Professional Certification in Cyber Security and Intelligence
Cyber warfare is unfortunately no longer found only in science fiction stories; it is with us today. Distributed denial-of-service (DDoS) attacks have been launched against many military and government computer systems around the world in recent years. The technological advancements in computers, software, networks and information systems in general have actually made technologically dependent countries more vulnerable to disruption. Physical security is now permanently tied to cyber security. Cyber weapons are a relatively new type of weaponry with various effects on the target. They are usually basic scripts that have the objective to defend or attack a target. It doesn't have any limitations of use and can achieve most of the goals set. Most of them are freely available on the internet but some more sophisticated or newer ones are kept privately or are commercial. Securing infrastructure against cyber-attacks has become one of every nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must be fully trained and aware of possible threats and strongly defend against a variety of threats.
Gain the Skills Set To Be A Cyber Threat Intelligence Specialist
Today’s secure environment will have vulnerabilities in it tomorrow, so an organization cannot allow itself to become complacent. With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different forms of attack. As a result, every company’s day-to-day operations, data and intellectual property are seriously at risk. In a corporate context, a cyber attack can not only damage your brand and reputation, it can also result in loss of competitive advantage, create legal/regulatory noncompliance and cause steep financial damage.
There is only so much an organization can do by defending itself against threats that have already occurred. If an organization only reacts to new threats as they come up, are likely acting too late. It is important to understand and prioritize cyber threat intelligence processes, and how they can be integrated into an organization’s security operations in a way that adds value.
The objective of this 2 Day Professional Certification is to provide practical and usable information to professionals on how to protect both infrastructure and data from the destruction of cyber terrorism and associated cybercrimes. At the end of the module, you will be able to:
- Understand the basic principles and philosophies of cyber terrorism and how individuals and corporations can be targeted
- Identify possible threats facing your organization information assets and infrastructure
- Provide your organization with complete assessment of organizational security policy, design and implementation.
- What are legal constraints on cyber warfare
- Main defense strategy
- Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces
Who Must Attend?
- Anyone who wishes to know what constitutes social media fraud and wants to avoid being a target;
- Working professionals, such as managers and engineers in the IT, security and legal industries;
- Auditors who want to build deeper technical skills;
- Corporate attorneys and legal professionals;
- Anyone who wants to know how to protect their company data and confidential information.
“This was my second workshop with Ali. He is definitely still a great teacher and an irreplaceable resource for best practice tips and questions on current events in the industry. The number one quality that I like about Ali and his courses is that he is extremely patient, well-prepared and succinct.”
Juliana Low, Assistant Manager for Spotify Singapore
“Ali did an incredible job. I have been to hundreds of hours of training seminars and this is one of the best. I actually learned useful, practical materials and greatly improved my logic for my work and personal life. This is how corporate training should benefit participants.”
Mohammad Ismail, Business Development Manager for the Ministry of Manpower, Singapore
“The class size was kept to a moderate size which was a big relief – I was able to maximise my engagement and learning in this specialised course. Ali was also able to answer all my questions. He is definitely a subject expert in his field. I will be enrolling in the Graduate Diploma Programme that he is also facilitating.”
Shruti Krishnan, IT Development Manager, Singapore Customs
Subject Matter Expert for Singapore Cyber Incident Response Centre at Daimler AG
Terence takes care of incidents affecting assets, managing high severity incidents and determining remediation action, incident coordination for stakeholders and after-action review at Daimler AG. He establishes compliance procedures for cyber security incidents relating to personal identifiable information (PII) in European Union – GDPR, and in APAC. He obtained his Master of IP and Innovation Management from Singapore University of Social Sciences and a BSc (Hons) in Computing from University of Portsmouth. He has conducted many cyber security trainings at various organisations such as DBS HK, KnowledgeTree and MDIS.