Https Aao Ams Polwel Org Sg E_record Zul

By | May 28, 2022



Course Duration

8.0 hr(s)

Mode of Assessment

Participants will be required to complete a web-based written assessment during class.

A final assessment will be embedded in the online training platform, allowing the organization to test the knowledge and skills of each trainee, identify knowledge gaps and to evaluate the organizations cyber security resilience.

Who Should Attend

Anyone who wants to acquire a basic understanding of Cyber Security.

What’s In It for Me

Programme Code: P190714SZU

Following the completion of the training, you will earn a Cyber Security (Protection) Certification. Once you have passed the final exam, you will receive an e- certification with the title: Cyber Security Protection Certified (CSPC).

Course Overview

Technology alone is not enough to prevent major data breaches and cyber-attacks. Security is dependent on employee education and training. Cybersecurity is one of the fastest growing industries and sensitive topics across nearly all professional sectors. Understanding the cyber terminology, threats and opportunities is now critical for professionals.

Cybersecurity researchers estimate that the average payment following a ransomware attack in 2022 rose 171% to $312,493, compared to $115,123 in 2019. Not surprisingly, a significant portion of ransomware attacks stems from an innocent-looking phishing e-mail.

Apart from losing access to both business and personal data (think about those precious photographs and memories!), attackers have been known to exfiltrate and sell their victim’s data on the dark web. The perpetrators of the NetWalker ransomware, for example, exposed confidential business data of more than 100 organisations around the world.

Cybint Security (Protection) is the leading cyber security programme in the cyber education industry. This programme is the product of a collaboration between Israeli military-trained cyber security experts and education experts and is trusted around the globe.

The programme brings real-world threats and scenarios to equip them with the skills to protect themselves in the cyberworld.  LHUB brings this programme to Singapore through a partnership with Cybint.

Cybint Introductory Courses

CSPC (Level 1) IBFIT07

CEBFP (Level 2) IBFIT25

What are the differences


the courses?

  1. Introduction to cybersecurity

  2. Basic personal security best practices

  1. Builds on knowledge and topics covered in CSPC

  2. More in depth understanding of topics and discussions

  3. Advanced content including risk management and dark web

Best security practices for business and finance professionals

Who should attend this course?

  1. New learners, who haven’t been to either course before.

  1. Those who have taken CSPC

  2. New learners, who haven’t been to either course before, a basic knowledge of cybersecurity.

Popular:   List of Active Email Addresses Free 2021

Course Objectives

At its core, the Cyber Security Protection Certified (CSPC) consists of training, assessment, certification and tools that will teach learners how to improve their online security practices. The program addresses cyber security at the employee level creating a deep and powerful network of cyber security expertise beyond the typical technical expertise.


None. Basic understanding of IT is recommended, but not mandatory.

Hardware & Software

This course will be conducted as a Virtual Live Class (VLC) via Zoom platform.  Participants must have a laptop or a desktop with “Zoom Client for Meetings” installed.  This can be downloaded from

Minimum Specs

Recommended Specs

Processor / CPU

1.6 GHz or faster, 2-core Intel Core i3 or equivalent

1.8 GHz, 2-core Intel Core i3 or equivalent




Hard Disk

10 GB available storage space


1280 x 768 screen resolution


2GB Graphics Card


  • Internet Connection: Wired or Wireless broadband (min 10 mbps)

  • Speakers and Microphone:

    built-in or USB plug-in or wireless Bluetooth

  • Webcam: built-in or USB plug-in


  • Zoom

Course Outline

Best Practices in Cyber Security

  • Cybersecurity landscape in Singapore
  • Cyber Culture and Cyber Hygiene in an Organization
  • Role of the Chief Information Security Officer
  • Risk Assessment
  • Employee Protection and Education
  • Security Technologies
  • Regulatory Developments on cybersecurity
  • Incident Preparedness and Response

Introduction to Cyber Security and Cyber Crimes

  • Introduction to Cyber Security
  • Common Cyber Security Threats
  • Cyber Criminals
  • Famous Attacks

Demo #1 – Google Hacking and Shodan Hacking

  • Finding leaked credentials

Demonstration to showcase the exposure of leaked credentials in online repositories (e.g. or in online shared work spaces (e.g.

  • Google Hacking

Demonstration on how simple it is to hack a network printer/router/web camera using Google Hacking techniques and default credentials.

  • Shodan

Demonstration to present – The search engine for IoT and present how it can be used to easily detect and hack network devices.

Accounts and Credentials Security

  • Password cracking techniques – Brute Force and Dictionary Attack
  • Tools to test and create a strong password
  • Leaked Credentials
  • From one account to all accounts
  • Account breach detection methods
  • Prevention and protection methods

Hardware Exploits and Mobile Security

  • USB Drives
  • Wearable Devices
  • Remote Takeover
  • Shodan Search Engine

Demo #2 – Wi-Fi Security Man in The Middle

  • Demonstration to show the trainees how easy it is for hackers to steal sensitive information from unaware users by setting up traps in the form of WiFi networks

Wi-Fi Security and Safe Browsing

  • What is WiFi
  • Attacking WiFi Networks
  • Attacking via WiFi (Man in The Middle attacks, Evil Twin)
  • Prevention methods (VPN, SSL, etc.)

Demo #3 – Social Networks Profiling for Social Engineering

  • Demonstration to show the trainees how much information about them is exposed on the internet through social networks and online databases, that can be used for planning sophisticated Social Engineering campaigns against them

Social Engineering and Ransomware

  • Social Engineering
  • Phishing
  • Spoofing of email address, phone numbers, voice, etc.
  • Avoidance Techniques

Demo #4 – Phone spoofing, and Email Spoofing demonstration

  • Demonstration is to show that the methods hackers employ to mask their email address and phone number to increase the efficacy of their scams.

Certificate Obtained and Conferred by

  • Certificate of Completion from NTUC LearningHub

Upon meeting at least 100% attendance and passing the assessment(s), participants will receive Certificate of Completion from NTUC LearningHub

  • External Certification Exam


Additional Details

Medium of Instruction & Trainer

Medium of Instruction: English

Trainer: Trainee Ratio is 1:25

Mode of Delivery: Virtual Live Class (VLC) via Zoom

As this is a government subsidised programme, the entire training programme will be video recorded for audit purposes by the relevant funding agency. To ascertain their presence, Trainees / Participants are required to

  • Turn on web camera to show real-time video, as opposed to using a profile picture / video for the entirety of the training and assessment session.
  • Ensure that their faces are fully visible (not just the forehead / eyebrows)
  • Use their full name as per NRIC / Passport as their Screen Name on Zoom

Courseware & Labs

A softcopy of the learners guide will be provided on canvas. No Lab required for this course.


For Classes commencing between 1st Jan 2022 to 30th Jun 2022

Individual Sponsored Trainee

Company Sponsored Trainee

before GST

with GST

before GST

with GST

Full Course Fee





Singapore Citizens and PRs
(after 80% funding)





Singapore Citizens aged 40 years and above
(after 90% funding)







  • Singapore Citizens or Singapore Permanent Residents physically based in Singapore
  • Trainee has to complete 100% attendance and pass all relevant assessments and examinations
  • NTUC LearningHub reserves the right to claw back the funded amount from trainee if he/she did not meet the eligibility criteria
  • NTUC members enjoy 50% unfunded course fee support for up to *$250 each year when you sign up for courses supported underUTAP (Union Training Assistance Programme). *Conditions apply Please visit our website at for more information. Funding for approved courses only.To sign up for Union Member please sign up here.


  • Singapore Citizens or Singapore Permanent Residents physically based in Singapore
  • Company must be Financial Institutions regulated by MAS (licensed or exempted from licensing), or involved in supporting financial sector activities. FinTech firms must be certified by Singapore FinTech Association (SFA)
  • Trainee has to complete 100% attendance and pass all relevant assessments and examinations
  • Eligible company-sponsored trainees will be able to clock CPD hours upon successful course completion

Class Allowance

For all courses commencing after 1st July 2021 and before 31st December 2021 :

  • Singapore Citizens and permanent residents of all ages will receive course fee subsidies of 90%
  • The course fee for individuals and corporates are shown in the pricing table.
  • Training Allowance – $10 per training and assessment hour (Sponsoring companies in Finance and Banking)

Terms and conditions apply. NTUC LearningHub reserve the right to make changes or improvements to any of the products described in this document without prior notice.

Prices are subject to other LHUB miscellaneous fees.

Https Aao Ams Polwel Org Sg E_record Zul