Cyber Security for Business and Risk Management

Build your cyber defense capabilities to protect your organisation’s most critical information—and your own

Get Your Brochure

Course Dates

STARTS ON

TBD

Course Duration

DURATION

2 months, online
4-6 hours per week

Course Fee

Applications close on TBD

Apply now to enjoy XXXX off the programme fee.
Use code XXXX during payment.

WhatsApp an Advisor on +65 8014 3066
Have questions? Our Advisor will assist you promptly.

What You Will Learn in the Programme?

  • Describe key cyber security concepts and security objectives
  • Evaluate the Public-Key Infrastructure and the most common types of cryptographic algorithm
  • Describe basic concepts & the technologies used in blockchain and its business models
  • Develop tailored crypto techniques for the specific systems and application settings
  • Design a set of rules and configurations to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies
  • Analyse the challenges and emerging technological trends in cyberspace

Programme Highlights

85+ Video Lectures

85+ Video Lectures

15+ Discussion Boards

15+ Discussion Boards

12 Assignments

12 Assignments

10+ Industry Examples

10+ Industry Examples

2 Industry Practice Tools

Real-world Case Study Simulations

Programme Modules

The programme comprises 8 modules. Each module is led by an SMU faculty expert with field experience specific to the Cyber Security topics being discussed.

Module 1:

Cyber Security Landscape

Explore the objectives of cyber security, the importance of developing a security mindset, common/best practices and principles, and robust security strategies.

Module 2:

Cryptographic Systems

Discuss the future and impact of cryptographic systems, elements of secure encryption, factors that ensure data integrity, the need for authenticated encryption systems, and how to identify robust encryption systems in cryptography.

Module 3:

Blockchain

Gain a deeper understanding of the underlying technologies in blockchain, current uses and the future of blockchain tech, the security implications of blockchain as a technology, and the strengths and weaknesses of open and closed distributed ledgers in blockchain.

Module 4:

Cloud Data Security & Privacy

Examine the drawbacks of existing data security solutions, the impact of crypto techniques on security and performance, key elements of encrypted data, and how to identify technologies that provide strong privacy protection in zero trust environments.

Module 5:

Network Security

Explore common networking protocols and their corresponding threats, common network security defense technologies, strategies to deal with Denial-of-Service attacks, and the ways to use Wi-Fi safely.

Module 6:

Frameworks to Identify & Prioritise Threats Including Threat Management

Build your knowledge of the cyber-attack life cycle, common software vulnerabilities leading to cyber attacks, the different phases of risk management, good hygiene practices in software security, and how to identify different elements of threat identification and prioritisation.

Module 7:

Building a Cyber Security Culture Within an Organisation

Learn the salient aspects of cyber culture as it exists today and the importance of developing a cyber security culture, the elements of the People Process and Technology framework for a strong cyber culture foundation, and ways to provide a framework for building a cyber mindset.

Module 8:

Emerging Technologies & the Future of Cyber Security

Dive into the overall threat landscape of emerging technologies, the trade-offs between security and emerging technologies, potential solutions for a sustainable cyber security ecosystem, and how to assess the inadequacies of current cyber security measures against emerging technologies.

Module 1:

Cyber Security Landscape

Explore the objectives of cyber security, the importance of developing a security mindset, common/best practices and principles, and robust security strategies.

Module 5:

Network Security

Explore common networking protocols and their corresponding threats, common network security defense technologies, strategies to deal with Denial-of-Service attacks, and the ways to use Wi-Fi safely.

Module 2:

Cryptographic Systems

Discuss the future and impact of cryptographic systems, elements of secure encryption, factors that ensure data integrity, the need for authenticated encryption systems, and how to identify robust encryption systems in cryptography.

Module 6:

Frameworks to Identify & Prioritise Threats Including Threat Management

Build your knowledge of the cyber-attack life cycle, common software vulnerabilities leading to cyber attacks, the different phases of risk management, good hygiene practices in software security, and how to identify different elements of threat identification and prioritisation.

Module 3:

Blockchain

Gain a deeper understanding of the underlying technologies in blockchain, current uses and the future of blockchain tech, the security implications of blockchain as a technology, and the strengths and weaknesses of open and closed distributed ledgers in blockchain.

Module 7:

Building a Cyber Security Culture Within an Organisation

Learn the salient aspects of cyber culture as it exists today and the importance of developing a cyber security culture, the elements of the People Process and Technology framework for a strong cyber culture foundation, and ways to provide a framework for building a cyber mindset.

Module 4:

Cloud Data Security & Privacy

Examine the drawbacks of existing data security solutions, the impact of crypto techniques on security and performance, key elements of encrypted data, and how to identify technologies that provide strong privacy protection in zero trust environments.

Module 8:

Emerging Technologies & the Future of Cyber Security

Dive into the overall threat landscape of emerging technologies, the trade-offs between security and emerging technologies, potential solutions for a sustainable cyber security ecosystem, and how to assess the inadequacies of current cyber security measures against emerging technologies.

Download Brochure

Industry Examples

Through real-world examples from multiple industries, you'll see how the theories are put into practice. Some of these examples include.

Internet of Things (IoT) Smart Cities

Learn how privacy violations and poorly implemented security could allow cyber attackers to interfere with services and systems people need.

Maersk

Maersk

Learn about a malware attack in 2017 due to the weakest link in the information security structure.

Deutsche Bank

Understand how Deutsche Bank was able to stop a fraudulent transaction due to its vigilant corporate culture.

Singapore Management University

Analyse how an attempted phishing attack could have led to compromised emails and technical data at SMU.

Twitter Data Breach

Twitter Data Breach

Learn how a phone spear phishing attack that targeted employees, resulted in huge financial losses and compromised customer data.

Note: All brand, product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with, endorsement by, or association of any kind between them and programme owners.

Industry Practice Tools

Zenmap

Wireshark

Why Enrol in Cyber Security for Business and Risk Management?

The digital era comes with inherent benefits—instant access to information, global connectivity and portable devices. However, it also comes with risks, including endless opportunities for cyber criminials to exploit individuals and enterprises. Risks that often lead to data breaches that expose sensitive information, directly impacting business operations, functionality and even public perception.

As more business processes shift online at an accelerated pace, organisations must ensure that they have up-to-date systems and strategies in place to predict, prevent and counter rapidly evolving cyber attacks.

In the online Cyber Security for Business and Risk Management programme—offered by Singapore Management University—you can master the technical and functional know-how you need to manage potential cyber threats and safeguard your enterprise’s devices and services, as well as your own.

USD 4.2 Mn

Data breach costs rose from USD 3.86 million to USD 4.24 million, the highest average total cost in the 17-year history of the IBM report.

SOURCE: COST OF A DATA BREACH REPORT, 2021

86%

As per a global survey in Cyber Threat Defense Report, a record 86% of organisations were affected by a successful cyber attack.

SOURCE: CYBERTHREAT DEFENSE REPORT, 2021

43%

Cyber crime accounted for 43% of all crime in Singapore last year, with the COVID-19 pandemic being a key factor in online threats.

SOURCE: CNA, 2021

Programme Faculty

Faculty Member Robert H Deng, PhD

Robert H Deng, PhD

AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Deputy Dean for Faculty & Research, School of Computing and Information Systems, Singapore Management University

Robert Deng is AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Deputy Dean for Faculty & Research, School of Computing and Information Systems, Singapore Management University... More info
Faculty Member Debin Gao, PhD

Debin Gao, PhD

Full-Time Faculty Associate Professor of Computer Science; Faculty Manager, SMU BSc (IS)-CMU Fast-Track Programme; Supervisor to SCIS UG Instructors

Debin Gao is Full-Time Faculty & Associate Professor of Computer Science ,as well as, Faculty Manager, Singapore Management University. Having obtained his PhD degree from Carnegie Mellon University, Debin focuses his research on software and systems security. In recent years... More info
Faculty Member Shar Lwin Khin, PhD

Shar Lwin Khin, PhD

Full-Time Faculty Assistant Professor of Computer Science (Practice)

Dr Lwin Khin Shar is an assistant professor in School of Information Systems at SMU. He was a research scientist in School of Computer Science and Engineering, Nanyang Technological University (NTU) and a research associate at the Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg. He received his PhD and Bachelor of... More info
Faculty Member Flocy Joseph, PhD

Flocy Joseph, PhD

Full-Time Faculty SMU Programme Director, Executive Development

Dr Flocy Joseph joined SMU in 2012 with the Human Capital Leadership Institute as the country lead for India, servicing the Indian MNCs. Her role encompasses designing, delivering and facilitating executive development programmes for industry-specific and customised programmes for the university’s tier corporate clients. She earned her PhD... More info

Who Is This Programme For?

The programme is designed for professionals from any academic background with preferably 10+ years of work experience, and is applicable across all industries, particularly IT and Finance.

It can benefit people involved in Technology, IT and Information Security functions.

This programme is especially helpful for those who are looking to:

  • Coordinate with business professionals to build a technology roadmap with cyber security initiatives
  • Master both the tech and management aspects of cyber security to lead teams and co-workers
  • Put strategies/frameworks into place for cyber attacks
  • Keep up with latest cyber trends, threats and opportunities

Certificate

Example image of certificate that will be awarded after successful completion of this program

Certificate

Upon successful completion of the programme, participants will be awarded a verified digital certificate by Singapore Management University.

Download Brochure

All certificate images are for illustrative purposes only and may be subject to change at the discretion of Singapore Management University.

Apply Now

Early registrations are encouraged. Seats fill up quickly!