fbpx

Professional Certificate in
Cybersecurity

Accelerate expertise in cybersecurity defense to create a secured workplace

Course Overview

In the digital era where all companies are digitally connected, cybersecurity is no longer a nice-to-have — it is a necessity. Learn how to protect organisations from cybercrime!

Duration: 13 weeks

Intake: March 2022

Mode: Online, Part-time

Award: UTMSPACE/UTM

Why do you need Cybersecurity?

Businesses of all sizes are at risk from security flaws and vulnerabilities. This unnecessary risk continues to hinder businesses from operating peacefully from malicious attacks. This is where cybersecurity steps in. Just like a home needs security, your organisation needs security too.

Who Will Benefit?

Who Will Benefit?

Working Professionals

Fresh
Graduates

Entrepreneurs

Individuals Looking to Pivot Careers

Working Professionals

Fresh Graduates

Entrepreneurs

Individuals Looking to
Pivot Careers

What Will You Learn?

In this course, trainees will learn the latest security practices to improve the security posture of any organisation, from detecting vulnerabilities to producing an in-depth cybersecurity strategy & defense plan to protect, detect and respond to cybercrime.
  • After completing this program, trainees will be able to:
  • Analyse cybersecurity assessments and countermeasures including vulnerabilities and intrusion detection to identity protection coverage towards threats and attacks.
  • Demonstrate best practices on comprehensive cybersecurity administration and management to ensure critical digital assets are well protected.
  • Identify the important security architecture and features for Cloud environment to implement trusted and secured shared infrastructures.

Topics

Cybersecurity Assessment & Planning

1. Theory of Cybersecurity Assessments
2. Tools and Technical Skills for Cybersecurity Assessment
3. Network Intrusion Detection System (NIDS)

Cybersecurity Administration

1. Introduction to Identity Management and Azure Directory Components
2. Security Planning, Implementation and Management of Office 365
3. Implementation and Mitigation of PowerShell-based Security Exploit

Host & Cloud Cybersecurity

1. Microsoft Azure Security Architecture
2. Security of Virtual Machines, Applications, and Data
3. Impact Analysis

Next Steps?

Sign Up Now

Take you first step towards becoming a digital talent

Speak to our Program Manager

Find out more of our Customised Training Progams

Sign Up Now

Take you first step towards becoming a digital talent

Contact Our Training Consultants

Find out more of our Customised Training Progams

Faralynne

Check out our other Courses!