Cybersecurity Awareness Training
Singapore – 1 or 2 day enterprise training (online)
Ensure your organisation’s cybersecurity risks are mitigated while working-from-home
Why is cybersecurity awareness training important?
There is an epidemic of cybersecurity threats; no one’s data is safe. Cybersecurity training is essential knowledge that enterprises cannot afford to overlook.
In 2019, 96 per cent of organisations in Singapore suffered at least one breach due to external cyber attacks. Some examples of cybercrime in Singapore include the 2019 cyberattacks on the Ministry of Defence and Ministry of Health, and the 2018 Singhealth breaches; where hackers exfiltrated personal data of 1.5 million citizens. The private sector has not been spared: Facebook, Cathay Pacific and Marriott were just some of the high-profile organisations that were hacked and had sensitive information stolen.
Furthermore in 2019, Singapore companies were fined $1.28 million for Personal Data Protection Act (PDPA) breaches. With stricter PDPA laws enacted by the Singapore government, it is crucial for businesses to know how to safeguard their systems not only for safety, but for regulatory requirements.
As more high-profile cyber attacks as geared towards the most critical resource and element in an organisation – people – it is important that they must be educated and protected. This Cybersecurity Awareness Workshop will enable your users to safeguard themselves against cyber attacks and scams to protect your critical enterprise data.
Cybersecurity awareness training has become an indispensable component of cybersecurity strategy and implementation in an organization.
Cybersescurity awareness starts with the organization’s acknowledgement that their employees are the weakest cybersecurity link. Conversely, they’re also the first line of defense against cyber attacks. This training provides every employee with a fundamental understanding that there are imminent and ongoing cyber threats, preparing enterprise employees for common cyber attacks and threats.
This programme will create a security culture by training and preparing your employees to protect information and assets. In this way, clients can be ensured that potential dangers from insider threats and unaware employees are effectively mitigated.
Our curriculum can be tailored according to your organization’s learning objectives and training needs analysis.
Who is this for?
This programme is for all individuals involved with the use of computer systems in an organisation.
Introduction to Cybersecurity
Opprtunities and Threats: Learn about the basics of cybersecurity. Watch live hacking demos of how hackers get usernames and passwords through the internet as well as hands-on experience of finding out more about your home network and computers.
Cyber Attack Chain
How Hackers Plan Their Attacks: Learn about how hackers plan their cyber attacks through an 8-phase approach, the Cyber Attack Chain, and watch demonstration of hackers’ tools as well as learn how you can secure your work from home devices through security practises.
Accounts And Passwords Security
Am I Already Hacked: Learn how you can check if your accounts have been compromised as well as witness live access into the dark web of hackers and their operations and learn to protect your social accounts by looking through your privacy and security settings.
Device And Wireless Security
Is The Wireless Network I Am Connected To Safe? Learn how you can protect against wireless hacking as well as other hardware attacks. Attacks of wireless, USB and remote accesses and watch live hacking demo of web camera access and secure your devices while working from home or the office.
Social Attacks And Security
Did My Personal Data Just Get Stolen? Learn how hackers deploy tactics and techniques to lure users into transferring monetary funds or give up their personal data. Watch live social engineering attacks on browser and learn how you can protect against social attacks.
Singapore Personal Data Protection Laws
Is My Privacy Already Compromised? Learn about the Personal Data Protection Act and how it impacts their day-to-day operations at work. Identifying the type of information participants are working on can help them classify the level of confidentiality of data, and apply appropriate diligence to work on the data.
Liang Yang is a Cybersecurity Specialist at IBM.
He is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker and CompTIA Security+ cybersecurity consultant. Loi advises large enterprises including multiple fortune 500 companies on security strategy to protect against advanced threats.
Passionate about imparting his cybersecurity knowledge, Liang Yang also has a YouTube channel with a community of 200k+ avid subscribers.
Course Pricing & Schedule
Please email or call us for pricing and schedule. We tailor the programme according to your business schedule and intended audience.
Mode of Delivery
This programme will be conducted online, done face-to-face online with our instructional team, which consists of our main Instructor and 2-3 teaching assistants. The choice of video call platform will be based on client preference.
Frequently Asked Questions
Q. What are the most prevalent security threats in companies?
Spam is any kind of unwanted, unsolicited digital communication, not limited to direct emails, that gets sent to a large number of people. Spam is most prevalent through email but can also be found on Internet forums, text messages, blog comments and social media.
Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to obtain sensitive information such as usernames, passwords and credit card details. Types of phishing include:
- Email phishing
Cybercriminals trick recipients into believing that the message is from a trusted entity or is something they want or need – request from their bank, confirmation of social media passwords or note from someone in their company to download an attachment.
- Spear phishing
Spear phishing attacks are carefully designed to get the response from a specific, usually high-profile, recipient. It can be disguised in the form of an email from an online store about a recent purchase or a text message from your bank stating that your account may have been breached.
Malware is the overarching name for a number of malicious software variants, including viruses, ransomware and spyware. Malware is any software intentionally designed to damage devices, steal data and cause a mess. Infected systems can be identified if they are slowing down, crashing, repeated error messages showing, more pop-up ads, unfamiliar toolbars and icons and being redirected to unexpected websites or home pages.
4. Social Engineering
Social engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering is especially dangerous as it relies on human error rather than the security of an operating system.
As companies are often made up of many employees, it is essential for employees to be aware of the different ways cybercriminals can manipulate its victims and remain alert so as to not succumb to such cyberattacks.
Q. Is there a certificate granted at the end of the course?
Upon successful completion of the course, participants will be awarded a digital certificate by Vertical Institute. VI alumni use their course certificate to demonstrate skills to employers and their LinkedIn network.
Our cybersecurity course is well-regarded by top companies, who contribute to our curriculum and use our courses to train their own teams.
What Our Students Say
It was a great program, well paced with good examples and slides to demonstrate the techniques. Class size was good as well!
From the content to conduct, Vertical Institute is a great place to learn and network for those looking for a proven place to cultivate their skill set.
It was exciting how the instructional team kept us engaged throughout the entire session through quizzes, writing codes and guiding us to think creatively without “spoon-feeding” us.
Upskill yourself today
Upskill yourself today