Following The Committee for Private Education advisory, NTUC LHUB will be taking precautionary measures against the novel coronavirus infection. Visit to find out more.
+65 6336 5482 (Weekdays, 9am - 6pm) Learners Login

Cybersecurity and Information Governance, Risk & Compliance (GRC)

Information Technology


Professional Certification Courses


Laws and Regulation

Vendor-Specific Courses

Professional Certification Courses for Cybersecurity Professionals

Validate your abilities in cybsersecurity and increase your value with highly industry-recognised certifications from ISACA, IAPP, Cloud Security Alliance and many more. Propel your career now.

For Information Security

5 Day Course

CISSP is the most-esteemed cybersecurity certification in the world. It recognises information security leaders who understand cybersecurity strategies, as well as hands-on implementations. It shows that one has the knowledge and experience to design, develop and manage the overall security posture of an organisation.

5 Day Course

Demonstrate your information security management expertise. The management-focused CISM certification is unique in promoting international security practices and recognising the individual who manages, designs, oversees and assesses an enterprise’s information security.

For Risk Management

4 Day Course

CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them as strategic partners to the enterprise.

For IT Governance

5 Day Course

CGEIT recognises a wide range of professionals for their knowledge and application of enterprise IT governance principles and practices. As a CGEIT certified professional, one is capable of bringing IT governance into an organisation— grasping the complex subject holistically and therefore enhancing one's value to the enterprise.

For IT Audit

5 Day Course

The CISA designation is a globally recognised certification for IS audit control, assurance and security professionals. Being CISA certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.

For Information Privacy

The CIPM is the worlds first and only certification in privacy programme management. When you earn a CIPM, it shows that you know how to make a privacy programme work for your organisation. In other words, you're the go-to person for day-to-day operations when it comes to data protection.

The CIPM programme was developed by the International Association of Privacy Professionals (IAPP), which is the worlds largest comprehensive global information privacy community and resource. The CIPM certification also holds accreditation under ISO 17024: 2012.

The CIPT credential shows you’ve got the knowledge to build your organisation’s privacy structures from the ground up. With regulators worldwide calling for tech professionals to factor data privacy into their products and services, the job market for privacy-trained IT pros has never been stronger.

Do you work in IT, security, or engineering? The CIPT is for you. How about privacy by design, software engineering, data management or audit? Ditto.

Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have—and that’s a great opportunity for you.

For Software Development Security

2 Day Course

Learn the purpose, benefits, concepts, and vocabulary of DevSecOps; particularly how DevSecOps roles fit with a DevOps culture and organisation. At the end of this course, you will understand using security as code with the intent of making security and compliance consumable as a service.

Strengthen your Weakest Link with our End-User Cyberliteracy Training

Studies predicts that the Global cost of Cybercrimes will hit a massive 6 trillion dollars by 2021. And 90% of Cyberattacks are caused by user errors or behaviours.

Technology alone is not enough to prevent major data breaches and cyber-attacks. The weakest link in the organisation is often the end-users.

NTUC LearningHub has partnered with Israel's leading cybersecurity education provider to create an impactful course that will transform your organisation in cybersecurity literacy.

For Company-wide Cybersecurity Literacy

1 Day Course

Cybint Security (Protection) is the leading cyber security programme in the cyber education industry. This programme is the product of a collaboration between Israeli military-trained cyber security experts and education experts and is trusted around the globe. The programme brings real-world threats and scenarios to equip them with the skills to protect themselves in the cyberworld. LHUB brings this programme to Singapore through a partnership with Cybint.​

For MICE Industry

1 Day Course

The course is designed especially for MICE employees. The objective is to manage and assess Cyber security risks and apply countermeasures at an ongoing Event. It comprises a one full day or 8 hours of a facilitated workshop. The course encompasses 5 topics that cover all the essential elements of the cybersecurity compliance requirements, basic concepts of Cybersecurity, the requirements of the MICE industry, the good practices of Cybersecurity for MICE, provisions of Data Privacy and compliance requirements and practicing the Cyber and Data Privacy hygiene habits.

Laws and Regulation

Under the Personal Data Protection Act 2012 (PDPA), organisations are required to develop and implement policies and practices that are necessary to meet its obligations under the PDPA. In particular, organisations are required to designate at least one individual, known as the data protection officer (DPO), to oversee the data protection responsibilities within the organisation and ensure compliance with the PDPA.

Data Protection Regulation in Singapore

2 Day Course

Under the Personal Data Protection Act 2012 (PDPA), organisations are required to develop and implement policies and practices that are necessary to meet its obligations under the PDPA. In particular, organisations are required to designate at least one individual, known as the data protection officer (DPO), to oversee the data protection responsibilities within the organisation and ensure compliance with the PDPA.

The course will provide a good overview and understanding of the PDPA and how it may be applied to the organisations for compliance. Areas covered in the training include key legislative and regulatory requirements of PDPA and compliance and alignment with PDPA, as well as prepares management report for follow-up.

1 Day Course

The course will provide students a good overview and understanding of the Cybersecurity Act and how it applies to organisations for their compliance. Areas covered in the training include main objectives of the Cybersecurity Act, its key legislative provisions and how it affects organisations. The course also explains how learners can help ensure compliance with the Cybersecurity Act, as well as how to prepare a management report for follow-up.

Vendor Specific Certifications

Certification from market leading cybersecurity vendors to solidify your mastery of the technology.

5 Day Course

The Network Security Professional (NSE 4) designation recognises the ability to install and manage the day-to-day configuration, monitoring, and operation of a FortiGate device to support specific corporate network security policies.

5 Day Course

Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognise threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasises core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.

an NTUC Social Enterprise
© COPYRIGHT 2019 NTUC LearningHub. All Rights Reserved.