16hrs – ICDL Secure Use of IT (IT Security)

Course Code: CRS-Q-0030951-ES

16hrs – ICDL Secure Use of IT (IT Security)

Have you ever clicked and responded to phishing emails asking for your personal details? Or have you been a victim of ransomware, in which this malicious software infects your computer and demands for a fee before allowing you to resume work on your computer? If you are to secure your computer from cyberattacks, it is necessary for you to first be able to identify the threats and not fall prey to it. Our ’16hrs – ICDL Secure Use of IT (IT Security)’ will help you to recognize the lurking threats in the cyberworld and create your own defense against these malicious attacks.

 

16hrs - ICDL Secure Use of IT (IT Security)

 

In this 2-day ‘ICDL Secure Use of IT (IT Security)’ course, you will learn how to identify data threats from various sources, privacy protection, retention and control principles, the types of malware and protection against them, limits of network security and how to put in place an authentication and authorization process to ensure network security.

 

Learners will also learn about secure data management principles such as how to secure their data securely, destroy data safely and temporary delete data in their social network accounts and cloud services.

 

Course Objectives – 16hrs – ICDL Secure Use of IT (IT Security)

At the end of this course, you will be able to:

  1. Identify the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft
  2. Protect a computer, device, or network from malware and unauthorized access
  3. Recognize the types of networks, connection types and network issues such as firewalls
  4. Browse the World Wide Web and communicate on the Internet securely
  5. Recognize security issues related to communications such as e-mail and instant messaging
  6. Back up and restore data appropriately while safely and securely dispose of data and devices

 

Participants can also consider attending our ICDL Online Essential course and ICDL Online Collaboration course to learn how to communicate and work effectively on the web with online software and tools with their colleagues, friends and family.

  • Course Dates and Venue

    Course Duration: 2 days (16 hours) 9am – 6pm

    CourseVenueOct-20Nov-20Dec-20Jan-21Feb-21Mar-21
    16hrs - ICDL Secure Use of IT (IT Security)

    JTC Summit

    15-1609-1017-1814-15-29-30

    JTC Summit (Weekend)

    -21 & 28----

    Mountbatten Square

    ----25-26-

    September 2015

    SMTWTFS
    30
    31
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    1
    2
    3
  • Security Concepts

    • Recognize Data Threats from various sources
    • Understand Cybercrime and Hacking
    • Understand the Confidentiality, Integrity & Availability of Information
    • Identify privacy protection, retention and control principles
    • Understand the term Identity Theft and its implications for Personal Security
    • Methods of identity theft : skimming, pretexting and information diving
    • File Security using encryption and it’s limitation

    Malware

    • Definition and Function
    • Recognized types of malware and how it works. Eg. Adware, ramsonware, keystroke loggin
    • Use of Protection methods such as scanning and Anti-virus software
    • Minimize risks of obsolete and unsupported software

    Network Security

    • Network administrator role to manage authentication, authorization, installing updates on Network Connections
    • Different Wireless Security and limitations of WEP, WPA2, MAC and SSID
    • Access Control by username, password, PIN, encryption and multi-factor authentication

    Secure Web Use

    • Methods to identify Authenticity of Website such as security certificate and validating domain owner
    • Potential danger in Social Networking such as malicious links, cyber bullying and fraudulent content

    Communications

    • Identify fraudulent and unsolicited E-mails
    • Security vulnerabilities in Instant Messaging and VoIP

    Secure Data Management

    • Securing and Backing Up Data using the physical locks and access control
    • Distinguish types of Secure Destruction
    • Non-permanent content deletion in social network, blog or cloud services
  • This course, ICDL Secure Use of IT (IT Security), is designated for individuals who want to understand the main concepts underlying the secure use of Information and Communications Technology (ICT) in daily life and to use relevant techniques and applications to maintain a secure network connection, use the internet safely and securely, and manage data and information appropriately.

    IT Security will benefit individuals as the skills needed to understand the key concepts relating to the importance of secure information and data, physical security, privacy, and identity theft will be covered. Besides, they will also be certified with best practice in IT Security and be developed with input from computer users, subject matter experts, and practicing computer professionals from all over the world. This process ensures the relevance and range of the course content.

Fees and Grants

$385.20 per participant (Inc. GST)

SMEs Company Sponsored Singaporean/PR only: $61.20 (Inc. GST).

Click here for more details on Grant.

Click here for UTAP Fundings

SDF subsidy: WSQ Courses. please refer to Course Fee and Absentee Payroll Funding 

Applicants may use SkillsFuture Credit for this course

Registration

Click here to download registration form for company-sponsored trainees.

Click here to download registration form for self-sponsored trainees.

Apply Online - WSQ

16hrs – ICDL Secure Use of IT (IT Security) (CRS-Q-0030951-ES)


All registration should be submitted at least 1 week before course commencement. Please call us directly to check on the class status.

A. Company Particulars

Company Name

Company Address

Company UEN*

Postal Code

B. Training Coordinator / Contact Person

TC / Contact Person Name*

TC / Contact Person Email*

Contact Number*

C. Billing Information


Billing Contact Person Name*

Billing Contact Person Email*

Billing Contact Number*

Billing Fax Number

Business Unit (BU / SBU)

For Businesses or Government Agencies using the e-invoice system only.

Are you applying for SDF Grant?


How did you get to hear about us?*

D. Participants


Participant 1

NRIC Type

Gender

Nationality

Race

Education Level

Salary Range

Course Start Date*

Course End Date*

Participant 2

NRIC Type

Gender

Nationality

Race

Education Level

Salary Range

Course Start Date

Course End Date

Participant 3

NRIC Type

Gender

Nationality

Race

Education Level

Salary Range

Course Start Date

Course End Date

Have more than 3 participants?

Attach their particulars here (PDF, Word .doc, Excel .xls)

I have Read and Agree to the Terms and Conditions


We do not sell or share your information with anyone else.