Classroom/ Online: Yes/ No
Scheduling Date(s):
1) Jan 16, 2025 (classroom)
Note: Please click specific date for detailed venue and course fee etc.
Cyber Tools to Fight against AI Deepfakes, Scams and Cyber Security Threats
This comprehensive Cybersecurity training course is designed to equip you with the knowledge and tools to navigate the ever-evolving landscape of cyber threats. In today’s digital world, cyber risks, crimes, and attacks are on the rise, affecting both individuals and organizations. This course will introduce you to a variety of real-world cyber attack scenarios, including a live demonstration, and teach you how to recognize and combat deepfakes, scams, and malware. You’ll learn to identify cybersecurity threats, mitigate vulnerabilities, and safeguard mobile devices, emails, and social accounts. Through practical tools, case studies, and hands-on experience, you will be prepared to detect and respond to business risks like ransomware, phishing, and social engineering. By the end of this course, you'll understand critical incident response strategies and essential cyber safety practices for both personal and enterprise protection.
Objective
- Recognize various types of cyber attacks and scams, including AI-based threats like deepfakes.
- Implement tools and techniques to combat mobile malware, phishing, and e-commerce scams.
- Develop an effective incident response plan to mitigate business email compromise, ransomware, and social engineering risks.
- Apply cybersecurity best practices for enterprise and personal safety, including password management and Wi-Fi security.
Outline
Access Cyber Risk, Cyber Crimes, and Cyber Attacks
• Overview of Cyber Attacks – with Live Cyber Attack demo
• Rise in Cyber Crimes – Scams, AI Deepfake, recognize them and not be a victim
• Tools to combat deepfake, scams and malware
Identify Cyber Security Risks, Threats and Vulnerabilities
• Types of Cyber Security Threats and Tools to mitigate it
• Top Scams as a Cyber Threats and Tools to fight scams and crafted by AI
• Tool to validate and protect against QR codes scams
• Steps and ways to Protect against Mobile malware
• Safety and Ratings to validate and check against E-commerce scams
• Ways to protect and secure against Email, Messaging, Social accounts
• Best way to remember Passwords, and alternative to password
Threat Detection and Business Risk
• Tools to mitigate email spoofing and fight against Business Email Compromise
• Recognise and protect against Ransomware Attack
• Tools to check against Phishing Links, and use AI to assist you
• Fight against Social Engineering – the art of deception
• Tools to protect and mitigate against USB malware risk and Wi-Fi Risk
Cyber Safe and Cyber Essentials in Enterprise and Personal Protection
• Incident Response Process and Plan
• Cyber Matrix Severity & Type, Escalation & Measures, Firewall, IDS, IPS
• Cyber Safe for the Enterprise – Awareness, Action and Adoption
• Case Studies
Session Wrap-up and Q&A
• Key Takeaways
• Next Steps
• Open Floor with Q&A
(Bonus if time permits) Cyber Attack Simulation
• Overview of Cyber Attacks – with Live Cyber Attack demo
• Rise in Cyber Crimes – Scams, AI Deepfake, recognize them and not be a victim
• Tools to combat deepfake, scams and malware
Identify Cyber Security Risks, Threats and Vulnerabilities
• Types of Cyber Security Threats and Tools to mitigate it
• Top Scams as a Cyber Threats and Tools to fight scams and crafted by AI
• Tool to validate and protect against QR codes scams
• Steps and ways to Protect against Mobile malware
• Safety and Ratings to validate and check against E-commerce scams
• Ways to protect and secure against Email, Messaging, Social accounts
• Best way to remember Passwords, and alternative to password
Threat Detection and Business Risk
• Tools to mitigate email spoofing and fight against Business Email Compromise
• Recognise and protect against Ransomware Attack
• Tools to check against Phishing Links, and use AI to assist you
• Fight against Social Engineering – the art of deception
• Tools to protect and mitigate against USB malware risk and Wi-Fi Risk
Cyber Safe and Cyber Essentials in Enterprise and Personal Protection
• Incident Response Process and Plan
• Cyber Matrix Severity & Type, Escalation & Measures, Firewall, IDS, IPS
• Cyber Safe for the Enterprise – Awareness, Action and Adoption
• Case Studies
Session Wrap-up and Q&A
• Key Takeaways
• Next Steps
• Open Floor with Q&A
(Bonus if time permits) Cyber Attack Simulation
Who should attend
- PMET who is interested to learn about cyber security in the AI digital world, understand how to prevent and protect against cyber crimes
- All Staff within an Organisation seeking ways to protect against cyber threats, equip with tools to combat security vulnerabilities
- Professionals interested in expanding their knowledge and skills in cybersecurity
- IT Personnel, Operations
- PMET involved in info-security, online security
- PMET looking to gain knowledge or have skillsets in cyber security
Prerequisite
Must know how to use mobile devices and laptops, usage og the browser and run software and applications
Methodology
This is a hands-on course, so bringing along a laptop is useful. There will be hands-on practices, activities, demonstration for various topics so that you can apply what is being taught.
A combination of lectures, case examples, videos and hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.
The trainer will explain on the topic and then guide you through with step-by-step practice or demonstrate on the topic.
A combination of lectures, case examples, videos and hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.
The trainer will explain on the topic and then guide you through with step-by-step practice or demonstrate on the topic.
Testimonials
Swee Chye was effective in delivering complex topics in simple to understand form – ST Electronics
The practical examples, concepts and skills taught by the Trainer are relevant and useful to everyone - International SOS
The hands-on activities, and demonstration made the training very realistic and relevant to learn about
security – Hitachi Asia
The practical examples, concepts and skills taught by the Trainer are relevant and useful to everyone - International SOS
The hands-on activities, and demonstration made the training very realistic and relevant to learn about
security – Hitachi Asia
Profile of Ang Swee Chye
Certified Technology Trainer, Facilitator and Consultant
Certifications
Swee Chye is an experience trainer certified by various organization. He is certified by the following organizations:
Education
He holds an honours degree in Electrical and Electronics Engineering, who possesses a strong passion in ICT Training, and has trained many organizations and customers globally.
Working Experience
He has more than 25 years of ICT experience. He has been providing ICT training to government, private institutions and organizations in 5 different continents. He specializes in Cyber Security, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence, Machine Learning, Cloud Computing and Web Development. He focuses on data and data-related training programs to diagnose, analyse and predict (Data Science, Data Analytics, IoT, AI & ML), to protect data and mitigate risk (Cybersecurity) and to automate system and processes (Programming, Robotics & RPA). All these can be scaled and performed on premise or in the cloud.
Customers/Clients Credentials
Clients from diverse industries he has trained include GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Proctor & Gamble, Nanyang University, Republic Polytechnic, Singapore Polytechnic, Pavilion Energy, Nanyang Polytechnic, HTX, SPF, and overseas clients like Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, DOW Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG among many others.
Professional Work
Apart from being a corporate trainer, Swee Chye does consultancy work in ICT in areas like Cyber Security, Data Analytics, IoT, Robotics, Mobile Application, Data Analytics and Web Development.
Certifications
Swee Chye is an experience trainer certified by various organization. He is certified by the following organizations:
- Microsoft-certified - Microsoft Certified Educator,
- Apple-certified - Apple Professional Learning Specialist & Apple teacher,
- IBM-certified - IBM Data Science Practitioner – Instructor & IBM Enterprise Design Thinking Practitioner,
- Certified EC Council - Computer Hacking Forensic Investigator & Certified Ethical Hacker, CyberSecurity Career Mentor, Prompt Engineering for Developers, and Generative AI
- AWS-certified - AWS Cloud Quest: Cloud Practitioner,
Education
He holds an honours degree in Electrical and Electronics Engineering, who possesses a strong passion in ICT Training, and has trained many organizations and customers globally.
Working Experience
He has more than 25 years of ICT experience. He has been providing ICT training to government, private institutions and organizations in 5 different continents. He specializes in Cyber Security, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence, Machine Learning, Cloud Computing and Web Development. He focuses on data and data-related training programs to diagnose, analyse and predict (Data Science, Data Analytics, IoT, AI & ML), to protect data and mitigate risk (Cybersecurity) and to automate system and processes (Programming, Robotics & RPA). All these can be scaled and performed on premise or in the cloud.
Customers/Clients Credentials
Clients from diverse industries he has trained include GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Proctor & Gamble, Nanyang University, Republic Polytechnic, Singapore Polytechnic, Pavilion Energy, Nanyang Polytechnic, HTX, SPF, and overseas clients like Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, DOW Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG among many others.
Professional Work
Apart from being a corporate trainer, Swee Chye does consultancy work in ICT in areas like Cyber Security, Data Analytics, IoT, Robotics, Mobile Application, Data Analytics and Web Development.