Fundamental information security training

Understanding basic security measures for information system operators

This training focuses on learning about the various security vulnerabilities and risks inherent in information system operations, and acquiring the knowledge necessary for concrete countermeasures. It covers not only the measures that information service providers should take but also those that users should implement.

Reskill’s Service Commitment

Full Preparatory Support

We provide comprehensive support before, during, and after the training session to ensure a seamless experience for our clients. Training materials will be delivered directly to your office in advance, at no additional cost, ensuring the smooth, efficient, and enjoyable process.

Flat Rate Pricing

Guided by the principle of "Train more. Pay less," our courses are offered at a clear and fixed price with no limit on the number of participants. This approach extends even to customized, instructor-led, in-company training programs, enabling organizations to create an optimal training environment while maintaining budget clarity.

Online Training Options

To meet the diverse needs of our clients, we offer flexible training formats at no extra charge. Whether you prefer in-class sessions, online training, or a hybrid approach (partially web-based), we are here to accommodate your preferences. Please don’t hesitate to contact us to discuss the format that best suits your requirements.

Training Code: 100680   Information updated:

Fundamental information security training (ISMS Training) [Acquire the Basics] Goals

Develop an understanding of security threats when providing and using various information services, and learn how to respond effectively.

Who Benefits the Most

The following is a general list of target participants for the training and can be adjusted upon review. Please contact us regarding your needs.

IT professionals

Result of Fundamental information security training (ISMS Training) [Acquire the Basics]

  1. Gain a deeper understanding of security guidelines and relevant legislation to be mindful of.
  2. Learn about the security threats that information systems constantly face.
  3. Develop an enhanced understanding of the specific countermeasures that system operators and users should take.

Training Objectives

1. Deepen understanding of security guidelines and policies

Understanding fundamental security policies is essential for implementing effective measures. This training covers widely distributed domestic guidelines as a base for learning.

2. Learn about attack threats against information system vulnerabilities

Gain a deeper understanding of how attackers threaten information systems, including intrusion and attack methods, and the vulnerabilities that make these attacks possible.

3. Understand countermeasures for system operators and users

After learning about potential security threats, explore and understand the appropriate countermeasures.

Estimated Training Duration

6 hours (subject to change)

Fundamental information security training (ISMS Training) [Acquire the Basics] Curriculum

Other training content can be incorporated into the curriculum upon request at no additional charge.

1. Fundamentals of Information Security [Goal] Understand fundamental security concepts
  • Security concepts [What is information security?/What is cybersecurity?]
  • The three essential elements of information security.
  • Threats and vulnerabilities [Information security threats/Information security vulnerabilities/Reference:10 Major Information security threats 2021]
  • Information security laws [Basic cybersecurity act/Unauthorized computer access prevention act/Personal information protection act/ Specified electronic mail act/Criminal code/ Laws protecting intellectual property]
  • Exercise - Three essential elements of information security.
2. Organizational Countermeasures [Goal] Recognize the necessary measures for organization-wide security.
  • The necessity of information security measures [Recognizing information security risks/Information security management]
  • Information security policy [Overview and purpose/Content/Development procedures/Establishing an information security committee/PDCA cycle in information security management]
  • ISMS [ISMS conformity assessment system/Accreditation and certification]
  • Measures against information leakage [Types of information leakage/Reference: Breakdown of information leakage causes/Measures against information leakage]
  • Exercise - Information leakage due to negligence, Risks caused by information leakage.
  • Social engineering [Representative methods]
3. Cyber Attacks [Goal] Understand the types of cyber attack methods
  • What are cyber attacks?
  • Malware [Computer viruses/Worms/Trojan horses/Spyware, adware/Ransomware]
  • Targeted cyber attacks [Targeted attack/Watering hole attack/Keylogger]
  • Indiscriminate cyber attacks [Phishing scam/Smishing/Zero-click scam]
  • Exercise - Types and techniques of cyber attacks.
  • Cyber attacks that impose a load, cyber attacks that target vulnerabilities [DoS attack/Cross-site scripting.]
  • Password cracking [Password list attack]
  • Exercise - Summarize recent cyber attack cases.
4. Technologies for Enhancing Security [Goal] Understand the technologies essential for secure information exchange
  • Encryption and decryption.
  • Encryption technologies [Common key cryptography (AES)/Public key cryptography (RSA)]
  • Digital signatures and certification authorities [Digital signatures/Certification authority (CA)]
  • Various authentication technologies [One-time passwords / Biometric authentication/Multi-factor authentication/Single sign-on]
  • Firewalls [Types of firewalls]
  • WAF [Difference from firewalls]
  • IDS/IPS

Training Cost

We offer comprehensive customizable training programs for your entire team at a fixed rate, regardless of the number of participants. Whether you need in-class, online, or hybrid training, we can accommodate your specific needs without additional charges. Our pricing model ensures transparency and flexibility, allowing for last-minute adjustments without extra costs.

Fundamental information security training (ISMS Training) [Acquire the Basics] Participant Requirements

Basic IT skills

Area

We offer a variety of instructor-led training programs in Singapore, both online and in-person.

Frequently Asked Questions

Click here to get a quotation in 10 seconds.
Yes. The course is designed to meet the needs of our clients and teach skills that can be put into practice right away.
Online and partially web-based courses are both available upon request.

List of Frequently Asked Questions>

Related Training Information

This is the instructor-led Fundamental information security training (ISMS Training) [Acquire the Basics] course page.
Please see below for additional training courses and related training programs.

Training Information Summary Page

Open Courses

  • There are no open courses at the moment.

Reskill provide training services for a wide range of businesses.

Training Achievements

TOP

Contact us

Learn More About Our Services

Office Hours
Mon-Fri 9:00 AM - 6:00 PM Local Time