Cybersecurity

Building Cyber Resilience in a Digital Era

Country/Region
Work Experience

Please note that the programme duration includes a break week for Christmas from 24th Dec 2024 to 1st Jan 2025, and for Chinese New Year from 28th Jan 2025 to 3rd Feb 2025.

Future-Proof Your Career: Invest in Your Success

Emeritus and NUS School of Computing unite to offer an exclusive opportunity. Enrol before 13 December 2024 using this code: APAC75ALL7310 and get USD 75 program fee benefit. Limited seats available. Reserve your spot today!

Upcoming Round Date: 13 December 2024

What Will This Programme Do For You?

  • Explain the fundamentals of cybersecurity and C-I-A security requirements

  • Describe the key concepts and techniques in the cybersecurity domain, including encryption, authentication, and secure channel

  • Recognise well-known attacks on vulnerable hosts, networks, and web servers; and explain counter measures that can prevent and withstand the attacks

  • Apply best practices in cybersecurity to safeguard the systems from cyber attacks

Programme Highlights

Pre-Recorded Video Lectures* from NUS faculty

Pre-Recorded Video Lectures* from NUS faculty with for self-paced learning interspersed with live lectures from renowned NUS faculty and industry practitioners

10+ Assignments

10+ Assignments

5+ Discussion Boards

5+ Discussion Boards

5+ Demo Videos

5+ Demo Videos

4+ Case Studies

4+ Case Studies

Note:

  • The programme highlights presented above are approximate, and subject to change depending on the availability and expertise of the teaching faculty, as well as the programme's desired outcomes.

  • The programme is designed to be delivered approximately over 9 to 10 months in a calendar year, including some occasional breaks that may be provided. This is only indicative. The actual calendar time may be more or less by a few weeks depending on the number of topics covered and other variables like breaks provided/not provided."

  • Assignments are reviewed either by success coach who is available to support participants in their learning journey and/or by the Emeritus grading team. The final number of quizzes, assignments and discussions will be confirmed closer to the programme start.

  • *This is a majorly self-paced online programme with some live sessions with programme faculty. Post- session video recordings will be available for up to 12 months after programme completion. We have a curated panel of industry practitioners who will be conducting the weekly live doubt-clearing sessions.

  • **For the on-campus networking session participants will be responsible for making their own travel and accommodation arrangements.

Case Studies

Brute Force Attack on Mozilla Firefox

Brute Force Attack on Mozilla Firefox

We will be looking at the example of how Mozilla Firefox protected stored passwords on their browsers using weak encryption schemes and how they failed to prioritize patching for close to 9 years.

Singapore’s Cyber Security Masterplan

Singapore’s Cyber Security Masterplan

As Singapore embarks on its digital transformation initiative towards a smart nation and digital economy, the country publishes a snapshot of the cyber landscape in Singapore every year. The government strives to establish safer and more secure cyberspace through its cybersecurity master plan.

Hacking into the Dunkin Donut Reward Programme

Hacking into the Dunkin Donut Reward Programme

We will be using Nmap tools on a sample test system to scan for open Ports, identify those ports which should not be open in a live system & also use brute force hacking attempts to simulate the way in which attackers hacked into the Dunkin Donuts rewards programme.

Exploiting Unpatched Versions of Google Chrome Browser

Exploiting Unpatched Versions of Google Chrome Browser

We will be using the Metasploit tool on a sample Linux system to execute a Linux kernel escalation attack and then explain how these attacks are then simulated by attackers to go after unpatched versions of Google Chrome which enables them to install all kinds of spyware & malware on Android machines (smartphones/laptops) as per their requirement.

Zero Trust Architecture at GitLab

Zero Trust Architecture at GitLab

We will be looking at the experience of Kathy Wang (Former CISO of GitLab) and the challenges she faced in securing the IT architecture at her company & how she finally decided to go ahead with a Zero trust architecture for her company.

Note:

  • All brand, product and company names are trademarks™ or registered® trademarks of their respective holders.

  • Use of them does not imply any affiliation with, endorsement by, or association of any kind between them and programme owners.

Programme Modules

Tools Covered

Learn how to use most in-demand tools with faculty demo videos.

Wireshark

Wireshark

Nmap

Nmap

Metasploit

Metasploit

Nessus

Nessus

Note:

  • *All product and company names mentioned in this material are trademarks or registered trademarks of their respective holders. Their use does not imply any affiliation with or endorsement by them

  • *The tools will be taught by teaching faculty, industry practitioners, or linked to relevant knowledge bases for your reference and self-guided learning

Programme Goals

LP - NUS SOC - CYS - Programme Goals - Text Image

Who Is This Programme For?

The programme is designed for working professional from major industries such as IT Product & Services, Banking and Financial Services, Computer & Network Security, and Management Consulting.

The programme is designed for working professionals who are looking to incorporate fundamentals of cybersecurity in their function/organisation.

Testimonials

The program was phased in such a way that the student could work within the time frame provided. Each of the videos is short and easily consumed within a day of study at the choice of the student. The...
Edward Tan
Director/Consultant
The course material and presentation style from professors are well-suited for capturing high attention from students. Although I am experienced in the topics covered so far, I was pleasantly surprise...
Hiten Sampat Gajjar
Lead Software Architect,
Acronis Research and Development Pvt Ltd.
While I have worked in the security space, both in terms of governance and implementation (e.g., Firewalls, DLP, PGP), the focus has primarily been on implementing the products. This course takes a di...
Neval Menezes
Director Technology,
Fidelity Investments
❝The pace of the program is perfect, and the contents covered are very relevant and relatable. An extreme beginner to Cybersecurity would find this course beneficial. It has also allowed me to start p...
Dhanesh Rama Krishnan
Business Analyst,
Cognizant

Past participants of Emeritus work at

LP - NUS SOC - CYS - Past participants of Emeritus work at - Image

Programme Faculty

Dr Sufatrio
Dr Sufatrio

Lecturer (Educator Track)

Dr Sufatrio is a Lecturer with the School of Computing (SoC) of the National University of Singapore (NUS).

He obtained his Ph.D. and M.Sc. in Computer Science from SoC, NUS....

Dr Guo Charng Rang
Dr Guo Charng Rang

Executive Education Fellow

Dr Guo has a Ph.D in Mathematics from the University of Oxford and B.Sc (Honours) in Mathematics from NUS.

He served as the founding Programme Director of the National Cybers...

Note: Programme Faculty for the live sessions might change due to unavoidable circumstances, and revised details will be shared closer to the programme start date.

Certificate

Certificate

Upon successful completion of the programme, participants will be awarded a verified digital certificate by NUS School of Computing.

Note: All certificate images are for illustrative purpose only and may be subject to change at the discretion of NUS School of Computing.

Emeritus Career Preparation Services

Stepping into a business leadership career requires a variety of job-ready skills. Below given services are provided by Emeritus, our learning collaborator for this program. The primary goal is to give you the skills needed to succeed in your career; however, job placement is not guaranteed. Emeritus provides the following career preparation services:

  • Resume building videos

  • Linkedln profile building videos

  • Glossary of resume templates

Please note: NUS or Emeritus do not promise or guarantee a job or progression in your current job. Career Services is only offered as a service that empowers you to manage your career proactively. The Career Services mentioned here are offered by Emeritus. NUS is not involved in any way and makes no commitments regarding the Career Services mentioned here

The Learning Experience

More than 300,000 professionals globally, across 200 countries, have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded. All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes, the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner during the course period the cost of which is already included in the overall Course fee of the course.

A dedicated program support team is available 7 days a week to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.

Early registrations are encouraged. Seats fill up quickly!

Starts On