Event Profile | |
Class/ Online | Classroom |
Date | May 02, 2025 |
Time | 9:00am to 5:00pm |
Venue | Hotel Grand Pacific Singapore 101 Victoria Street Singapore 188018 |
Fee | 9% GST will apply SGD 550.003 & above: SGD520.00 each For Member SGD 522.5 3 & above: SGD494 each |
Note | Two tea breaks and set lunch or buffet will be served. Limited complimentary car parking coupons are available upon request. Participants should bring a laptop with administrative rights |
Other Date(s) | 1) Mar 10, 2025 2) Jul 25, 2025 3) Nov 05, 2025 |
Trainer | |
Activity | |
You may reach us via T: 6204 6214 E: info@ccisg.com Alternatively, you may send below details to register Contact Person Company (optional), Name, Job Title, Mailing Address, Tel, Email Participant(s) Name, Job Title, Email |
Hackers today use advance technique and different forms of cyber attacks to infiltrate and penetrate into organizations through complex array of tools to achieve their goals. The need for effective tactics and solutions, and innovative ways to protect the various devices, networks and systems from cyberattacks in this AI era are even more critical. Effective counter measures to cyber-attacks and protection against information thefts are essential to operate in this globally, connected world. Learn the methods and tools to identify the vulnerabilities, implement the measures, and apply the necessary patches to devices and systems to prevent or mitigate exploitation.
Identify any flaws in your systems, develop the right technique to defend and response to any penetrative cyber-attacks, especially from social engineering, phishing attacks or scams with the use of AI.
Participants should bring a laptop with administrative rights
Identify any flaws in your systems, develop the right technique to defend and response to any penetrative cyber-attacks, especially from social engineering, phishing attacks or scams with the use of AI.
Participants should bring a laptop with administrative rights
Objective
- Guarding Against Social Engineering Attacks
- Tools, methods and tactics of a Hacker with AI usage
- Knowledge of phishing and tactics used by scammers.
- Prevent Credential Theft and compromise, with MFA
- Secure Password Management, or going Passwordless
- Use of Personal Data and Privacy
- Ensure Safe Data Security through more informed decisions online with proper safeguards
Outline
Social Engineering Attacks - Identify Exploits & Counteract
• Attacks and Weakest Links; Avoidance and Watch Out
What is Phishing?
• Phishing Types, Spoof & Scams; Identifying and Avoidance
Business Security and Best Practises
• Conversation and Avoidance
Storage Media Risks and Threats
• Infectious Attack
Social Media Attacks and Protection
• Attack Value and Types, Purpose and Ways to Protect; Usage & Best Practice
Password Management, MFA, Data Privacy & Footprints
• Secure and Strong, Objectives & Protection, MFA, PDPA; Online Traces and Links
Data Security
• Breaches, Types & Classes of Data; Transport, Steps to Protect; Wired & Wireless
Demonstration and Hands-on Activities
Check on Organisation’s website Vulnerability
After completing this course, learners can look into cybersecurity protection in Cyber Tools to fight against AI Deepfakes Scams and Cyber Security Threats
• Attacks and Weakest Links; Avoidance and Watch Out
What is Phishing?
• Phishing Types, Spoof & Scams; Identifying and Avoidance
Business Security and Best Practises
• Conversation and Avoidance
Storage Media Risks and Threats
• Infectious Attack
Social Media Attacks and Protection
• Attack Value and Types, Purpose and Ways to Protect; Usage & Best Practice
Password Management, MFA, Data Privacy & Footprints
• Secure and Strong, Objectives & Protection, MFA, PDPA; Online Traces and Links
Data Security
• Breaches, Types & Classes of Data; Transport, Steps to Protect; Wired & Wireless
Demonstration and Hands-on Activities
Check on Organisation’s website Vulnerability
After completing this course, learners can look into cybersecurity protection in Cyber Tools to fight against AI Deepfakes Scams and Cyber Security Threats
Who should attend
Anyone who is interested to learn about security, data security, phishing and social engineering attacks, understand how to prevent and protect against these cyber hackers
Prerequisite
Must know how to use mobile devices and laptops and install software and applications. Laptop/Macbook can acccess Hotel Wifi or your own mobile hotspot
- All Staff within an Organisation
- Managers, Team Leaders, Executives, Officers, Secretaries, Assistants
- IT Personnel, Operations
- Anyone involved in info-security, online security
- Anyone looking to gain knowledge or have skillsets in cyber security
Prerequisite
Must know how to use mobile devices and laptops and install software and applications. Laptop/Macbook can acccess Hotel Wifi or your own mobile hotspot
Methodology
This is a hands-on course, so bringing along a laptop is useful. There will be hands-on practices, activities, demonstration for various topics so that you can apply what is being taught.
A combination of lectures, case examples, videos and hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.
The trainer will explain on the topic and then guide you through with step-by-step practice or demonstrate on the topic.
A combination of lectures, case examples, videos and hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.
The trainer will explain on the topic and then guide you through with step-by-step practice or demonstrate on the topic.
Testimonial
Swee Chye was effective in delivering complex topics in simple to understand form - ST Electronics
The practical examples, concepts and skills taught by the Trainer are relevant and useful to everyone - International SOS
The hands-on activities, and demonstration made the training very realistic and relevant to learn about security - Hitachi Asia
The practical examples, concepts and skills taught by the Trainer are relevant and useful to everyone - International SOS
The hands-on activities, and demonstration made the training very realistic and relevant to learn about security - Hitachi Asia
Ang Swee Chye's Profile
Certified Technology Trainer, Facilitator and Consultant
Certifications
Swee Chye is an experience trainer certified by various organization. He is certified by the following organizations:
Education
He holds an honours degree in Electrical and Electronics Engineering, who possesses a strong passion in ICT Training, and has trained many organizations and customers globally.
Working Experience
He has more than 27 years of ICT experience. He has been providing ICT training to government, private institutions and organizations in 5 different continents. He specializes in Cyber Security, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence, Machine Learning, Gen AI and Prompt Engineering, Cloud Computing and Web Development. He focuses on data and data-related training programs to create, diagnose, analyse and predict (Gen AI, Data Science, Data Analytics, IoT, AI & ML), to protect data and mitigate risk (Cybersecurity) and to automate system and processes (Programming, Robotics & RPA). All these can be scaled and performed on premise or in the cloud.
Customers/Clients Credentials
Clients from diverse industries he has trained include GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Proctor & Gamble, Nanyang University, Republic Polytechnic, Singapore Polytechnic, Pavilion Energy, Nanyang Polytechnic, HTX, SPF, more than 10 different SG Govt Ministries, and overseas clients like Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, DOW Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG among many others.
Professional Work
Apart from being a corporate trainer, Swee Chye does consultancy work in ICT in areas like Cyber Security, Data Analytics, IoT, Robotics, Mobile Application, Data Analytics and Web Development.
Certifications
Swee Chye is an experience trainer certified by various organization. He is certified by the following organizations:
- Microsoft-certified - Microsoft Certified Educator,
- Apple-certified - Apple Professional Learning Specialist & Apple teacher,
- IBM-certified - IBM Data Science Practitioner – Instructor & IBM Enterprise Design Thinking Practitioner,
- Certified EC Council - Computer Hacking Forensic Investigator & Certified Ethical Hacker, CyberSecurity Career Mentor, Prompt Engineering for Developers, and Generative AI
- AWS-certified - AWS Cloud Quest: Cloud Practitioner,
- AI Professionals Fundamental, Data Engineering Foundation, ChatGPT Prompt Engineering for Developers
Education
He holds an honours degree in Electrical and Electronics Engineering, who possesses a strong passion in ICT Training, and has trained many organizations and customers globally.
Working Experience
He has more than 27 years of ICT experience. He has been providing ICT training to government, private institutions and organizations in 5 different continents. He specializes in Cyber Security, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence, Machine Learning, Gen AI and Prompt Engineering, Cloud Computing and Web Development. He focuses on data and data-related training programs to create, diagnose, analyse and predict (Gen AI, Data Science, Data Analytics, IoT, AI & ML), to protect data and mitigate risk (Cybersecurity) and to automate system and processes (Programming, Robotics & RPA). All these can be scaled and performed on premise or in the cloud.
Customers/Clients Credentials
Clients from diverse industries he has trained include GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Proctor & Gamble, Nanyang University, Republic Polytechnic, Singapore Polytechnic, Pavilion Energy, Nanyang Polytechnic, HTX, SPF, more than 10 different SG Govt Ministries, and overseas clients like Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, DOW Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG among many others.
Professional Work
Apart from being a corporate trainer, Swee Chye does consultancy work in ICT in areas like Cyber Security, Data Analytics, IoT, Robotics, Mobile Application, Data Analytics and Web Development.