top of page

Principles of Information Security Controls

Working from Home

Are you and your organisation ready to manage and respond to cyber attacks?

This 3-day online workshop is the second installation of the Cybersecurity Professional Series aimed at equipping you and your organisation in building a robust cyber defence system.

Throughout this online workshop, you will learn how to identify key security risks and problems posed by new technologies and business practices, and define security specifications of system components, so as to achieve security objectives and functional requirements. 

By the end of the online course, you will be able to design secured systems and controls based on IT architectural guidelines and requirements by incorporating controls into security system components to minimise breaches or lapses. While designing your own systems, you will also learn how to check for an adequate level of robustness in system designs.

This online workshop is designed for participants who have interest in Cybersecurity or would like to use their understanding of Cybersecurity concepts to improve their working posture in the organisation and help formulate Cybersecurity best practices to safeguard the organisation’s interest. This can be a good starting point for participants who would like to pursue a career in the Cybersecurity field as well.

In this workshop, participants will learn about:

  • Fundamentals of information security

  • Information security

  • Communications and network security

  • Security assessment and testing

  • Security operations




Pre-Workshop Instructions:

  • You MUST have a laptop and stable wifi connection to join this online workshop

Day 01

8:45am – 9:00am: Online Registration
9:00am – 10:45am: Fundamentals of Information Security

  • Fundamentals of information security

  • Information security ecosystem

  • Recap (risk assessment, risk analysis, risk management and ongoing risk monitoring)

  • Recap (Confidentiality, Integrity and Availability (CIA) triad)

  • Information classification, information valuation and information life cycle

  • Security clearance

  • Exercise: information classification, justification and impact

  • Information security controls/protection


10:45am – 11:00am: Break
11:00am – 12:15pm: Fundamentals of Information Security (Cont’d)

  • Information security controls/protection

  • Exercise – information classification and controls application

  • Information security control frameworks


12:15pm – 1:15pm: Lunch Break
1:15pm – 3:15pm: Communications and Network Security (Part 1)

  • Network architecture and design

  • Understanding Internet, Intranet & Extranet

  • Understanding LAN, WAN, MAN, PAN, CAN and GAN

  • LAN, WAN, MAN, PAN and GAN connection technologies


3:15pm – 3:30pm: Break
3:30pm – 5:30pm: Communications and Network Security (Part 2)

  • Simplex, half-duplex and full-duplex communication

  • Circuit-switched and packet-switched networks

  • Understanding secure network architecture


5:30pm – 5:45pm: Closing Remarks / Q&A

Day 02

8:45am – 9:00am: Online Registration
9:00am – 10:40am: Communications and Network Security (Part 3)

  • Understanding OSI reference model

  • OSI model (layer 1 to layer 7), its functions, and pros and cons

  • Threats to network security

  • Secure network devices and protocols (layer 1 to layer 7)

  • Exercise: Design a highly secured network architecture


10:40am – 10:55am: Break
10:55am – 12:15pm: Communications and Network Security (Part 4)

  • Protocols for Point-to-Point (PPP) authentication

  • CHAP - Challenge-handshake authentication protocol

  • 802.1X and Extensible Authentication Protocol (EAP)

  • Protocols for Authentication, Authorisation, Accounting (AAA)


12:15pm – 1:15pm: Lunch Break
1:15pm – 2:15pm: Communications and Network Security (Part 5)

  • Wireless encryption

  • Exercise: Design a secured corporate network

  • Other protocols for secure communications


1:15pm – 3:15pm: Security Assessment and Testing

  • Understanding security assessment

  • Understanding security audits

  • Vulnerability assessment and penetration testing

  • Vulnerability scanning


3:15pm – 3:30pm: Break
3:30pm – 5:30pm: Security Assessment and Testing (Cont’d)

  • Testing methodology

  • Testing guidelines

  • Testing considerations

  • Testing – rules of engagement, types of penetration tests, software testing methods (for eg. dynamic testing vs static testing, black-box vs white-box testing)

  • Testing – tools and techniques (for eg. network scanning, password cracking, rogue/misconfiguration infrastructures, war dialling and corrective actions)

  • Understanding network traffic

  • Understanding Intrusion Detection System (IDS) – HIDS and NIDS

  • Intrusion Detection System (IDS) vs Intrusion Protection System (IPS)

  • Understanding honeypot and honeynet


5:30pm – 5:45pm: Closing Remarks / Q&A

Day 03

8:45am – 9:00am: Online Registration
9:00am – 10:30am: Security Operations

  • Introduction to security operations

  • Change management

  • Configuration management

  • Patch management

  • Vulnerability management

  • Fundamentals of incident response

    • Preparation

    • Detection (identification)

    • Response (containment)

    • Mitigation (eradication)

    • Reporting

    • Recovery

    • Remediation

    • Lessons Learned (post incident activity, post-mortem or reporting)


10:30am – 10:45am: Break
10:45 – 12:15pm: Security Operations (Cont’d)

  • Event types of IDS/IPS

  • NIDS and NIPS

  • HIDS and HIPS

  • Security information and event management (SIEM) system

  • Data loss prevention (DLP) system

  • Endpoint security system


12:15pm – 1:15pm: Lunch Break
1:15pm – 3:15pm: Security Operations (Continuity of Operations)

  • Understanding continuity of operations

  • Fault tolerance

  • Redundant array of independent disks (RAID)

  • High availability (HA) clusters (failover cluster)

  • Business continuity planning (BCP)

  • Disaster recovery planning (DRP)


3:15pm – 3:30pm: Break
3:30pm – 5:30pm: Security Operations (Continuity of Operations) (Cont’d)

  • Relationship between BCP and DRP

  • Disasters or disruptive events

  • Relationship of BCP to risk management

  • Business continuity planning process

  • BCP

    • Project initiation

    • Scope of the project

    • Business impact analysis (BIA)

    • Identify preventive control

    • Recovery strategy

    • Plan design and development

    • Implementation, training, and testing

    • BCP maintenance

  • BCP/DRP mistakes


5:30pm – 6:00pm: Assessment Briefing
6:00pm – 6:15pm: Closing Remarks / Q&A

Get in Touch

bottom of page