Course Detail()

7.00 CPE Hours (Category 1, Category 2, Category 3, Category 4, Others)
Classroom

Please be informed that in view of the current COVID-19 situation, we will be changing the format of this course into a Live Webinar. A detailed set of instructions on the Live Webinar will also be sent to you closer to date. Please sign up for a Zoom account (https://zoom.us/) if you currently do not have an account. 

Programme Objective

This course provides participants with an overview of cybersecurity concepts to facilitate:

  • Communication of security risks and initiatives with internal and external stakeholders
  • Preparing reports on cybersecurity risk management programmes to help senior management/directors/investors gain clarity on organisational efforts
  • Understanding the potential security risks inside organisations
  • Recognising how data breaches may occur and how to protect data

Programme Outline

Cybersecurity Intro

  • What is Cybersecurity?    
  • Why Do Accountants Care?
  • SOC Reporting for Cybersecurity

Cybersecurity Details

  • Networks
    • Why care about network structure?
    • What is a network?
    • Structure of the Internet
    • Routing & Addressing
  • Transmitting Information
    • Protocols
    • Data representation
  • URLs
  • Encryption methods
    • Databases
    • Digital Ledgers
    • Hashes


Vulnerabilities

  • Passwords
    • How safe is your password?
    • Dictionary Attacks
    • Brute Force Attacks
  • Social Engineering
    • Email Spoofing
    • Phishing
    • Spear Phishing
  • Malware
    • Viruses, Worms, Trojans, Rootkits, Backdoors
  • Exploits
    • Man-in-the-middle
    • Cross Site Scripting
    • SQL Injection
    • Buffer Overflow


Protections

  • Education
  • Patching
  • Data Backups
  • Cloud Storage


Wrap-Up

Training Methodology

Our curriculum is designed by trained MOE teachers with classroom teaching experience, who are also programmers with experience developing apps for startups and MNCs. We aim to adapt the best teaching materials available from all over the world, while supplementing them with best practices from our industry experience, to create the most effective courses for learners of all levels. In our classes, learners will be carefully guided through the basic concepts, before being challenged to apply these concepts. For these courses, it helps that our teachers possess a wealth of experience teaching, and many more hours of hands-on experience.

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

(Foundation level) 

  • Professionals looking to improve their cybersecurity knowledge.
  • Professionals looking to become conversationally fluent in discussing cybersecurity initiatives and potential security risks.

Schedule & Fees

Testimonial

Funding

No funding Available!

Programme Facilitator(s)

Please be informed that in view of the current COVID-19 situation, we will be changing the format of this course into a Live Webinar. A detailed set of instructions on the Live Webinar will also be sent to you closer to date. Please sign up for a Zoom account (https://zoom.us/) if you currently do not have an account. 

Programme Objective

This course provides participants with an overview of cybersecurity concepts to facilitate:

  • Communication of security risks and initiatives with internal and external stakeholders
  • Preparing reports on cybersecurity risk management programmes to help senior management/directors/investors gain clarity on organisational efforts
  • Understanding the potential security risks inside organisations
  • Recognising how data breaches may occur and how to protect data

Programme Outline

Cybersecurity Intro

  • What is Cybersecurity?    
  • Why Do Accountants Care?
  • SOC Reporting for Cybersecurity

Cybersecurity Details

  • Networks
    • Why care about network structure?
    • What is a network?
    • Structure of the Internet
    • Routing & Addressing
  • Transmitting Information
    • Protocols
    • Data representation
  • URLs
  • Encryption methods
    • Databases
    • Digital Ledgers
    • Hashes


Vulnerabilities

  • Passwords
    • How safe is your password?
    • Dictionary Attacks
    • Brute Force Attacks
  • Social Engineering
    • Email Spoofing
    • Phishing
    • Spear Phishing
  • Malware
    • Viruses, Worms, Trojans, Rootkits, Backdoors
  • Exploits
    • Man-in-the-middle
    • Cross Site Scripting
    • SQL Injection
    • Buffer Overflow


Protections

  • Education
  • Patching
  • Data Backups
  • Cloud Storage


Wrap-Up

Training Methodology

Our curriculum is designed by trained MOE teachers with classroom teaching experience, who are also programmers with experience developing apps for startups and MNCs. We aim to adapt the best teaching materials available from all over the world, while supplementing them with best practices from our industry experience, to create the most effective courses for learners of all levels. In our classes, learners will be carefully guided through the basic concepts, before being challenged to apply these concepts. For these courses, it helps that our teachers possess a wealth of experience teaching, and many more hours of hands-on experience.

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

(Foundation level) 

  • Professionals looking to improve their cybersecurity knowledge.
  • Professionals looking to become conversationally fluent in discussing cybersecurity initiatives and potential security risks.

Programme Facilitator(s)


No course instances or course instance sessions available.