Certified Ethical Hacker (CEH) v13

Training Provider: ASSURE SAFETY PTE. LTD.
Course Reference: TGS-2025054742
S$1,250
Original: S$2,500
Save S$1,250

About This Course

In a report published by HRM Asia which can be found on https://hrmasia.com/is-ethical-hacking-the-next-big-thing-in-the-talent-market/

Ethical hackers – commonly known as white hat hackers – help to identify threats and vulnerabilities in IT systems to prevent any potential breaches or attacks by their malicious counterparts. Simply put, they utilise their hacking skills for a good cause by using them to bypass IT systems of organisations to test out their security defences.

As cyberattacks become more prevalent, sophisticated, and large-scale, there has never been a greater demand for ethical hackers to help prevent them and build a safer cyber world for everyone.

Organisations are starting to place more emphasis and investment on cyber security by hiring more ethical hackers and even organising bounty challenges to identify and develop potential young ethical hackers.

In another publication from CNA News Asia, https://www.channelnewsasia.com/singapore/ethical-hackers-frontline-keeping-your-home-safe-cyber-attacks-1023216

In today's digital landscape, organizations face an escalating threat from cyberattacks, underscoring the critical need for robust cybersecurity measures. Ethical hackers, or "white hat" hackers, play a pivotal role in this defense by proactively identifying and mitigating vulnerabilities within IT systems.

Conclusion

Integrating ethical hacking training into workforce development is imperative for enhancing organizational resilience against cyber threats. By cultivating a pool of skilled professionals adept at identifying and mitigating vulnerabilities, organizations can better protect their digital assets and maintain trust in an increasingly interconnected world.

What You'll Learn

LO1: Apply threat modelling techniques and network reconnaissance methods using appropriate tools to identify system vulnerabilities, interpret scan results, and recommend pre-emptive security measures.

LO2: Conduct penetration testing and execute exploitation techniques such as malware deployment, web application attacks, sniffing, and privilege escalation to assess security loopholes, and propose countermeasures aligned with industry practices.

LO3: Evaluate vulnerabilities in wireless, mobile, IoT, cloud, and cryptographic systems, and develop a vulnerability assessment report with actionable remediation strategies to safeguard emerging technology platforms against advanced threats.

Entry Requirements

Knowledge and Skills

a. Able to operate using computer functions with minimum Computer Literacy Level 2 based on ICAS Computer Skills Assessment Framework
b. Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

a. Positive Learning Attitude
b. Enthusiastic Learner

Experience

a. Minimum of 1 year of working experience.

Target Year Group : 18-65 years old

Course Details

Duration 35 hours
Language English
Training Commitment Full Time
Total Enrolled New course
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.

More Courses from ASSURE SAFETY PTE. LTD.

The objective of this training programme is to equip caregivers with the necessary basic knowledge a...
Duration 2 hours
Fee After Subsidy S$200
The objective of this training programme is to equip caregivers with the necessary basic knowledge a...
Duration 6 hours
Fee After Subsidy S$135
The objective of this training programme is to equip caregivers with the necessary basic knowledge a...
Duration 2 hours
Fee After Subsidy S$200