Building Cyber Resilience in a Digital Era

Download Brochure

Get Your Brochure

Course Dates



Course Duration


3 Months, Online
6-8 hours per week, Online via recorded video lectures

Course Fee

Free 6-Months Access to Emeritus Insights

This programme features 6 months of free Premium Access to Emeritus Insights—a mobile app with 5,000+ bite-sized, business-focused videos to help you meet your daily learning goals on the go.

Apply today and avail tuition assistance of USD 100.
Use code NUS100TA while applying.

WhatsApp an Advisor on +65 8014 3066
Have questions? Our Advisor will assist you promptly.

What Will This Programme Do For You?

  • Explain the fundamentals of cybersecurity and C-I-A security requirements
  • Describe the key concepts and techniques in the cybersecurity domain, including encryption, authentication, and secure channel
  • Recognise well-known attacks on vulnerable hosts, networks, and web servers; and explain counter measures that can prevent and withstand the attacks
  • Apply best practices in cybersecurity to safeguard the systems from cyber attacks

Programme Highlights

120+ Video Lectures

10+ Assignments

10+ Assignments

5+ Discussion Boards

5+ Demo Videos

5+ Demo Videos

4+ Case Studies

Case Studies

Brute Force Attack on Mozilla Firefox

We will be looking at the example of how Mozilla Firefox protected stored passwords on their browsers using weak encryption schemes and how they failed to prioritize patching for close to 9 years.

Singapore’s Cyber Security Masterplan

As Singapore embarks on its digital transformation initiative towards a smart nation and digital economy, the country publishes a snapshot of the cyber landscape in Singapore every year. The government strives to establish safer and more secure cyberspace through its cybersecurity master plan.

Hacking into the Dunkin Donut Reward Programme

We will be using Nmap tools on a sample test system to scan for open Ports, identify those ports which should not be open in a live system & also use brute force hacking attempts to simulate the way in which attackers hacked into the Dunkin Donuts rewards programme.

Exploiting Unpatched Versions of Google Chrome Browser

We will be using the Metasploit tool on a sample Linux system to execute a Linux kernel escalation attack and then explain how these attacks are then simulated by attackers to go after unpatched versions of Google Chrome which enables them to install all kinds of spyware & malware on Android machines (smartphones/laptops) as per their requirement.

Zero Trust Architecture at GitLab

We will be looking at the experience of Kathy Wang (Former CISO of GitLab) and the challenges she faced in securing the IT architecture at her company & how she finally decided to go ahead with a Zero trust architecture for her company.

Note: All brand, product and company names are trademarks™ or registered® trademarks of their respective holders.
Use of them does not imply any affiliation with, endorsement by, or association of any kind between them and programme owners.

Programme Modules

    • Why cybersecurity
    • The difficulty of achieving security
    • Encryption, decryption and keys
    • Classical ciphers
    • Definitions and properties of cryptosystems
    • Kerckhoffs’ principle vs security by obscurity
    • Stream cipher
    • Block cipher
    • Entity authentication
    • Password
    • Multi-factor authentication
    • Public Key Cryptography (PKC)
    • Hash and keyed-hash
    • Data origin authentication using MAC
    • Data origin authentication using Signature
    • Public Key Distribution (PKD)
    • Public Key Infrastructure (PKI)
    • Strong authentication protocol
    • Key exchange protocol
    • Authenticated key exchange protocol
    • Securing a communication channel
    • Network layer
    • Name resolution and attacks
    • Denial of Service (DoS) attacks
    • Useful network security tools: Wireshark and Nmap
    • Firewall
    • Web threat models
    • UI-based attacks
    • Cross Site Scripting (XSS) attacks
    • Cross Site Request Forgery (CSRF) attacks
    • SQL Injection attacks
    • Access control
    • Access control representation
    • Access control in UNIX/Linux
    • Controlled invocation and privilege elevation
    • Attack framework and cyber kill chain
    • Reconnaissance
    • Vulnerability scanning
    • Automated exploitation
    • Malware and defense
    • Web privacy
    • Cloud security
    • Mobile security
    • IoT security


Learn how to use most in-demand tools with faculty demo videos.





Note: All brand, product and company names are trademarks™ or registered® trademarks of their respective holders.
Use of them does not imply any affiliation with, endorsement by, or association of any kind between them and programme owners.

Programme Goals

Why Enrol for the Programme?

Cybersecurity is no longer an IT problem, it is a security problem; but unlike physical security, cyber attacks can come from anywhere in the world.

As the digitisation of the global economy grows, digital crimes grow with it. Digitisation of data, online and mobile interactions are creating millions of cyber attack risks and opportunities, with many leading to data breaches that threaten both people and businesses. Hence, cybersecurity has become an economic imperative.

With billions of dollars in revenue set to flow into the cybersecurity market in the next three years and amid talent deficits of cyber security providers (McKinsey , 2022), the need for cybersecurity specialists has been rising quickly.

The Cybersecurity programme offered by National University of Singapore’s School of Computing is a cutting-edge academic curriculum designed to meet the needs and priorities of organisations operating within this digital economy.

Curated with a strong emphasis on real-world relevance to meet rapidly evolving industry needs and trends, the programme will provide you with strong fundamentals of cybersecurity techniques to help you implement advanced solutions to recognise cyber attacks, enhance security, and prevent cyber attacks.


80% of organisations in APAC affected by ransomware attacks.

Source - Tech Wire Asia, 2022


At least six cybersecurity incidents have occurred in at least 65% of Singaporean organisations in the past year, however just 49% of these organisations are able to respond to threats in a day.

Source - Zednet, 2022


Singapore cybersecurity market is expected to register a CAGR of 13.3% during the period 2022-2027.

Source - Singapore Cybersecurity Market, 2022

Who Is This Programme For?

The programme designed for professionals in Information Technology Security functions. It is particularly applicable to major industries such as IT Product & Services, Banking and Financial Services, Computer & Network Security, and Management Consulting.

The programme is designed for professionals with technical background, with less than 10 years of experience, who are looking to incorporate fundamentals of cybersecurity in their function/organisation.

Past participants of Emeritus work at

Note: *All product and company names are trademarks or registered trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.


Faculty Member Dr Sufatrio

Dr Sufatrio

Lecturer (Educator Track)

Dr Sufatrio is a Lecturer with the School of Computing (SoC) of the National University of Singapore (NUS).

He obtained his Ph.D. and M.Sc. in Computer Science from SoC, NUS. Previously, he was a Scientist and Acting Lab Head of the Mobile Forensics & Security Lab, at the Cyber Security & Intelligence (CSI) Department, Institute for Infocomm Research (I2R), A*STAR.
More info

Faculty Member Dr Guo Charng Rang

Dr Guo Charng Rang

Executive Education Fellow

Dr Guo has a Ph.D in Mathematics from the University of Oxford and B.Sc (Honours) in Mathematics from NUS.

He served as the founding Programme Director of the National Cybersecurity R&D Lab (NCL) from 2015 – 2021, and an Associate Professor at the School of Computing at the National University of Singapore from 2017 – 2021.
More info



Upon successful completion of the programme, participants will be awarded a verified digital certificate by NUS School of Computing.

Download Brochure

Apply Now

Early registrations are encouraged. Seats fill up quickly!