Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
a) Access Network
All Course Calendar
Archives
b) Core Network
Basic Courses for Professionals
Business Analytics & Management
c) Certified Technicians
Carrier Ethernet Program
Cloud-Enabling Technologies
Demo
Fiber Optics Communication Technologies Courses
Forms
Internet of Things (IoT)
IP / Traffic Engeering / Signaling
LTE / 4G / 5G Technologies
Member
Network QoS & Optimization
Security Courses
Telefocal Certification Programmes
Training Course Calendar
Training Courses
Transmission Technologies

An Overview of Cyber Security

“This course allows me to fully appreciate the risks that Cyber Security presents. ”

~ Wee K, SINGTEL

Course Objectives:

After attending the training, participants will be able to:

  • Describe the principal types of security threat to which individual computer users, governments, SMEs and large corporations are exposed;
  • Describe the strengths and weaknesses of defence mechanisms which are deployed by end users, network administrators, and network operators to overcome security threats;
  • Understand the separate motivations of hackers, crackers and risk managers and the role that each plays in the current cybersecurity landscape;
  • Appreciate the evolution of the technology involved in cybersecurity, including concepts such as encryption, firewalls, layering, redundancy, identity and authentication
  • Appreciate the increasing importance of cybersecurity in Internet based products, particularly arising from the growth in cloud computing
  • Develop a war gaming approach to testing the security of networks

 

Course Overview:

The course is designed to give experienced telecoms and computer network professionals additional specialist cybersecurity skills, allowing them to focus on how end-to-end network protection is optimised. For executives without a background in networking, who are tasked with protecting their company against cyber-attacks, the course provides an appreciation of network vulnerabilities used by hackers, and the techniques used to thwart them. Internet users will gain valuable insights on how to keep themselves protected and to prevent exposure to vulnerable network.

Key Benefits:

The ever present threat of cyber attacks, which can paralyse a laptop, a corporation or a government, requires a portfolio of weapons to be maintained in the cyber armoury to protect and deter. A virus protection programme, a firewall, or network redundancy scheme used in isolation will rarely provide adequate projection. This course not only gives an overview of the latest protection mechanisms, but also describes also how a multi-faceted protection solution should be adopted, to keep up with the evolving threat.

Who Should Attend?

Network Security Executives, Network Security Auditors, Business Continuity Professionals, Telecom and Computer Network Engineers, Strategic Network Planners, Security Product Development. Telecom Regulators.

Course Duration:

2 – day instructor-led training event

Course Outlines:

  • The Cyber Security Landscape
  • Types of attack and motivation
  • Key Areas requiring Security

  • Strengths and weaknesses of defence mechanisms
  • Cyber Security Solutions

 


Threats are a fact of life in the world of cyber security. One of the most challenging aspects of cyber security is constantly evolving nature of security risks.From internal threats to creative ransomware to the Industrial Internet of Things (IoT), security experts surmised that commercial cyber security threats would likely materialize in the next years.

Some of the Cyber Attacks that need to be avoided are : Malware (including Trojans, viruses and worms), Phishing Attacks, Password Attacks, Denial-of-Service (DoS) Attacks, Rogue Software, etc.

We cannot eliminate the threats but we can be protected from them. This should be done without disrupting business innovation and growth.

How can we defend ourselves against these threats and risks?

The only sure defense is Knowledge. And Top Management of any organisation needs to have this Knowledge.

Related Course Topics

ABCs of Telecommunications Course Objectives: After attending the "ABCs of Telecommunications" training, participants will be able to: Understand the basics of telecommunications and how they are being used. Understand the vital links between wireless and wireline s...
Overview of 3G / 4G / 5G Mobile Technologies Course Objectives: After attending the "Overview of 3G/4G/5G Mobile Technologies" training, participants will be able to: Understand the fundamentals of cellular and mobile networks and their associated technologies Appreciate the diff...
Fundamentals of IP and Network Access Technologies Course Objectives: The main objective of this course is to provide foundational knowledge of IP Routing, Switching and Network Access Technologies to Telecom professionals with little or no prior knowledge of IP. This course aims to explain the prin...
Overview of Mobile Network and LTE / Transmission Technologies Course Objectives: This training aims to introduce the idea of LTE IP transport network solutions to transmission design engineers. LTE Transport Network should accommodate the traffic created by cellular coverage. Thus, the correct dimensioning of...
LTE Security Course Overview: This "LTE Security" course is designed to enable participants understand the security issues surrounding LTE networks. It will list and explain in-depth the various encryption algorithms used in LTE networks so that the participants...

COURSE ENQUIRY

Telefocal Asia Pte Ltd © www.telefocal.com. All rights reserved. Website Terms & Conditions

Setup Menus in Admin Panel