WSQ—System Security Support (SF) (Synchronous and Asynchronous E-learning)
For organisational goals to be met, the System Security Support course aims to equip learners with the knowledge and skills in Security Administration. Learners will be competent in using functions and features of the security system to prevent unauthorised access, investigate security breaches, and monitor threats, access control permissions, and rights to various information systems and networks.

Key Facts
-
Course duration: Please refer to the details below
-
Intake dates: Start in January, February, March, April, May, October, or December
- Total training fee: S$1,950
- Funding: Up to 90% of funding is available. Please see the criteria below
This course will provide learners to perform security administration tasks to establish rules for the protection, detection, and response to the organization and administrative data and transaction threats. Upon successful completion of this modular course, learners can choose a career to become a Security Administrator, Network Administrator, Network Security Administrator, Network Security Engineer, Network Defence Technician, Computer Network Defence Analyst, Security Analyst, Security Operator, anyone involved in Security and Network Operations. This modular course transfers the knowledge, skills, and abilities related to System Security Support.
Please choose one of the following options: |
|
1 |
4.5 days, 9 AM - 6 PM (Monday - Friday). 9 hours/day *4 days + 3 hours of Assessment. |
2 |
2 weekends (Saturday and Sunday) + 3 hours of Assessment. |
3 |
14.5 days - 2 weeks, 7 PM - 10 PM (Monday - Friday). |
4 |
Customized upon corporate request. |
5 |
3 months, 1 session/week, 3 hours/session. |
At the end of the course, learners will be able to in:
1) Plan in protecting access by unauthorised personals using an end-to-end security administration system.
2) Evaluate tools and techniques to improve website security upon installing appropriate technology to protect against threats.
3) Update security administration plans and relevant personnel for identity access management and new cybersecurity policies to tackle emerging security threats.
4) Select and manage security administration processes by employing countermeasures to emerging security issues.
5) Devise access permissions, control rules upon investigating security weaknesses in the organization’s network infrastructure associated with business process’ priorities and security limits.
6) Analyse user access controls, plan relevant monitoring and control methods with effect on various levels of user access within various user groups.
7) Configure security practices, employ procedures to countermeasure security breaches, grant permissions for role-based access requests, based on their conformity with organisational standards and procedures for various levels of user access.
8) Investigate security violations evaluate the security breaches, diagnose security breaches in information and system or network access and recommend required action.
9) Facilitate organisation-wide communication for addressing security breaches and appraise cybersecurity learning continuum and necessary tools of cybersecurity.
The assumed skills and knowledge for this course are as follows:
- Be able to listen, speak, read, and write English proficiently in a clear and confident manner;
or provide documentary evidence of Workplace Literacy (WPL) Level 6 literacy skills in the
Employability Skills WSQ framework; - Be keen to learn and participate in the learning activities in myriad learning settings such as
online, classroom, laboratory, and blended learning, self-regulated learning contexts. - Be able to source and analyse relevant materials from the library, internet or online databases for design and development of learning resources.
Minimum Entry Requirement
- Aged between 21 years old and above.
- Minimum at least Learners must have ONE GCE O Level.
- Able to read, listen and speak English at a proficiency level equivalent to Employability Skills System (ESS) Literacy Level 6.
- Able to count with a proficiency equivalent to Employability Skills System (ESS) Numeracy Level 6.
- Have basic computer literacy (Workplace Skills Series - Information and communication Technologies Skills).
This accreditation enables Singaporeans and Singapore PR holders to get a part of their course funded by the SSG. Subjected to the eligibility and funding caps, the funding support is up to 90% for Singaporeans and up to 80% for Singapore PR holders.
Course Fee Funding for Self-sponsored Individuals (as of 30 Apr 2021)
Certifiable courses approved by SSG | Course level | Courses starting before 1 Jan 2022 | Courses starting on or after 1 Jan 2022 |
Singapore Citizens (SCs) and Permanent Residents (PRs) (Self-sponsored individuals must be at least 21 years old) | PMET | Up to 50% of course fees, capped at $15 per hour | Up to 50% of course fees |
Non-PMET | Up to 80% of course fees, capped at $17 per hour | ||
SCs aged ≥ 40 years old (SkillsFuture Mid-career Enhanced Subsidy) | PMET | Up to 90% of course fees, capped at $50 per hour | Up to 70% of course fees |
Non-PMET | Up to 90% of course fees, capped at $25 per hour |
To receive funding from SSG, you must meet the following criteria:
- Pass the course
- Achieve a minimum of 75% of the attendance
- Must not be barred from receiving government grants
- You may also be eligible for the course fee (CF) funding at the current rates offered by SkillsFuture Singapore (SSG). For more details, please refer to this page.
- Individuals aged 40 and above may also be eligible for the SkillsFuture Mid-Career Enhanced Subsidy (MCES). For more details, please refer to this page.
- Singaporeans may also use their SkillsFuture credit to offset course fees payable. For more details, please refer to this page.
Modules
-
LU 1: Plan a process to protect identity and access
Learners would be able to plan in protecting access by unauthorised personals using end-to-end security administration system, facilitate the administration and technical operationalisation of security programmes, and end-to-end security administration processes.Expand -
LU 2: Evaluate various Secure Information Privacy Threats and Vulnerabilities
Learners would be able to evaluate tools and techniques to improve website security upon installing appropriate technology to protect against threats, plan the installation of relevant hardware, software, and operating systems to protect the organisation against threats., and use a range of tools and techniques to enhance website security.Expand -
LU 3: Analyse System Access control plans, and relevant tools and techniques for cybersecurity
Learners would be able to update security administration plans and relevant personnel for identity access management and new cybersecurity policies to tackle emerging security threats, update security administration plans and relevant personnel in view of new and emerging cybersecurity policies and security threats.Expand
Learners would be able to plan in protecting access by unauthorised personals using end-to-end security administration system, facilitate the administration and technical operationalisation of security programmes, and end-to-end security administration processes.
Learners would be able to evaluate tools and techniques to improve website security upon installing appropriate technology to protect against threats, plan the installation of relevant hardware, software, and operating systems to protect the organisation against threats., and use a range of tools and techniques to enhance website security.
Learners would be able to update security administration plans and relevant personnel for identity access management and new cybersecurity policies to tackle emerging security threats, update security administration plans and relevant personnel in view of new and emerging cybersecurity policies and security threats.
-
LU 4: Select relevant techniques to data security, network security, access, and identity provisioning
Learners would be able to select and manage security administration processes by employing countermeasures to emerging security issues, manage security administration processes to ensure requests, activities, and updates are handled according to internal protocols, and solve emerging security issues and threats.Expand -
LU 5: Devise appropriate techniques to strengthen authentication (Conditional Access)
Learners would be able to devise access permissions, control rules upon investigating security weaknesses in the organization’s network infrastructure associated with business process’ priorities and security limits, establish access control rules and permissions, aligned with organisational priorities and security parameters, and evaluate security weaknesses of installed infrastructure.Expand -
LU 6: Analyse how privileged administrator accounts are applied
Learners would be able to analyse user access controls, plan relevant monitoring and control methods with effect on various levels of user access within various user groups, plan monitoring and control methods for managing user access, key principles of user access management, and control, and understand the implications of various levels of user access.Expand
Learners would be able to select and manage security administration processes by employing countermeasures to emerging security issues, manage security administration processes to ensure requests, activities, and updates are handled according to internal protocols, and solve emerging security issues and threats.
Learners would be able to devise access permissions, control rules upon investigating security weaknesses in the organization’s network infrastructure associated with business process’ priorities and security limits, establish access control rules and permissions, aligned with organisational priorities and security parameters, and evaluate security weaknesses of installed infrastructure.
Learners would be able to analyse user access controls, plan relevant monitoring and control methods with effect on various levels of user access within various user groups, plan monitoring and control methods for managing user access, key principles of user access management, and control, and understand the implications of various levels of user access.
-
LU 7: Outline security practices and employ methods for identity protection
Learners would be able to configure security practices, employ procedures to countermeasure security breaches, grant permissions for role-based access requests, based on their conformity with organisational standards and procedures for various levels of user access. They will be able to grant permissions for role-based access requests, based on their compliance with organisational standards and procedures, evaluate implications of various levels of user access, and run diagnoses of security breaches.Expand -
LU 8: Investigate security violations and evaluate security breaches and employ the Zero Trust method
Learners would be able to investigate security violations evaluate security breaches, diagnose security breaches in information and system or network access, and recommend required action. They will be able to investigate significant security breaches in information and system or network access and recommend required action and run diagnoses of security breaches.Expand -
LU 9: Appraise Privacy Awareness, Training, and Education
Learners would be able to facilitate organisation-wide communication for addressing security breaches and appraise cybersecurity learning continuum and necessary tools of cybersecurity. They will learn to facilitate organisation-wide communication of access control rules, rights, and permissions, and run diagnoses of security breaches.Expand
Learners would be able to configure security practices, employ procedures to countermeasure security breaches, grant permissions for role-based access requests, based on their conformity with organisational standards and procedures for various levels of user access. They will be able to grant permissions for role-based access requests, based on their compliance with organisational standards and procedures, evaluate implications of various levels of user access, and run diagnoses of security breaches.
Learners would be able to investigate security violations evaluate security breaches, diagnose security breaches in information and system or network access, and recommend required action. They will be able to investigate significant security breaches in information and system or network access and recommend required action and run diagnoses of security breaches.
Learners would be able to facilitate organisation-wide communication for addressing security breaches and appraise cybersecurity learning continuum and necessary tools of cybersecurity. They will learn to facilitate organisation-wide communication of access control rules, rights, and permissions, and run diagnoses of security breaches.
Request More Information
Contact a programme advisor by calling
+65 6580 7700