Open Everyday

Weekdays 9am - 9pm | Weekends 9am - 5pm

Call us: 03 7954 1766



Level: C Level & Managers

Duration: Short Term and Long Term Courses

Programme: Professional Certification


Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorised access. In a computing context, security includes both cybersecurity and physical security.

With all the news stories about hackers, botnets, and breaches involving personal information, it’s easy for the security message to sound over-used and tired. It’s easy for people to say, “It won’t happen here.” Yet, studies and surveys repeatedly show that: the human factor (what employees do or don’t do) is the biggest threat to information systems and assets.

Most organisations have invested in myriad of security technologies to protect their infrastructure and data, putting in place solutions such as Firewalls, IPS/IDS, Encryptions and many more. However, many of these same organisations have failed to address the human element. People, just like computers, store, process and transfer highly valuable information. Yet people remain highly insecure, since so little has been done to educate them. As a result, cyber attackers are actively targeting the human element. Until you address the human issue, technology alone cannot secure your organisation. Humans are the weakest link in the IT Security Chain.

Ensuring cybersecurity requires coordinated efforts throughout an information system. Elements of cybersecurity include:

  • Application security
  • Information security
  • Network security
  • Disaster recovery/business continuity planning
  • Operational security
  • End-user education

One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment. High-impact security awareness training addresses these issues.


Clement Arul

A Principal Technology Architect & Security Professional with Twenty (20) years of IT experience in Security, Ethical Hacking, Cyber Security Framework, Security Risk & Governance, Systems Analysis, Big Data, IoT, Design, Development, Secure Coding, Implementation, Digital Forensics and Project Management

Founder, CEO of Kaapagam Technologies, Kaapagam Education Services, Kaapagam Tech Singapore.
A Security Consultant for many Multi-National and leading IT companies in APAC region.
Chief Technology Officer of Mega Fortris Group of Companies.
A Frequent Speaker in Security Event in APAC.
Chief Architect : KALAM, IT Security Collaboration Platform
Chief Architect : VALARI, A Web Application Firewall.
Chief Architect : VALAI, A Firewall Appliance on steroids.
Chief Architect : MCMS, A Casino Management System.
Head of R & D and Chief Architect : Vehicle Tracking + Asset Tracking + Fleet Management + Human Tracking.
Specializes in Payment Gateway Hacking, Application Security & Penetration Testing, Big Data & IoT Security.
Issued 30+ Web Vulnerability Disclosure Documents in 2016 on Vulnerabilities discovered in Government,
Corporate, Banks, Online Payment Gateways and e-Shopping websites.
Provide Penetration Testing, Vulnerability Assessments, Security Consultations, Disaster Recovery & Business
Continuity, and Security Audit Services for Customers in APAC Region.
Conduct Workshops across APAC region on Penetration Test, Mobile Security, Forensics Investigations,
Secure Programming, Disaster Recovery, Incident Handling and many more

Learning Outcomes
  • Develop a high-level understanding of Cyber Security.
  • Understanding the different Cyber Security roles in an organisation.
  • Understanding of when a treating is occurring and what to do.
  • Gain insights into the different cyber security threats.
  • Increase awareness in Cyber Security.
Course Outline


  • 9am – 1pm : Morning Session

    –          Information Security

    –          Social Engineering : Phishing, Drive By Download, USB, Phone Calls, Shoulder Surfing

    –          Encryption & Backup

    –          Secure Project Management

    –          Incident Response & Management

    –          Password Management

    –          Social Media Secure Practices

  • 2pm – 5 pm : Afternoon Session

    –          Bring Your Own Device Secure Practices

    –          Cloud Security

    –          Security Policies

    –          Email & Messaging Secure Practices

    –          WiFi Secure Practices

    –          Physical Security

    –          Mobile Device & Data Security

    –          Web Browsing Secure Practice

    –          Q&A

[contact-form-7 404 "Not Found"]