Skip Main Navigation
Page Content

Save This Event

Event Saved

Principles of Information Security Controls (23 – 25 June 2020)

SGInnovate and Tegasus

Tuesday, June 23, 2020 at 9:00 AM - Thursday, June 25, 2020 at 5:30 PM (Singapore Standard Time Singapore Time)

Principles of Information Security Controls (23 – 25...

Ticket Information

Ticket Type Sales End Price Fee
Quantity
Promotional Ticket (Ticket Inclusive of G.S.T)
Addon Ticket Description: Ticket price is inclusive of GST. If you are organisation-sponsored and require a Tax Invoice, please contact learning@sginnovate.com, instead of checking out via PayPal. Eligible funding is on a reimbursement basis upon fulfilment of each funding criteria.
Jun 20, 2020 $1,070.00 $0.00
Bundle Ticket (Ticket Inclusive of G.S.T)
Addon Ticket Description: Ticket price is inclusive of GST. If you are organisation-sponsored and require a Tax Invoice, please contact learning@sginnovate.com, instead of checking out via PayPal. Eligible funding is on a reimbursement basis upon fulfilment of each funding criteria.
Jun 19, 2020 $1,926.00 $0.00

Share Principles of Information Security Controls (23 – 25 June 2020)

Event Details

Overview

 

Are you and your organisation ready to manage and respond to cyber-attacks?

 

This three-day online workshop is the second installation of the Cybersecurity Professional Series aimed at equipping you and your organisation in building a robust cyber defence system. 

 

Throughout this online workshop, you will be able to identify key security risks and problems posed by new technologies and business practices, and define security specifications of system components, that address security objectives and functional requirements. 

 

By the end of the online course, you will learn how to design secure systems and controls based on IT architectural guidelines, and requirements by incorporating controls into security system components to minimise security breaches or lapses. While designing your own secure systems, you will also learn how to check for an adequate level of security robustness in system designs.

 

This online workshop is designed for participants who have interest in Cybersecurity or would like to use their understanding of Cybersecurity concepts to improve their working posture in this organisation and help formulate Cybersecurity best practices to safeguard organisation interest. This can be a good starting point for participants who would like to pursue a career in the Cybersecurity field as well.

 

This workshop is eligible for funding support. For more details, please refer to the "Pricing" tab above.

 

In this workshop, participants will learn about: 

  • Fundamentals of information security
  • Information security
  • Communications and network security
  • Security assessment and testing
  • Security operations

Prerequisites:

  • An interest in Cybersecurity

Pre-Workshop Instructions:

  • You MUST have a stable wifi connection to join the online workshop via your laptop

Agenda

 

Day 1 (23 June 2020)

 

8:45am – 9:00am: Online Registration
9:00am – 10:45am: Fundamentals of Information Security

  • Fundamentals of information security
  • Information security ecosystem
  • Recap (risk assessment, risk analysis, risk management and ongoing risk monitoring)
  • Recap (Confidentiality, Integrity and Availability (CIA triad))
  • Information classification, Information valuation and Information life cycle
  • Security clearance

Exercise: information classification, justification and impact

  • Information security controls/protection

10:45am – 11:00am: Break
11:00am – 12:15pm: Fundamentals of Information Security (Cont’d)

  • Information security controls/protection

Exercise – information classification and controls application 

  • Information security control frameworks

12:15pm – 1:15pm: Lunch Break
1:15pm – 3:15pm: Communications and Network Security (Part 1)

  • Network architecture and design
  • Understanding Internet, Intranet & Extranet
  • Understanding LAN, WAN, MAN, PAN, CAN and GAN
  • LAN, WAN, MAN, PAN and GAN connection technologies

3:15pm – 3:30pm: Break
3:30pm – 5:30pm: Communications and Network Security (Part 2)

  • Simplex, half-duplex and full-duplex communication
  • Circuit-switched and packet-switched networks
  • Understanding secure network architecture

5:30pm – 5:45pm: Closing Remarks / Q&A

 

Day 2 (24 June 2020)

 

8:45am – 9:00am: Online Registration
9:00am – 10:40am: Communications and Network Security (Part 3)

  • Understanding OSI reference model
  • OSI model (layer 1 to layer 7), its functions, and pros and cons
  • Threats to network security
  • Secure network devices and protocols (layer 1 to layer 7)

Exercise: Design a highly secure network architecture 

 

10:40am – 10:55am: Break
10:55am – 12:15pm: Communications and Network Security (Part 4)

  • Protocols for Point-to-Point (PPP) authentication
  • CHAP - Challenge-handshake authentication protocol
  • 802.1X and Extensible Authentication Protocol (EAP)
  • Protocols for Authentication, Authorisation, Accounting (AAA)

12:15pm – 1:15pm: Lunch Break
1:15pm – 2:15pm: Communications and Network Security (Part 5)

  • Wireless encryption

Exercise: Design a secure corporate network 

  • Other protocols for secure communications

1:15pm – 3:15pm: Security Assessment and Testing

  • Understanding security assessment
  • Understanding security audits
  • Vulnerability assessment and penetration testing
  • Vulnerability scanning

3:15pm – 3:30pm: Break
3:30pm – 5:30pm: Security Assessment and Testing (Cont’d)

  • Testing methodology
  • Testing guidelines
  • Testing considerations
  • Testing – rules of engagement, types of penetration tests, software testing methods (dynamic testing vs static testing, black-box vs white-box testing)
  • Testing – tools and techniques (network scanning, password cracking, rogue/misconfiguration infrastructures, war dialling and corrective actions)
  • Understanding network traffic
  • Understanding Intrusion Detection System (IDS) – HIDS and NIDS
  • Intrusion Detection System (IDS) vs Intrusion Protection System (IPS)
  • Understanding honeypot and honeynet

5:30pm – 5:45pm: Closing Remarks / Q&A

 

Day 3 (25 June 2020)

 

8:45am – 9:00am: Online Registration  
9:00am – 10:30am: Security Operations

  • Introduction to security operations
  • Change management
  • Configuration management
  • Patch management
  • Vulnerability management
  • Fundamentals of incident response
    • Preparation
    • Detection (identification)
    • Response (containment)
    • Mitigation (eradication)
    • Reporting
    • Recovery
    • Remediation
    • Lessons Learned (post incident activity, post-mortem or reporting)

10:30am – 10:45am: Break
10:45 – 12:15pm:
Security Operations (Cont’d)

  • Event types of IDS/IPS
  • NIDS and NIPS
  • HIDS and HIPS
  • Security information and event management (SIEM) system
  • Data loss prevention (DLP) system
  • Endpoint security system

12:15pm – 1:15pm: Lunch Break
1:15pm – 3:15pm: Security Operations (Continuity of Operations)

  • Understanding continuity of operations
  • Fault tolerance
  • Redundant array of independent disks (RAID)
  • High availability (HA) clusters (failover cluster)
  • Business continuity planning (BCP)
  • Disaster recovery planning (DRP)

3:15pm – 3:30pm: Break
3:30pm - 5:30pm: Security Operations (Continuity of Operations) (Cont’d)

  • Relationship between BCP and DRP
  • Disasters or disruptive events
  • Relationship of BCP to risk management
  • Business continuity planning process
  • BCP
    • Project initiation
    • Scope of the project
    • Business impact analysis (BIA)
    • Identify preventive control
    • Recovery strategy
    • Plan design and development
    • Implementation, training, and testing
    • BCP maintenance
  • BCP/DRP mistakes

5:30pm – 6:00pm: Assessment Briefing
6:00pm – 6:15pm: Closing Remarks / Q&A

 

Pricing

 

$1,070 / pax (after GST) promotional discount for virtual workshop 
$1,926 / pax (after GST) bundle discount including “Principle and Engineering of Secure Solutions". Original price up to $3,210 for both workshops.

 

Funding Support

 

This workshop is eligible for CITREP+ funding.

 

CITREP+ is a programme under the TechSkills Accelerator (TeSA) – an initiative of SkillsFuture, driven by Infocomm Media Development Authority (IMDA).

 


*Please see the section below on ‘Guide for CITREP+ funding eligibility and self-application process’

 

Funding Amount: 

  • CITREP+ covers up to 90% of your nett payable course fee depending on eligibility for professionals

Please note: funding is capped at $3,000 per course application

  • CITREP+ covers up to 100% funding of your nett payable course fee for eligible students / full-time National Servicemen (NSF)

Please note: funding is capped at $2,500 per course application

 

Funding Eligibility: 

  • Singaporean / PR
  • Meets course admission criteria
  • Sponsoring organisation must be registered or incorporated in Singapore (only for individuals sponsored by organisations)

Please note: 

  • Employees of local government agencies and Institutes of Higher Learning (IHLs) will qualify for CITREP+ under the self-sponsored category
  • Sponsoring SMEs organisation who wish to apply for up to 90% funding support for course must meet SME status as defined here

Claim Conditions: 

  • Meet the minimum attendance (75%)
  • Complete and pass all assessments and / or projects

Guide for CITREP+ funding eligibility and self-application process:

For more information on CITREP+ eligibility criteria and application procedure, please click here

 

In partnership with:

  

Driven by:

 

 

Employability Partner:

 

 

For enquiries, please send an email to learning@sginnovate.com

 

Trainer

 

Ivan Lee, Co-founder, Tegasus International

 

Ivan works with various global strategic partners such as the NATO Cooperative Cyber Defence Centre of Excellence, US Department of Homeland Security ICS-CERT Idaho National Laboratory and local government agencies on critical initiatives and training programmes. 

 

He started his career with Accenture, a top global IT consulting MNC company and has assumed various tech management roles in the telecommunication, cGMP and Operational Technology sectors regionally. He is the Deputy Director of Cyber Security Technologies at iTrust, a Centre for Research in Cybersecurity that was established by the Ministry of Defence and Singapore University of Technology and Design (SUTD). 

 

He is also an SUTD Academy Fellow and a member of the Coordinating Committee for Cybersecurity (CCCY) Subcommittee for Critical Information Infrastructure (CII). 

 

He has attended various professional training courses and acquired certifications as listed below:

  • Certified Information Systems Security Professional (CISSP)
  • US Department of Homeland Security ICS-CERT Industrial Control Systems (ICS) Cybersecurity (301)
  • Advanced Penetration Testing, Exploit Writing, Ethical Hacking (SANS)
  • Advanced Course on Darknet and Cryptocurrencies
  • Hands-on Hardware Hacking and Reverse Engineering (Blackhat 2015)
  • Cybersecurity: Technology, Application and Policy (MIT Digital Program)
  • FORENSICS: Reverse-Engineering Malware (SANS)
  • Managing Successful Programmes (MSP) Practitioner, 2014
  • Introduction to Business Process Re-engineering Workshop
  • Live Hacking & Information Security Masterclass
  • Self-Discovery Leadership
Have questions about Principles of Information Security Controls (23 – 25 June 2020)? Contact SGInnovate and Tegasus

Save This Event

Event Saved

When

Tuesday, June 23, 2020 at 9:00 AM - Thursday, June 25, 2020 at 5:30 PM (Singapore Standard Time Singapore Time)


  Add to my calendar

Please log in or sign up

In order to purchase these tickets in installments, you'll need an Eventbrite account. Log in or sign up for a free account to continue.