WSQ—System Security Support (SF) (Synchronous and Asynchronous E-learning)

For organisational goals to be met, the System Security Support course aims to equip learners with the knowledge and skills in Security Administration. Learners will be competent in using functions and features of the security system to prevent unauthorised access, investigate security breaches, and monitor threats, access control permissions, and rights to various information systems and networks.

WSQ—System Security Support (SF) (Synchronous and Asynchronous E-learning)

Key Facts 

  • Course duration: 3 months (part-time), 1 day/week, 3 hours/day

  • Intake dates: Start in October, November, December, January, February, March, April, or May

  • Total training fee: S$1,950

This course will provide learners to perform security administration tasks to establish rules for the protection, detection, and response to the organization and administrative data and transaction threats. Upon successful completion of this modular course, learners can choose a career to become a Security Administrator, Network Administrator, Network Security Administrator, Network Security Engineer, Network Defence Technician, Computer Network Defence Analyst, Security Analyst, Security Operator, anyone involved in Security and Network Operations. This modular course transfers the knowledge, skills, and abilities related to System Security Support.

 

At the end of the course, learners will be able to in:

1) Plan in protecting access by unauthorised personals using an end-to-end security administration system.

2) Evaluate tools and techniques to improve website security upon installing appropriate technology to protect against threats.

3) Update security administration plans and relevant personnel for identity access management and new cybersecurity policies to tackle emerging security threats.

4) Select and manage security administration processes by employing countermeasures to emerging security issues.

5) Devise access permissions, control rules upon investigating security weaknesses in the organization’s network infrastructure associated with business process’ priorities and security limits.

6) Analyse user access controls, plan relevant monitoring and control methods with effect on various levels of user access within various user groups.

7) Configure security practices, employ procedures to countermeasure security breaches, grant permissions for role-based access requests, based on their conformity with organisational standards and procedures for various levels of user access.

8) Investigate security violations evaluate the security breaches, diagnose security breaches in information and system or network access and recommend required action.

9) Facilitate organisation-wide communication for addressing security breaches and appraise cybersecurity learning continuum and necessary tools of cybersecurity.

The assumed skills and knowledge for this course are as follows:

  • Be able to listen, speak, read, and write English proficiently in a clear and confident manner;
    or provide documentary evidence of Workplace Literacy (WPL) Level 6 literacy skills in the
    Employability Skills WSQ framework;
  • Be keen to learn and participate in the learning activities in myriad learning settings such as
    online, classroom, laboratory, and blended learning, self-regulated learning contexts.
  • Be able to source and analyse relevant materials from the library, internet or online databases for design and development of learning resources.

Minimum Entry Requirement

  • Aged between 21 years old and above.
  • Minimum at least Learners must have ONE GCE O Level.
  • Able to read, listen and speak English at a proficiency level equivalent to Employability Skills System (ESS) Literacy Level 6.
  • Able to count with a proficiency equivalent to Employability Skills System (ESS) Numeracy Level 6.
  • Have basic computer literacy (Workplace Skills Series - Information and communication Technologies Skills).

Modules

Learners would be able to plan in protecting access by unauthorised personals using end-to-end security administration system, facilitate the administration and technical operationalisation of security programmes, and end-to-end security administration processes.

Learners would be able to evaluate tools and techniques to improve website security upon installing appropriate technology to protect against threats, plan the installation of relevant hardware, software, and operating systems to protect the organisation against threats., and use a range of tools and techniques to enhance website security.

Learners would be able to update security administration plans and relevant personnel for identity access management and new cybersecurity policies to tackle emerging security threats, update security administration plans and relevant personnel in view of new and emerging cybersecurity policies and security threats.

Learners would be able to select and manage security administration processes by employing countermeasures to emerging security issues, manage security administration processes to ensure requests, activities, and updates are handled according to internal protocols, and solve emerging security issues and threats.

Learners would be able to devise access permissions, control rules upon investigating security weaknesses in the organization’s network infrastructure associated with business process’ priorities and security limits, establish access control rules and permissions, aligned with organisational priorities and security parameters, and evaluate security weaknesses of installed infrastructure.

Learners would be able to analyse user access controls, plan relevant monitoring and control methods with effect on various levels of user access within various user groups, plan monitoring and control methods for managing user access, key principles of user access management, and control, and understand the implications of various levels of user access.

Learners would be able to configure security practices, employ procedures to countermeasure security breaches, grant permissions for role-based access requests, based on their conformity with organisational standards and procedures for various levels of user access. They will be able to grant permissions for role-based access requests, based on their compliance with organisational standards and procedures, evaluate implications of various levels of user access, and run diagnoses of security breaches.

Learners would be able to investigate security violations evaluate security breaches, diagnose security breaches in information and system or network access, and recommend required action. They will be able to investigate significant security breaches in information and system or network access and recommend required action and run diagnoses of security breaches.

Learners would be able to facilitate organisation-wide communication for addressing security breaches and appraise cybersecurity learning continuum and necessary tools of cybersecurity. They will learn to facilitate organisation-wide communication of access control rules, rights, and permissions, and run diagnoses of security breaches.

Request More Information

Contact a programme advisor by calling
+65 6580 7700

Back to top