  • Azure Security Architecture
  • Azure Security and Operations Management
  • Azure Security Services Enterprise Mobility and Security Services

Skills

  • Server Hardening
  • Service Configuration
  • Account Configuration
  • Application restriction
  • Secure Administration 
  • Isolate workload with Containers
  • Securing Virtualisation
  • Using Secure Boot
  • Using Windows Defender Firewall
  • Using Virtual Secure Mode
  • Using Credential Guard
  • Using Bitlocker
  • Using Antivirus
  • Using Device Guard
  • Using Windows Defender Smartscreen  

Other Information

Module Fee: SGD 3000  

Funding Validity Period: Until 22-Nov-2020 

Module Duration: 5 Weeks Part time /  2 Weeks full time   

Course Developer: Lithan Academy 

Knowledge

• Process for site preparation
• Capacity and performance tests for on-site systems
• Impact analysis of new infrastructure deployment or removal
• Safety and quality standards
• Installation tests on infrastructure components
• Diagnostic tools for infrastructure-related problems

Skills

• Prepare the site location in ensuring that necessary infrastructure is in place
• Test on-site systems performance and capacity to support requirements
• Conduct basic impact analysis of new infrastructure deployment or removal
• Deploy and decommission infrastructure components and associated equipment in accordance to a set plan and safety and quality procedures
• Perform simple deactivation of system components, if required
• Conduct installation tests on infrastructure components to check for performance
• Document malfunctions in infrastructure components, and their corrections deployed
• Resolve simple to semi-complex problems in infrastructure components and associated equipment using appropriate tools

NICF-CyberSecurity Management Capstone(SF) - (Sync and Async E-Learning))

Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all Information Management Professional have  to endure. This Capstone Project  aims to produce  top-level information security executives. Learner will be equipped with Knowledge and Skills to build a successful information management program for various size organizations. The Capstone project does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. This session will cover the GRC framework (Governance, Risk and Compliance) with the NIST Cybersecurity framework (Identify, Protect, Detect, Respond and Recover) and strategic program development to create a secured workplace for a digital enterprise.   The capstone project  was developed for current and aspiring Information Security Manager. 

Session Plan

More Details

Learning Outcome

Knowledge

• Goal setting and objectives of organization security

• Best practices and emerging technologies in security control

• Information security and assurance strategy

• Best practices and emerging technologies in security control

• Gap analysis in organization security

• Implications and impact of security gaps

Skills

•Formulate security goals and objectives based on an integrated understanding of business priorities, the overarching security vision and strategy directions, and defined security management benchmarks

•Establish standards and practices to protect the integrity, authenticity and confidentiality of Information

•Manage compliance with information security guidelines and classification or permission rules

•Lead communication of security goals and objectives to the organisation

•Develop strategies and plans to resolve security gaps

Other Information

Module Fee: SGD 3000  

Funding Validity Period: Until 22-Nov-2020 

Module Duration: 5 Weeks Part-time /  2 Weeks full time   

Course Developer: Lithan Academy 

NICF-Application Implementation (SF) (Sync & Async E-Learning)

Digital applications implementation will be a critical skills for future ready talents. Learners will gain understanding of software development life cycle for supporting digital applications development and implementation. Learners will be equipped with end-user application development skills to rapidly build low-code apps that modernize business processes for developing a connected workplace that deliver straight through processing capabilities.

Session Plan

More Details

Learning Outcome

Agile Leadership & Management

In the volatile world that we live in today, success belongs to businesses with the capacity to create and respond to change effectively. Creating change breeds innovation and disrupts your competitors' hold in the market. Responding to change effectively helps to guard your business against competitive thrusts. The Agile approach has been used by many businesses to thrive in a volatile market. Agile enables organizations to master continuous change. It helps businesses to flourish in a market that is volatile, uncertain, complex and ambiguous (VUCA). To meet changing business requirements and adapt to new technologies, digital enterprise could try to become more Agile.  But what does it means “be Agile”? Agile isn’t a single framework or standards and it’s not just for software development and any more. Today, it is widely used in Business Venture creation, Project Management, Product Management, services management, and many more.  Agile has guiding values and principles, but it’s more about perspective, rather than prescription.  There isn’t a single downloadable set of artifacts and rules that makes your organization instantly “Agile’. Think about Agile as a mindset.  The first part of the course focus on different types of leadership style and what set Agile Leadership apart from the traditional leadership style. How we could apply the agile leadership on-top the traditional leadership style The second part of the course focuses on what Agile is and its methodologies. The third part of the course emphasizes the drivers and processes that drive Agile implementation. Learners will gain not only knowledge on the Agile Approach but also how they can apply the Agile approach to their businesses

Session Plan

More Details

Learning Outcome

Pricing and Funding

SGD 14000.00

Pricing

Fee Description

Detailed Breakdown

SHARE THIS PAGE

Share This