The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistBuild your cyber defense capabilities to protect your organisation’s most critical information—and your own
Download BrochureTBD
2 months, online
4-6 hours per week
Participants report that enroling in a programme with colleagues fosters collaborative learning and amplifies their impact.
Please provide your details to get more information about the group-enrolment pricing.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events Specialist
Apply now to enjoy XXXX off the programme fee.
Use code XXXX during payment.
WhatsApp an Advisor on +65 8014 3066
Have questions? Our Advisor will assist you promptly.
The programme comprises 8 modules. Each module is led by an SMU faculty expert with field experience specific to the Cyber Security topics being discussed.
Explore the objectives of cyber security, the importance of developing a security mindset, common/best practices and principles, and robust security strategies.
Discuss the future and impact of cryptographic systems, elements of secure encryption, factors that ensure data integrity, the need for authenticated encryption systems, and how to identify robust encryption systems in cryptography.
Gain a deeper understanding of the underlying technologies in blockchain, current uses and the future of blockchain tech, the security implications of blockchain as a technology, and the strengths and weaknesses of open and closed distributed ledgers in blockchain.
Examine the drawbacks of existing data security solutions, the impact of crypto techniques on security and performance, key elements of encrypted data, and how to identify technologies that provide strong privacy protection in zero trust environments.
Explore common networking protocols and their corresponding threats, common network security defense technologies, strategies to deal with Denial-of-Service attacks, and the ways to use Wi-Fi safely.
Build your knowledge of the cyber-attack life cycle, common software vulnerabilities leading to cyber attacks, the different phases of risk management, good hygiene practices in software security, and how to identify different elements of threat identification and prioritisation.
Learn the salient aspects of cyber culture as it exists today and the importance of developing a cyber security culture, the elements of the People Process and Technology framework for a strong cyber culture foundation, and ways to provide a framework for building a cyber mindset.
Dive into the overall threat landscape of emerging technologies, the trade-offs between security and emerging technologies, potential solutions for a sustainable cyber security ecosystem, and how to assess the inadequacies of current cyber security measures against emerging technologies.
Explore the objectives of cyber security, the importance of developing a security mindset, common/best practices and principles, and robust security strategies.
Explore common networking protocols and their corresponding threats, common network security defense technologies, strategies to deal with Denial-of-Service attacks, and the ways to use Wi-Fi safely.
Discuss the future and impact of cryptographic systems, elements of secure encryption, factors that ensure data integrity, the need for authenticated encryption systems, and how to identify robust encryption systems in cryptography.
Build your knowledge of the cyber-attack life cycle, common software vulnerabilities leading to cyber attacks, the different phases of risk management, good hygiene practices in software security, and how to identify different elements of threat identification and prioritisation.
Gain a deeper understanding of the underlying technologies in blockchain, current uses and the future of blockchain tech, the security implications of blockchain as a technology, and the strengths and weaknesses of open and closed distributed ledgers in blockchain.
Learn the salient aspects of cyber culture as it exists today and the importance of developing a cyber security culture, the elements of the People Process and Technology framework for a strong cyber culture foundation, and ways to provide a framework for building a cyber mindset.
Examine the drawbacks of existing data security solutions, the impact of crypto techniques on security and performance, key elements of encrypted data, and how to identify technologies that provide strong privacy protection in zero trust environments.
Dive into the overall threat landscape of emerging technologies, the trade-offs between security and emerging technologies, potential solutions for a sustainable cyber security ecosystem, and how to assess the inadequacies of current cyber security measures against emerging technologies.
Through real-world examples from multiple industries, you'll see how the theories are put into practice. Some of these examples include.
Learn how privacy violations and poorly implemented security could allow cyber attackers to interfere with services and systems people need.
Learn about a malware attack in 2017 due to the weakest link in the information security structure.
Understand how Deutsche Bank was able to stop a fraudulent transaction due to its vigilant corporate culture.
Analyse how an attempted phishing attack could have led to compromised emails and technical data at SMU.
Learn how a phone spear phishing attack that targeted employees, resulted in huge financial losses and compromised customer data.
Note: All brand, product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with, endorsement by, or association of any kind between them and programme owners.
The digital era comes with inherent benefits—instant access to information, global connectivity and portable devices. However, it also comes with risks, including endless opportunities for cyber criminials to exploit individuals and enterprises. Risks that often lead to data breaches that expose sensitive information, directly impacting business operations, functionality and even public perception.
As more business processes shift online at an accelerated pace, organisations must ensure that they have up-to-date systems and strategies in place to predict, prevent and counter rapidly evolving cyber attacks.
In the online Cyber Security for Business and Risk Management programme—offered by Singapore Management University—you can master the technical and functional know-how you need to manage potential cyber threats and safeguard your enterprise’s devices and services, as well as your own.
Data breach costs rose from USD 3.86 million to USD 4.24 million, the highest average total cost in the 17-year history of the IBM report.
As per a global survey in Cyber Threat Defense Report, a record 86% of organisations were affected by a successful cyber attack.
Cyber crime accounted for 43% of all crime in Singapore last year, with the COVID-19 pandemic being a key factor in online threats.
The programme is designed for professionals from any academic background with preferably 10+ years of work experience, and is applicable across all industries, particularly IT and Finance.
It can benefit people involved in Technology, IT and Information Security functions.
This programme is especially helpful for those who are looking to:
Upon successful completion of the programme, participants will be awarded a verified digital certificate by Singapore Management University.
Download BrochureAll certificate images are for illustrative purposes only and may be subject to change at the discretion of Singapore Management University.