Cybersecurity

Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image

All Cybersecurity Courses

Filter
Advance Filters
Theme
Topic
Funded/Non Funded
Price
Min:
Max:

Responsive Image
 

Be Job-Ready! Upskill yourself in relevant skills and knowledge

We offer the best-in-class brands in the fields of Cybersecurity. Our Instructors, who are practitioners in their respective fields, come with years of hands-on industry experience and have been certified by the best-in-class brands after going through a rigorous accreditation process. Majority of our courses are aligned to certification exam syllabus and will help trainees to prepare for globally recognised IT certifications.
 
We have the capability to contextualize training and content to the needs of companies and learners. We understand that each company has its own unique needs and requirements when it comes to training, and we have a team of subject matter experts who can tailor our courses specifically to the needs of your business. This ensures that each employee receives the most relevant training possible, which will help them function more efficiently and effectively to maximise their contribution to your business. 
 
As a one-stop ecosystem of training and assessment solutions, NTUC LearningHub is also the largest computer-based Testing center in Singapore, offering and facilitating in-demand certification exams delivered via platforms such as Pearson VUE, PSI, Kryterion, Certiport, etc for your employees.
 

Awareness

Intermediate

Advanced 

Expert

  • Cybersecurity Awareness Programme (1 day)
  • Fundamentals of Cyber for Executives workshop e-learning (5 hours)
  • Cybint Cybersecurity Security Certificate (1 day)
  • Cybint Cybersecurity Essentials for Business and Finance Professionals (1 day)
  • Cybint Certified Cybersecurity Defender (1 day)
  • Cybint Organizational Cybersecurity Advocate Certification (2 days)
  • Identity and Access Management Essentials (2 days)
  • EC Council Network Defense Essentials (self-paced)
  • EC Council Ethical Hacker Essentials (self-paced)
  • EC Council Digital Forensics Essentials (self-paced)
  • ISACA Cybersecurity Fundamentals (3 days)
  • (ISC)² Certified in Cybersecurity (2 days)
  • EC Council Certified Secure
    Computer User (CSCU) (2 days)
  • Comptia Security+ (5 days)
  • ISACA Certificate of Cloud Computing Knowledge (CCAK) (1 day)
  • Cybersecurity Alliance Certificate of Cloud Computing Knowledge (CCSK) (3 days)
  • Splunk Core Certfied User (2 days)
  • Microsoft Security, Compliance, and Identity Fundamentals (SC-900T00) (1 day)
  • Microsoft 365 Security Administration (MS-500T00) (4 days)
  • Security Engineering on AWS (3 days)
  • Palo Alto Firewall Essentials: Configuration and Management (5 days)
  • EC Council Certified Network Defender (CND) (5 days)
  • EC Council Certified Ethical Hacker (CEH) (5 days)
  • ISACA Certified Information Systems Auditor (CISA) (5 days)
  • ISACA Certified in Risk and Information System Control (CRISC)(5 days)
  • Comptia Pentest+ (5 days)
  • Comptia CySA+ (5 days)
  • EC Council Certified Threat Intelligence Analyst (CTIA) (3 days)
  • EC Council Computer Hacking Forensic Investigator (CHFI) (5 days)
  • EC Council Certified Incident Handler (ECIH) (3 days)
  • EC Council Certified SOC Analyst (CSA) (3 days)
  • Cisco CCNA Cyber Security Operations (5 days)
  • Splunk Core Power User (5 days)
  • Microsoft Azure Security Technologies (AZ-500T00) (4 days)
  • Cisco Certified Cyberops Associate (5 days)
  • (ISC)² Certified Information Systems Security Professional (CISSP) (5 days)
  • (ISC)² Certified Cloud Security Professional (CCSP) (5 days)
  • (ISC)² Systems Security Certified Practitioner (SSCP) (5 days)
  • (ISC)² Certified Secure Software Lifecycle Professional (CCSLP) (5 days)
  • EC Council Certified Penetration Testing Professional (CPENT) (5 days)
  • CompTIA Advanced Security Practitioner (CASP+) (5 days)
  • ISACA Certified in the Governance of Enterprise IT (CEGIT) (5 days)
  • ISACA Certified Information Security Manager (CISM) (5 days)


Governance Risk and Control


 

Vulnerability Assessment and Penetration Testing


Security Operations


 


Forensics Investigations


 


Incident Response and Threat Analysis


Security Design and Engineering


 

Entry Level: Associate Security Analyst


Singapore’s Smart Nation initiative means that there is an increasing need for cybersecurity analysts. As the country moves towards a unified e-payment system and programs like digital tech for low-income households, internet of things for healthcare, and logistics for shopping malls.

To start of a career in Cybersecurity, the role of an Associate Security Analyst is critical, and he/she supports security systems, operations administration, monitoring and maintenance of cyber security systems and applications. He/she monitors security alerts and events, collects and document information based on established practices and supports the preparation and publishing of security advisories.

He/she assists with the analysis of security-related information and events, escalation of incidents for validation and remediation. He/she must be familiar with cyber security standards, protocols and frameworks.

 

Responsive Image

Entry Level Cybersecurity Competency Requirements:

Awareness 



Cybersecurity Awareness Programme
(1 day)
Threat Intelligence and Detection Level 2

Cybersecurity Foundation



CompTIA A+
(5 days)
Infrastructure Support Level 3

â

CompTIA Network+
(5 days)
Network Configuration Level

Cybersecurity Intermediate



CompTIA Security+ (5 days)
Security Architecture
Level 3

â

Identity and Access Management
(2 days)
Security Architecture
Level 3

Cybersecurity Advanced



EC Council Certified Network Defender (5 days)
Threat Intelligence and Detection Level 4

â

EC Council Certified Ethical Hacker (5 days)
Security Assessment and Testing Level 3

Technical Skills Requirements

Business Needs Analysis

Cyber and Data Breach Incident Management

Cyber Forensics

Infrastructure Support

Security Assessment and Testing
 
Threat Analysis and Defense

Security Administration

Soft Skills Requirements

Generate Insights, Propose Solution
(Sense Making Intermediate)

Leadership Communication and Negotiation in VUCA Times powered by Wiley  
(Communications and Influence Intermediate) 

Promote Customer Centric Innovations
(Creative Thinking Intermediate) 


 Support Workplace Improvements & Innovations
(Problem Solving Intermediate)

Specialisation: 6 Cybersecurity Roles


Cyber Risk Analyst

 

VAPT Analyst

Security Operation 
Analyst

Forensics & Incident Response Analyst

Cloud Security Analyst

Security Engineer


The Cyber Risk Analyst monitors, tracks and manages risk mitigations and exceptions to ensure cyber security standards and policies are established. 
 
The Vulnerability Assessment and Penetration Testing Analyst designs and performs tests and check cases to determine if infrastructure components and applications meet confidentiality, integrity, authentication, availability, authorisation and non-repudiation standards. 
The Security Operations Analyst performs real-time analysis and trending of security log data from various security devices and systems. He/she maintains data sources feeding the log monitoring system, develops and maintains detection and alerting rules. 
The Forensics Investigator is responsible for the investigation processes after a cyber-threat or incident. He is also responsible for performing the forensics investigation and determining the root cause of cyber-attacks.
A cloud security engineer’s job is to secure an organization’s cloud use and protect data against malicious actors. More importantly, so is the need for cloud security engineers to know how cybercriminals typically work in a cloud environment.
The Security Engineer designs, develops and implements secure system architectures. He/she embeds security principles into the design of system architectures to mitigate the risks posed by new technologies and business practices. 

Cybersecurity Job Roles x Certification Courses

Responsive Image

Cybersecurity Bundled Courses / Short Pathways


Cybersecurity Essentials

 

Vulnerability Assessment And Penetration Testing (VAPT)

Cyber Forensics Investigation and Incident Response 

Security Operations Center (SOC) Analysis

Security Engineering

Cloud Security Engineering (AWS & Azure)

Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image
Responsive Image


Identity and Access Management 
(2 days)
 
EC-Council Certified Threat Intelligence Analyst (CTIA)
(3 days)
EC-Council Computer Hacking Forensic Investigator (CHFI)
(5 days)
Certified Information Security Manager (CISM)
(5 days)
ISACA Certified in the Governance of Enterprise IT (CEGIT)
(5 days)
 (ISC)2 Certified Cloud Security Professional (CCSP)
(5 days)
CompTIA Security+
(5 days)
 
 Certified in Risk and Information Systems Control (CRISC)
(5 days)
EC-Council Certified Incident Handler (ECIH)
(3 days)
Cisco Certified CyberOps Associate
(5 days)
CompTIA Cybersecurity Analyst (CySA+)
(5 days)
Security Engineering on AWS
(3 days)
EC-Council Certified Network Defender (CND)
(5 days)
EC-Council Certified Penetration Testing Professional (CPENT)
(5 days)
 (ISC)2 Systems Security Certification Practitioner (SSCP)
(5 days)
Splunk Core User
(3 days)
CompTIA Advanced Security Practitioner (CASP+)
(5 days)
Microsoft Azure Security Technologies
EC-Council Certified Ethical Hacker (CEH)
(5 days)
A paragraph is a self-contained unit of a discourse in writing dealing with a particular point or idea. Paragraphs are usually an expected part of formal writing, used to organize longer prose.
A paragraph is a self-contained unit of a discourse in writing dealing with a particular point or idea. Paragraphs are usually an expected part of formal writing, used to organize longer prose.
Splunk Enterprise Security
(3 days)
(ISC)2 Certified Information Systems Security Professional (CISSP)
(5 days)
A paragraph is a self-contained unit of a discourse in writing dealing with a particular point or idea. Paragraphs are usually an expected part of formal writing, used to organize longer prose.

Soft Skills
(Choose 2 out of 4: 
2 days per course)

Generate Insights, Propose Solution

Leadership Communication and Negotiation in VUCA Times powered by Wiley 

Promote Customer Centric Innovations

Support Workplace Improvements & Innovations
Soft Skills
(Choose 2 out of 4: 
2 days per course)


Generate Insights, Propose Solution

Leadership Communication and Negotiation in VUCA Times powered by Wiley 

Promote Customer Centric Innovations

Support Workplace Improvements & Innovations
Soft Skills
(Choose 2 out of 4: 
2 days per course)


Generate Insights, Propose Solution

Leadership Communication and Negotiation in VUCA Times powered by Wiley 

Promote Customer Centric Innovations

Support Workplace Improvements & Innovations
Soft Skills
(Choose 2 out of 4: 
2 days per course)


Generate Insights, Propose Solution

Leadership Communication and Negotiation in VUCA Times powered by Wiley 

Promote Customer Centric Innovations

Support Workplace Improvements & Innovations
Soft Skills
(Choose 2 out of 4: 
2 days per course)


Generate Insights, Propose Solution

Leadership Communication and Negotiation in VUCA Times powered by Wiley 

Promote Customer Centric Innovations

Support Workplace Improvements & Innovations
Soft Skills
(Choose 2 out of 4: 
2 days per course)

Generate Insights, Propose Solution

Leadership Communication and Negotiation in VUCA Times powered by Wiley 

Promote Customer Centric Innovations

Support Workplace Improvements & Innovations