16hrs – ICDL Secure Use of IT (IT Security) New

Course Code: CRS-Q-0030951-ES

Course Objective – 16hrs – ICDL Secure Use of IT (IT Security)

In the course of 16hrs – ICDL Secure Use of IT (IT Security), you will get to learn:

  1. Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft
  2. Protect a computer, device, or network from malware and unauthorized access.
  3. Understand the types of networks, connection types, and network specific issues, including firewalls.
  4. Browse the World Wide Web; communicate on the Internet securely.
  5. Understand security issues related to communications, including e-mail and instant messaging.
  6. Back up and restore data appropriately and safely; securely dispose of data and devices.
  • Course Dates and Venue

    Course Duration: 2 days (16 hours) 9am – 6pm

    16hrs - ICDL Secure Use of IT (IT Security)
    JTC Summit-12-13--14-15-
    Mountbatten Square18-19-01-02

    September 2015

  • Security Concepts

    • Data Threats
      • Distinguish between data and information
      • Understand the terms cybercrime, hacking
      • Recognise malicious,  accidental threats to data from individuals, service providers, external organisations
      • Recognise threats to data from extraordinary circumstances like: fire, floods, war, earthquake
      • Recognise threats to data from using cloud computing like: data control, potential loss of privacy
    • Value of Information
      • Understand basic characteristics of information security like: confidentiality, integrity, availability
      • Understand the reasons for protecting personal information like: avoiding identity theft, fraud, maintaining privacy
      • Understand the reasons for protecting workplace information on computers and devices like: preventing theft, fraudulent use, accidental data loss, sabotage
      • Identity common data/privacy protection, retention, and control principles like: transparency, legitimate purposes, proportionality
      • Understand the terms data subjects and data controllers and how data/privacy protection, retention, and control principles apply to them
      • Understand the importance of adhering to guidelines and policies for ICT use and how to access them
    • Personal Security
      • Understand the term social engineering and its implications like: unauthorised computer and device access, unauthorised information gathering, fraud
      • Identity methods of social engineering like: phone calls, phising, shoulder surfing
      • Understanding the term identity theft and its implications: personal, financial, business, legal
      • Identify methods of identity theft like: information diving, skimming, pretexting
    • File Security
      • Understand the effect of enabling/disabling macro security settings
      • Understand the advantages, limitations of encryption. Be aware of the importance of not disclosing or losing the encryption password, key, certificate.
      • Encrypt a file, folder, drive
      • Set a password for files like: documents, spreadsheets, compressed files


    • Definition and Function
      • Understand the term malware. Recognise different ways that malware can be concealed on computers and devices like: Trojans, rootkits, backdoors
    • Types
      • Recognise types of infectious malware and understand how they work like: viruses, worms
      • Recognise types of data theft, profit generating/extortion malware and understand how they work like: adware, ransomware, spyware, botnets, keystroke logging, diallers.
    • Protection
      • Understand how anti-virus software works and its limitations
      • Understand that anti-virus software should be installed on computers and devices
      • Understand the importance of regularly updating software like: anti-virus, web browser, plug-in, application, operating system
      • Scan specific drives, folders, files using anti-virus software. Schedule scans using anti-virus software
      • Understand the risks of using obsolete and unsupported software like: increased malware threats, incompatibility.
    • Resolving and Removing:
      • Understand the term quarantine and the effect of quarantine and the effect of quarantining infected/suspicious files
      • Quarantine, delete infected/suspicious files
      • Understand that a malware attack can be diagnosed and resolved using online resources like: websites of operating system, anti-virus, web browser software providers, websites of relevant authorities

    Network Security

    • Networks
      • Understand the term network and recognise the common network types like: local area network (LAN), wireless local area network (WLAN), wide area network (WAN), virtual private network (VPN)
      • Understand the role of the network administrator in managing authentication, authorisation and accounting, monitoring and installing relevant security patches and updates, monitoring network traffic, and in dealing with malware found within a network
      • Understand the function, limitations of a firewall in personal, work environment
      • Turn a personal firewall on, off. Allow, block an application, service/feature access through a personal firewall
    • Network Connections
      • Understand how connecting to a network has implications for security like: malware, unauthorised data access, maintaining privacy
    • Wireless Security
      • Recognise different options for wireless security and their limitations like: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA)/ Wi-Fi Protected Access 2 (WPA2), Media Access Control (MAC) filtering, Service Set Identifier (SSID) hiding
      • Understand that using an unprotected wireless network can lead to attacks like: eavedroppers, network hijacking, man in the middle
      • Understand the term personal hotspot
      • Enable, disable a secure personal hotspot, and securely connect, disconnect devices
    • Access Control
      • Identify measures for preventing unauthorised access to data like: username, password, PIN, encryption, multi-factor authentication
      • Understand the term one-time password and its typical use
      • Understand the purpose of a network account
      • Understand that a network account should be accessed through a username and password and locked, logged off when not in use
      • Identify common biometric security techniques used in access control like: fingerprint, eye scanning, face recognition, hand geometry
      • Recognise good password policies, like: adequate letter, number and special characters mix, not sharing passwords, changing them regularly, different passwords for different services
      • Understand the function, limitations of password manager software

    Secure Web Use

    • Web Browsing
      • Select appropriate settings for enabling, disabling autocomplete, autosave when completing a form
      • Delete private data from a browser like: browsing history, download history, cached Internet files, passwords, cookies, autocomplete data
      • Be aware that certain online activity (purchasing, banking) should only be undertaken on secure web pages using a secure network connection
      • Identify ways to confirm the authenticity of a website like: content quality, currency, valid URL, company or owner information, contact information, security certificate, validating domain owner
      • Understand the term pharming
      • Understand the function and types of content-control software like: Internet filtering software, parental control software
    • Social Networking
      • Understand the importance of not disclosing confidential or personal identifiable information on social networking sites
      • Be aware of the need to apply and regularly review appropriate social networking account settings like: account privacy, location
      • Apply social networking account settings: account privacy, location
      • Understand potential dangers when using social networking sites like: cyber bullying, grooming, malicious disclosure of personal content, false identities, fraudulent or malicious links, content, messages
      • Be aware that you can report inappropriate social network use or behaviour to the service provider, relevant authorities


    • E-mail
      • Understand the purpose of encrypting, decrypting an e-mail
      • Understand the term digital signature
      • Identify possible fraudulent e-mail, unsolicited e-mail
      • Identify common characteristics of phishing like: using names of legitimate organisations, people, false web links, logos and branding, encouraging disclosure of personal information.
      • Be aware that you can report phishing attempts to the legitimate organisation, relevant authorities
      • Be aware of the danger of infecting a computer or device with malware by opening an e-mail attachment that contains a macro or an executable file
    • Instant Messaging

    Secure Data Management

    • Securing and Backing Up Data
      • Recognise ways of ensuring physical security of computers and devices like: do not leave unattended, log equipment location and details, use cable locks, access control
      • Recognise the importance of having a backup procedure in case of loss of data from computers and devices
      • Identify the features of a backup procedure like: regularity/frequency, schedule, storage location, data compression
      • Back up data to a location like: local drive, external drive/media, cloud service
      • Restore data from a backup location like: local drive, external drive/media, cloud service
    • Secure Destruction
      • Distinguish between deleting and permanently deleting data
      • Understand the reasons for permanently deleting data from drives or devices
      • Be aware that content deletion may not be permanent on services like: social network site, blog, Internet forum, cloud service
      • Identity common methods of permanently deleting data like: shredding, drive/media destruction, degaussing, using data destruction utilities
  • This course is designated for individuals who want to understand the main concepts underlying the secure use of Information and Communications Technology (ICT) in daily life and to use relevant techniques and applications to maintain a secure network connection, use the internet safely and securely, and manage data and information appropriately.

    IT Security will benefit individuals as the skills needed to understand the key concepts relating to the importance of secure information and data, physical security, privacy, and identity theft will be covered. Besides, they will also be certified with best practice in IT Security and be developed with input from computer users, subject matter experts, and practicing computer professionals from all over the world. This process ensures the relevance and range of the course content.

Fees and Grants

$385.20 per participant (Inc. GST)

SMEs Company Sponsored Singaporean/PR only: $61.20 (Inc. GST).

Click here for more details on Grant.

SDF subsidy: WSQ Courses. For more information on SDF, please refer to www.skillsconnect.gov.sg > Funding Mechanism.

Applicants may use SkillsFuture Credit for this course


Click here to download registration form for company-sponsored trainees.

Click here to download registration form for self-sponsored trainees.

Apply Online - ICDL

16hrs – ICDL Secure Use of IT (IT Security) (CRS-Q-0030951-ES)

All registration should be submitted at least 1 week before course commencement. Please call us directly to check on the class status.

A. Company Particulars

Company Name

Company Address

Postal Code

B. Training Coordinator / Contact Person

TC / Contact Person Name*

TC / Contact Person Email*

Contact Number*

C. Billing Information

Billing Contact Person Name*

Billing Contact Person Email*

Billing Contact Number*

Billing Fax Number

Business Unit (BU / SBU)

For Businesses or Government Agencies using the e-invoice system only.

Are you applying for SDF Grant?

D. Participants

Participant 1





Education Level

Salary Range

Course Start Date*

Course End Date*

Participant 2





Education Level

Salary Range

Course Start Date

Course End Date

Participant 3





Education Level

Salary Range

Course Start Date

Course End Date

Have more than 3 participants?

Attach their particulars here (PDF, Word .doc, Excel .xls)

I have Read and Agree to the Terms and Conditions

We do not sell or share your information with anyone else.