Unlock the World of Cyber SecurityCyber security is becoming more important as we rely more on computers, the Internet, and wireless networks like Bluetooth and Wi-Fi. This course will help you understand cyber security and how it applies to computer networking and smart devices. You will learn about vulnerabilities and how to protect against them. Experience Cyber Security in ActionYou will have the chance to visit cyber security technology centres, either virtually or physically. These visits will give you a real-world view of how cyber security is applied and taught. With courses like Higher Nitec in Cyber & Network Security, you can deepen your understanding and skills in this vital field.
Master Networking and Security BasicsBy the end of this module, you will know how to build and configure basic networking devices. You will also learn how to apply security measures to protect these devices. This foundation is essential for keeping networks safe from cyber threats. Stay Ahead in Cyber SecurityYou will understand different types of cyber security vulnerabilities and how to mitigate them. Learn how to stay updated on the latest cyber security threats and their solutions. Additionally, you will explore various career paths in cyber security, opening doors to future opportunities in this exciting field.
S/N Module Outline 1Set up networking devicesDescribe the basics of computer and data network.Describe the need for IP addressing for networking devices.Describe IPv4 format.Set up a small switched network according to user requirements.Build a switch network according to specifications.Build a router network according to specifications. 2Set up basic security measuresList the most common and current cybersecurity threats.Explain the concept of malware and the need for cyber security.Describe the purpose of firewall.Configure firewall on operating systems according to requirements.Configure end-point protections according to specifications. 3Perform Pen-TestingExplain cyber security law in Singapore.Compare and contrast social norms and offensive online behaviours.Explain the phases of attack.Explain the methods used in compromising networking devices.Identify the types of tests to be performed according to requirementsPerform Pen-Testing on systems according to required procedure. 4Perform mitigation against vulnerabilitiesExplain the methods of information gathering through reconnaissance / footprinting.Explain common vulnerabilities and their mitigation process.Implement remedial actions for the list of identified vulnerabilities. Verify effectiveness of remedial actions according to required procedure. 5Explore cyber careersCreate cyber resume according to requirements.Discover the personality profile based on career test.Perform beginner cyber challenge field trip as required.