Cyber Security Attack / Defend Strategist (CSAD)

Upcoming Batch
8 to 10 Feb 2021
Online ‘Live’
9:30am to 5:30pm
Singapore Timezone

3 Sessions / 24-Hours

Apply Now

8 to 10 Mar 2021
Online ‘Live’
9:30am to 5:30pm
Singapore Timezone

3 Sessions / 24 Hours

Apply Now

7 to 9 Apr 2021
Online ‘Live’
9:30am to 5:30pm
Singapore Timezone

3 Sessions / 24 Hours

Apply Now

Course Information
  • Duration: 3-Day / 24 Hours

  • Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination

  • Who Should Attend: Anyone interested in acquiring knowledge and skills on Cyber Security Attack and Defense strategies

Course Objective

Acquiring the advanced knowledge and technical skills in Cyber Security attacks and defending strategies

Learn how identify potential threats and take preemptive measures to secure cyber assets


It is preferred that participants successfully completed and pass Cyber Security Essentials (CSE)


Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered

Module 1 Building a Hacking Lab

Participants will be introduced the latest advancement of Cyber Security Concepts. Participants will also acquire knowledge on how to install / setup Kali Linux (Attacker), Vulnerable Virtual Machines (Target), Cloud Computing and Virtualization concepts.

Topics Covered
  • Introduction to Real-World Hacking
  • Kali Linux VM Configuration
  • Configure Vulnerable VMs
  • Cloud VM vs Container

Module 2 Hiding Identity

In the process of hacking, it is an important to hide your identity or achieving anonymity. Anonymity will allow you to do things on the internet invisibly.

Topics Covered
  • ProxyChains
  • VPN Services
TOR Network

Module 3 Open-Source Intelligence

Acquire essential knowledge on how to perform opensource intelligence on enumerate sensitive information of Target to make the process of hacking look seamless.

Topics Covered
  • Internet Archives / WHOIS / Netcraft
  • Google Hacking Database & Shodan
  • Network Scanning Methodology
  • Identify Live Hosts & Port Scanning
  • Enumerating Sensitive Information

Module 4 Password Cracking

In this module, participants will learn how to perform different types of password attacks, including cracking hashes and brut-force.

Topics Covered
  • Attack Vector
  • Password Cracking Tools
  • Cracking the Hashes
  • Sniffing Password

Module 5 Malware Threats

Participants will understand the different types of malware and how attackers are distributing malware using undetectable to security devices.

Topics Covered
  • Type of Malware
  • Creating & Distributing Malware
  • Art to Avoiding Detection

Module 6 Social Engineering Attack

Discover popularly techniques used to perform attacks like sniffing, MITM, spoofing and phishing using social engineering. This increases the ease of conducting a mass attack surface area.

Topics Covered
  • MITM Description
  • Sniffing & Spoofing Attack
  • Phishing & Spear Phishing Attack
  • Social Media Phishing
  • Web Based Delivery

Module 7 Hacking Web Server & Database

Web Servers and Database technologies are widely used everywhere and most of them are vulnerable. In this module, participants will learn how to identify vulnerabilities and mitigation.

Topics Covered
  • Basic WEB Technologies
  • OWASP Top 10
  • Hacking WEB Server
  • SQL Injection Methodlogy
  • SQL Injection Tools

Module 8 Wireless Hacking

Open and Free WIFI Access Points / Network are often used by hackers to spy on sensitive data of users. In this module, participants will gain an in-depth understanding on how to to securely use and configure wireless networks.

Topics Covered
  • Wireless Basics
  • WPA / WPA2 Attack
  • Rogue Access Points

Module 9 Evading IDs, Firewalls and Honeypots

100% security is only marketing strategies. Learn how hackers bypass security domains of targets. Participants will also learn how to harden / defend IT infrastructure through extensive practical / hands-on exercises.

Topics Covered
  • IDS / IPS Configuration
  • Honeypots
  • Firewalls (Vendor-Centric vs Open Source)
  • ACL – Access Control List
What Past Participants Say
Course content is excellently designed and delivered, allowing participants to learn at a comfortable pace.

Nur Hisyam

This course is an eye opener to world of cyber security. It has provided me with greater insights and focus extensively on the technical aspect of Cyber Security.

Joel Zhou


Customization of Programs for specific industry, organisation, government agencies, statutory boards.

Flexible programmes designed to cater to the individual needs of participants, whether for professional upskilling, or for general interest.

Benefit from contribution from leading Industry Experts, Academics, and Researchers from across the world.

Opportunities for employers to develop their workforce and for individuals to enhance their career.

Dynamic learning environment that providing participants with professional networking opportunity.

Online support for participants after the training.

Explore More Courses
Certification Programs
Cyber Security Essentials (CSE)

Advanced Cyber Security Analytics (ACSA)
Executive Workshops
Cyber Security Overview

Vulnerability Assessment / Penetration Testing (VAPT)

Web Application Security

Information & Data Security Overview (IDSO)

Need more information?
Let us help if you are planning to advance your career and further your education. Request for more information.

Request for more