ASK Training

Course Description

Have you ever clicked and responded to phishing emails asking for your personal details? Or have you been a victim of ransomware, in which this malicious software infects your computer and demands for a fee before allowing you to resume work on your computer? If you are to secure your computer from cyberattacks, it is necessary for you to first be able to identify the threats and not fall prey to it. Our course, ’16-hrs ICDL Secure Use of IT (IT Security)’ will help you to recognize the lurking threats in the cyberworld and create your own defense against these malicious attacks.

 

In this 2-day ’16-hrs ICDL Secure Use of IT (IT Security)’ course, you will learn how to identify data threats from various sources, privacy protection, retention and control principles, the types of malware and protection against them, limits of network security and how to put in place an authentication and authorization process to ensure network security. Learners will also learn about secure data management principles such as how to secure their data securely, destroy data safely and temporary delete data in their social network accounts and cloud services.

Course Objectives

At the end of this Photoshop course, you should be able to:

Understand the key concepts relating to the importance of secure information and data physical security privacy and identity theft

Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft

Protect a computer device or network from malware and unauthorized access

Protect a computer, device, or network from malware and unauthorized access.

Understand the types of networks connection types and network specific issues including firewalls.

Understand the types of networks, connection types, and network specific issues, including firewalls.

Browse the World Wide Web communicate on the Internet securely

Browse the World Wide Web; communicate on the Internet securely.

Understand security issues related to communications including e mail and instant messaging

Understand security issues related to communications, including e-mail and instant messaging.

Back up and restore data appropriately and safely securely dispose of data and devices

Back up and restore data appropriately and safely; securely dispose of data and devices.

Understand the key concepts relating to the importance of secure information and data physical security privacy and identity theft

Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft

Protect a computer device or network from malware and unauthorized access

Protect a computer, device, or network from malware and unauthorized access.

Understand the types of networks connection types and network specific issues including firewalls.

Understand the types of networks, connection types, and network specific issues, including firewalls.

Browse the World Wide Web communicate on the Internet securely

Browse the World Wide Web; communicate on the Internet securely.

Understand security issues related to communications including e mail and instant messaging

Understand security issues related to communications, including e-mail and instant messaging.

Back up and restore data appropriately and safely securely dispose of data and devices

Back up and restore data appropriately and safely; securely dispose of data and devices.

Course Outline

You will be learning the following:

  • Recognize Data Threats from various sources
  • Understand Cybercrime and Hacking
  • Understand the Confidentiality, Integrity & Availability of Information
  • Identify privacy protection, retention and control principles
  • Understand the term Identity Theft and its implications for Personal Security
  • Methods of identity theft : skimming, pretexting and information diving
  • File Security using encryption and it’s limitation
  • Network administrator role to manage authentication, authorization, installing updates on Network Connections
  • Different Wireless Security and limitations of WEP, WPA2, MAC and SSID
  • Access Control by username, password, PIN, encryption and multi-factor authentication
  • Identify fraudulent and unsolicited E-mails
  • Security vulnerabilities in Instant Messaging and VoIP
  • Definition and Function
  • Recognized types of malware and how it works. Eg. Adware, ramsonware, keystroke loggin
  • Use of Protection methods such as scanning and Anti-virus software
  • Minimize risks of obsolete and unsupported software
  • Methods to identify Authenticity of Website such as security certificate and validating domain owner
  • Potential danger in Social Networking such as malicious links, cyber bullying and fraudulent content
  • Securing and Backing Up Data using the physical locks and access control
  • Distinguish types of Secure Destruction
  • Non-permanent content deletion in social network, blog or cloud services

Course Fees And Grants

S$385.20 per participant (Inc. GST)

 

SMEs Company Sponsored Singaporean/PR only: S$61.20 (Inc. GST).

 

Click here for more details on WSQ Funding.

 

Click here for UTAP Fundings

 

For more information on SDF, please refer to www.skillsconnect.gov.sg > Funding Mechanism.

 

Applicants may use SkillsFuture Credit for this course

 

SKILLSFUTURE CREDIT
> Check your account

Absentees will be charged the full course fee.

Course Schedule

CourseCodeVenueOct-21Nov-21Dec-21Jan-22Feb-22Mar-22
16hrs - ICDL Secure Use of IT (IT Security)
TGS-2017500916JTC Summit-25-26-17-18-30-31
TGS-2017500916Mountbatten Square
18-19-27-28-14-15-

Registration

For Organisations on HRMS Learning Hub, you are strongly encouraged to use this platform for registration.

Our Corporate Partners

What Our Students Say

COURSE FEES AND GRANTS

S$385.20 per participant (Inc. GST)

 

SMEs Company Sponsored Singaporean/PR only: S$61.20 (Inc. GST).

 

Click here for more details on WSQ Funding.

 

Click here for UTAP Fundings

 

For more information on SDF, please refer to www.skillsconnect.gov.sg > Funding Mechanism.

 

Applicants may use SkillsFuture Credit for this course

 

SKILLSFUTURE CREDIT
> Check your account

Absentees will be charged the full course fee.

REGISTRATION

For Organisations on HRMS Learning Hub, you are strongly encouraged to use this platform for registration.

Browse Courses

Learning Paths

Master Microsoft Office

Master Microsoft Office

Become a Web Designer

Become a Web Designer

Become a Digital Marketer

Become a Digital Marketer

Become a Video Producer

Become a Video Producer