Courses
Certified Cyber Security Specialist (CCSS)
The Certified Cyber-Security Specialist training focuses on creating information security individuals who are trained in protecting, detecting and responding to threats on the network. Information security individuals are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc.
This training will prepare students with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that they understand how networks operate, understand what software automating is and how to analyse the subject material.
Upcoming Training Dates
21 -25 April 2025
14 -18 July 2025
13 - 17 October 2025
* This training schedule is subject to change
Pass the 2-hour exam consisting of 50 Online Multiple Choice Questions with the score of 70% to earn this certification
One of the most industry validated digital skills certification in Asia. Course and exams is taken by the industries / academia / governments from 26 countries in Asia via 30+ Authorised Training Partners (ATP) and 50+ Authorised Academy Partners (AAP).
“Vendor-neutral” certifications refer to any certifications that are not directly associated with specific IT vendors. These certifications tend to develop a knowledge and skill base that is universally applicable and individual with skills that are more conceptual, setting you up to work with a greater range of products / tools.
Inquiry Form
Would you know how to deal with a cyber-attack? Learn cyber-security and expose yourself to all the possible cyber threats, and be informed of ways you can bring value by protecting confidential business data.
Today, where everything is going digital, it poses higher chances of threats and risks. In the first half of 2021 alone, cyberattacks on companies globally had increased by a whopping 29%.
This Certified Cyber-Security Specialist certification course focuses on information security and network threats in areas of protection, detection, and response. By the end of this 5-day hands-on cyber-security training, you will be well-versed in network defense, including protocols, controls, perimeter appliances, data transfer, firewall and VPN configuration and a whole lot more.
- Know-hows on analysing and establishing security requirements for your systems/networks
- Defend systems against unauthorized access, modification and/or destruction.
- Knowledge on configuration and supporting security tools.
- Skills in performing vulnerability testing, risk analyses and security assessments.
- Ability to Identify abnormalities and report violations.
- Expertise in overseeing and monitoring routine security administration.
- Competencies in developing and updating business continuity and disaster recovery protocols.
- Define access privileges, control structures and resources.
- Perform vulnerability testing, risk analyses and security assessments.
- Identify abnormalities and report violations.
- Oversee and monitor routine security administration.
- Develop and update business continuity and disaster recovery protocols.
Training Module
Cyber-Security Essentials
- Cyber-Security: The New Frontier
- Cyber-Security & Cybercrime
- Cyber-Security Management
- Introduction to Cyber Terrorism
- Internet Radicalization
- Terrorist Use of the Internet
- Cyber Terrorism Framework
- Case Studies
Understanding Current Threat Landscape
- CIS Top 20 Critical Controls
- Cyber Range
- Next Gen-Firewalls
New Age Threats
- Viruses & Worms
- Malware
- Zero Day Attacks
- Vulnerability Exploits
- Phishing / Social Engineering
- Cyber Espionage / Data Theft
Reconnaissance
- Port Scan
- Web-Based Recon & Information Gathering
- Command Line Query
Vulnerability Management
- Host Scanning
- Web Application Scanning
- CVE
- Defending Against CVE Vulnerability Attacks
Monitoring & Defending Against Advanced Attacks
- Splunk – A SIEM Monitoring Tool
- Defending Against IP Layer DDOS Attacks
- Defending Against Transport Layer DDOS Attacks
- Defending Against Application Layer DDOS Attacks
- Defending Against Botnet & C&C
Advanced Security Operations
- Malware Blocking
- Data Leak Prevention (DLP) / Data Filtering
- File Blocking
- URL Filtering
- Evasion Tactics
Introduction to Security Incident & Incident Handling
- Security Incident, Processes & Framework
- Incident Handling
- Security Incident Priority
- Handling Intrusion Incident
- Handling Malware Incident
- Handling Phishing Incident
- Handling Spam Incident
Log Analysis
- Introduction to Log Analysis
- Log Management
- Log Visualization
- Log Analysis
- Hands-On
Customer Feedback
Our works is featured on