Course curriculum

  • 1. What is Cybersecurity and Why It is Important?

    • 1.1 Video: What is Cybersecurity?

    • 1.2 What is Cybersecurity?

    • 1.3 Why is Cybersecurity Important?

    • 1.4 Why is Cybersecurity Important? (continued)

    • 1.5 Why is Cybersecurity Important? (continued 2)

    • 1.6 A Global Cyber Event

    • 1.7 A Local Cyber Event

    • 1.8 Cyber Attack is Commodity and for Sale on the Web

    • 1.9 Why is Cybersecurity Important in Singapore?

    • 1.10 Why is Cybersecurity Important in Singapore? (continued)

  • 2. Global Trends Leading to Cybersecurity

    • 2.1 Digital Economy

    • 2.2 Shared Economy

    • 2.3 Drivers of Cybercrime

    • 2.4 Motivation of Cybercrime

  • 3. Cybersecurity Threats and Risks

    • 3.1 Cyberattack Surface

    • 3.2 A Global Cyber Event

    • 3.3 The Attack Surface

    • 3.4 Disrupting the Attack Surface

    • 3.5 Techniques to Resist and Recover From Attacks

    • 3.6 Common Cyber Threats

    • 3.7 Global Industry Statistics

    • 3.8 Social Engineering – What and How?

    • 3.9 Video: Social Engineering – What and How?

    • 3.10 Phishing Attack

    • 3.11 Video: Phishing Attack

    • 3.12 Common SMS Phishing

    • 3.13 Malware Distributed Via Email

    • 3.14 Ransomware

    • 3.15 An Incident in The Financial Sector

    • 3.16 DDOS Attack (Distributed Denial of Service)

    • 3.17 Cybersecurity Risk

    • 3.18 Video: Cybersecurity Risk

  • 4. Areas Prone to Cybersecurity Threats

    • 4.1 Identifying Key Assets and Scenarios

    • 4.2 Attack Motives Behind Different Threat Actors

    • 4.3 Areas Prone to Cybersecurity Threats

    • 4.4 Be Vigilant

    • 4.5 Security Tips for Working Remotely

    • 4.6 Video: Security Tips for Working Remotely

  • 5. Cybersecurity Regulations and Compliance Requirements

    • 5.1 What are Cybersecurity Regulation and Compliance?

    • 5.2 MAS Cyber Hygiene & Technology Risk Management (TRM) Guidelines

    • 5.3 Other Guidelines and Frameworks

    • 5.4 PDPA and GDPR

    • 5.5 Regulatory Framework for Cybersecurity Incidents

    • 5.6 Singapore Cybersecurity Strategy

    • 5.7 Inter-Dependency of MAS Risk Management Guidelines

  • 6. Taking Appropriate Actions Against Cybersecurity Breaches

    • 6.1 Pause, Think, Act

    • 6.2 Video: Pause, Think, Act

    • 6.3 CIA TRIAD Security Model

    • 6.4 Best practice for implementing CIA Triad

    • 6.5 Preventive Actions

    • 6.6 Appropriate Response Actions to Cybersecurity Breach

  • 7. Assessment

    • Instructions

    • Questions