NICF- Fundamentals of Cybersecurity

NUS Institute of Systems Science

How long?

  • 2 days
  • in person

NUS Institute of Systems Science


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

The modern world of security systems is changing rapidly, and these days cybersecurity has become one of the most essential parts of protecting data s...

Read more about Finance

Finance is an integral and most important component of any business, so everyone needs to improve their competence in this area. Finance courses will ...

Read more about Information Technology

Information technology is at the heart of any process connected to utilizing computers and communication systems. It is a quite broad term that is use...

Who should attend

This course is intended as a short introductory course for ICT professionals who want to understand the fundamentals and best practices in cybersecurity as well as keep abreast of the trends in the cybersecurity landscape.

About the course

Cybersecurity is the application of technologies, processes and control measures designed and implemented to protect systems, networks, computer programs, devices and data from unauthorised access and attacks.

Cyberattacks are increasingly growing in sophistication and are a critical business challenge for every organisation. As remote work and insecure data practices persist, cyber breach costs are expected to rise considerably across all industries.

Organisation and user’s assets include connected computing devices, related personnel, organisational infrastructure, applications, services, telecommunications systems and networks. It also includes transmitted and/or stored information in the cyber environment.

Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organisation and user’s assets against relevant security risks in the cyber environment.

Key Takeaways

At the end of the course, the participants will be able to:

  • Explain the importance of cybersecurity
  • Apply the cybersecurity design principles
  • Explain fundamentals of Cryptography and their applications
  • Evaluate cybersecurity frameworks
  • Identify threats and vulnerabilities
  • Design secure network architecture
  • Apply threat modelling concepts
  • Analyse Identity and Access Management components
  • Understand cybersecurity issues related to Cloud, Mobile and IoT

What Will Be Covered

Module 1: Fundamentals of Cybersecurity

  • Cybersecurity Concepts
    • Needs for Security
    • Challenges of Securing information
    • Malware, Social Engineering and other Attacks
    • Protecting against Malware Attacks
    • Legal, Ethical and Professional Issues in Information Security
    • Security Design Principles
    • Security Controls
  • Introduction to Cryptography
    • Cryptographic Techniques
    • Digital Signatures
    • Public-Key Infrastructure
    • Digital Certificates
    • Protocols for Secure Communication

Workshop 1: Case study on Secure Communication

Module 2: Introduction to Risk Management

  • Threats and Vulnerabilities
  • Risk Identification
  • Risk Assessment
  • Risk Control Strategies
  • Business Continuity Planning and Strategies
  • Information Security Policy, Standards and Practices
  • Information Security Frameworks

Workshop 2: Case study on Risk Management

Module 3: Communication and Network Security

  • Types of Firewalls
  • Firewall Architectures
  • Virtual Private Networks
  • Types of Intrusion Detection Systems
  • Strength and limitations of IDPS
  • Deployment and Implementation of IDPS
  • Honeypots
  • Administering a Secure Network

Workshop 3: Case study on designing a Secure Architecture for a given scenario

Module 4: Application Security

  • Web Application attacks
  • Threat modelling
  • Secure Software Development
  • Secure Coding Concepts
  • Security Assessment and Testing

Workshop 4: Exercise on Threat Modelling

Module 5: Identity and Access Management

  • Authentication and Account Management
  • Access Control Models
  • Trust frameworks
  • Best Practices for Access Control
  • Identity and Access Services

Workshop 5: Exercise on Access Control

Module 6: Trends in Cybersecurity

  • Cloud Security
    • Cloud Security Concepts
    • Security approaches for Cloud Computing Assets
    • Cloud Security as a Service
    • Enterprise Cloud Security and Governance
  • Mobile Security
  • Internet of Things Security and Privacy Requirements
  • An Internet of Things Security Framework
  • AI/ML Security

Workshop 6: Workshop on Cloud/Internet of Things /Mobile Security


Sarita Singh

Sarita Singh received her Ph.D. degree for her work done in the area of Information Security (Cryptography). She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of work experience in areas including teaching and researc...

Max Neo

Max has more than 15 years of leadership experience in cybersecurity, technology risk management, data protection, compliance, IT governance and technological audit. He served customers across the Asia Pacific and Japan region empowered them with pragmatic and innovative resolution addressing sec...

NICF- Fundamentals of Cybersecurity at NUS Institute of Systems Science

From  SGD 1 926$1,465

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

Сybersecurity courses offer an excellent opportunity to develop the knowledge and skills necessary to implement a perfect cybersecurity strategy that will accelerate the main security protocols' efficiency. After the successful completion of cybersec...

Read more about Finance

During Finance courses, you will get acquainted with a huge number of financial analyst tools and learn how to work with them. So, you will learn how to make and analyze financial reporting, calculate the main financial indicators of the company and ...

Read more about Information Technology

A large part of the courses provides basic information so the students are not required to have any IT qualifications before enrolling. Most of the IT learning programs are also broken down into specific areas of interest, such as systems analysis, a...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.