Cyber SecurityThe field of cyber security is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, as well as the growth of "smart" devices including smartphones, televisions, and the various connected devices that constitute the Internet of Things. This course demystifies cyber security by creating an awareness of its application in computer networking, cyber security vulnerabilities and the mitigation process and provides an opportunity for virtual / physical visits to cyber security technology centers for cyber security education purposes.Related ITE Courses: Higher Nitec in Cyber & Network Security (3-year)
At the end of the module, students will be able to:Build and configure basic networking devices.Apply appropriate methods in security measures on these devices.Explain the types of cyber security vulnerabilities and the mitigation process.Demonstrate how to obtain updates on trending cyber security threats and their mitigation.Explore various career pathways in cyber security.
S/N Module Outline 1Set up networking devicesDescribe the basics of computer and data network.Describe the need for IP addressing for networking devices.Describe IPv4 format.Set up a small switched network according to user requirements.Build a switch network according to specifications.Build a router network according to specifications. 2Set up basic security measuresList the most common and current cybersecurity threats.Explain the concept of malware and the need for cyber security.Describe the purpose of firewall.Configure firewall on operating systems according to requirements.Configure end-point protections according to specifications. 3Perform Pen-TestingExplain cyber security law in Singapore.Compare and contrast social norms and offensive online behaviours.Explain the phases of attack.Explain the methods used in compromising networking devices.Identify the types of tests to be performed according to requirementsPerform Pen-Testing on systems according to required procedure. 4Perform mitigation against vulnerabilitiesExplain the methods of information gathering through reconnaissance / footprinting.Explain common vulnerabilities and their mitigation process.Implement remedial actions for the list of identified vulnerabilities. Verify effectiveness of remedial actions according to required procedure. 5Explore cyber careersCreate cyber resume according to requirements.Discover the personality profile based on career test.Perform beginner cyber challenge field trip as required.