Fundamental information security training

Understanding basic security measures for information system operators

This training focuses on learning about the various security vulnerabilities and risks inherent in information system operations, and acquiring the knowledge necessary for concrete countermeasures. It covers not only the measures that information service providers should take but also those that users should implement.

3 Keys Features of Reskill Training

Full Preparatory Support

You will receive support not only during the training, but also prior to it. A complete set of training material and equipment will be delivered to you by mail beforehand. This will allow you to receive high-quality training with minimum preparation time.

Flat Rate Pricing

With the concept of "More Training", we make the courses available at a clear fixed price, even for a customized single-company training program that provides an excellent training environment.

Online Training Options

We offer various training formats with no additional charge, whether it be in-person, online, or a hybrid of both(partially web-based). Please feel free to contact us regarding your needs.

Training Code: 100680   Information updated:

Fundamental information security training (ISMS Training) [Acquire the Basics] Goals

Develop an understanding of security threats when providing and using various information services, and learn how to respond effectively.

Who Benefits the Most

The following is a general list of target participants for the training and can be adjusted upon review. Please contact us regarding your needs.

IT professionals

Result of Fundamental information security training (ISMS Training) [Acquire the Basics]

  1. Gain a deeper understanding of security guidelines and relevant legislation to be mindful of.
  2. Learn about the security threats that information systems constantly face.
  3. Develop an enhanced understanding of the specific countermeasures that system operators and users should take.

Training Objectives

1. Deepen understanding of security guidelines and policies

Understanding fundamental security policies is essential for implementing effective measures. This training covers widely distributed domestic guidelines as a base for learning.

2. Learn about attack threats against information system vulnerabilities

Gain a deeper understanding of how attackers threaten information systems, including intrusion and attack methods, and the vulnerabilities that make these attacks possible.

3. Understand countermeasures for system operators and users

After learning about potential security threats, explore and understand the appropriate countermeasures.

Estimated Training Duration

6 hours (subject to change)

Fundamental information security training (ISMS Training) [Acquire the Basics] Curriculum

Other training content can be incorporated into the curriculum upon request at no additional charge.

1. Fundamentals of Information Security [Goal] Understand fundamental security concepts
  • Security concepts [What is information security?/What is cybersecurity?]
  • The three essential elements of information security.
  • Threats and vulnerabilities [Information security threats/Information security vulnerabilities/Reference:10 Major Information security threats 2021]
  • Information security laws [Basic cybersecurity act/Unauthorized computer access prevention act/Personal information protection act/ Specified electronic mail act/Criminal code/ Laws protecting intellectual property]
  • Exercise - Three essential elements of information security.
2. Organizational Countermeasures [Goal] Recognize the necessary measures for organization-wide security.
  • The necessity of information security measures [Recognizing information security risks/Information security management]
  • Information security policy [Overview and purpose/Content/Development procedures/Establishing an information security committee/PDCA cycle in information security management]
  • ISMS [ISMS conformity assessment system/Accreditation and certification]
  • Measures against information leakage [Types of information leakage/Reference: Breakdown of information leakage causes/Measures against information leakage]
  • Exercise - Information leakage due to negligence, Risks caused by information leakage.
  • Social engineering [Representative methods]
3. Cyber Attacks [Goal] Understand the types of cyber attack methods
  • What are cyber attacks?
  • Malware [Computer viruses/Worms/Trojan horses/Spyware, adware/Ransomware]
  • Targeted cyber attacks [Targeted attack/Watering hole attack/Keylogger]
  • Indiscriminate cyber attacks [Phishing scam/Smishing/Zero-click scam]
  • Exercise - Types and techniques of cyber attacks.
  • Cyber attacks that impose a load, cyber attacks that target vulnerabilities [DoS attack/Cross-site scripting.]
  • Password cracking [Password list attack]
  • Exercise - Summarize recent cyber attack cases.
4. Technologies for Enhancing Security [Goal] Understand the technologies essential for secure information exchange
  • Encryption and decryption.
  • Encryption technologies [Common key cryptography (AES)/Public key cryptography (RSA)]
  • Digital signatures and certification authorities [Digital signatures/Certification authority (CA)]
  • Various authentication technologies [One-time passwords / Biometric authentication/Multi-factor authentication/Single sign-on]
  • Firewalls [Types of firewalls]
  • WAF [Difference from firewalls]
  • IDS/IPS

Training Cost

We provide tailored training programs for an entire company at a fixed rate. We will send you a quotation based on estimated training duration and number of participants.

  • The number of participants, training content and training formats can all be adjusted afterwards with no additional charge.
  • Last minute changes can be made with no additional charge.

Fundamental information security training (ISMS Training) [Acquire the Basics] Participant Requirements

Basic IT skills

Area

We offer training either online or in-person training within Singapore.

Frequently Asked Questions

Click here to get a quotation in 10 seconds.
Yes. The course is designed to meet the needs of our clients and teach skills that can be put into practice right away.
Online and partially web-based courses are both available upon request.

List of Frequently Asked Questions>

Related Training Information

This page is about Fundamental information security training (ISMS Training) [Acquire the Basics] course planned for a single company. Please see below for other training courses and related training programs.

Training Information Summary Page

Public Lectures

  • There are no public lectures at the moment.

TOP

Contact us

Learn More About Our Services

Office Hours
Mon-Fri 9:00 AM - 6:00 PM Local Time