
1. Proactively implement sound security protocols to mitigate security risks. 2. Quickly respond to security issues . 3. Retroactively identify where security breaches may have occurred. 4. Design the network, onsite or in the cloud with security mind.
1. Networking Security -Explain the security function and purpose of network devices and technologies -Apply and implement secure network administration principles -Distinguish and differentiate network design elements and compounds -Implement and use common protocols -Identify commonly used default network ports -Implement wireless network in a secure manner 2. Compliance and Operational Security -Explain risk related concepts -Carry out appropriate risk mitigation strategies -Execute appropriate incident response procedures -Explain the importance of security related awareness and training -Compare and contrast aspects of business continuity -Explain the impact and proper use of environmental controls -Execute disaster recovery plans and procedures -Exemplify the concepts of confidentiality, integrity and availability (CIA) 3. Threats And Vulnerabilities -Analyse and differentiate among types of malware -Analyse and differentiate among types of attacks -Analyse and differentiate among types of social engineering attacks -Analyse and differentiate among types of wireless attacks -Analyse and differentiate among types of application attacks -Analyse and differentiate among types of mitigation and deterrent techniques -Implement assessment tools and techniques to discover security threats and vulnerabilities -Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning 4. Application, data and host security -Explain the importance of application security -Carry out appropriate procedures to establish host security -Explain the importance of data security 5. Access control and identity management -Explain the function and purpose of authentication services -Explain the fundamental concepts and best practices related to authentication, authorisation and access control -Implement appropriate security controls when performing account management 6. Cryptography -Summarise general cryptography concepts -Use and apply appropriate cryptographic tools and products -Explain the concepts of public key infrastructure -Implement PKI, certificate management and associated components
Not Specified
5 days
Not Specified
Foundation
Training Programme provided by SIRIM
View More
Cryptography

Cyber and Data Breach Incident Management

Cyber Incident Management

Cyber Risk Management

Cybersecurity Basics

Data Governance

Database Security

Digital and AI Fluency

IT Governance

Malware Analysis

Network and Systems Administration

Network Configuration and Troubleshooting

Network Security

Security Administration

Security Programme Management

Threat Analysis and Defence

Threat Intelligence and Detection

Vulnerability Assessment and Penetration Testing