1 / 61

Kickstart Your Cybersecurity Career: Roles, Skills & Certification

Understand the growing demand for cybersecurity professionals, explore key roles, and learn how MAGES Institute equips you with CEH-aligned training and job support.

Download Presentation

Kickstart Your Cybersecurity Career: Roles, Skills & Certification

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBERSECURITY Learn - Protect - Prevent

  2. 1 6 What is the Earning Potential? Defining Cybersecurity About MAGES Institute of Excellence 7 2 Cybersecurity – Myths and Reality 3 8 Cybersecurity in Singapore About MAGES Studio 4 9 Course Details Why Cybersecurity Career now? 5 10 Roles in Cybersecurity Course Admission Process

  3. WHAT IS CYBERSECURITY WHO SHOULD CARE ABOUT IT, WHY IS IT IMPORTANT?

  4. CYBERSECURITY : DEFINTION “Cyber security is how individuals and organizations reduce the risk of cyber attack. Cyber security's core function is to protect the devices we all use (smartphones, laptops, tablets and computers) and the services we access - both online and at work - from theft or damage. It's also about preventing unauthorized access to the vast amounts of personal information we store on these devices, and online.”

  5. CYBER SECURITY: MYTHS AND REALITY • Cyber security is too complex for me to understand. • Cyber attacks are sophisticated. We can’t stop them. • Cyber attacks are highly targeted. Our organization is unlikely to be interesting and/or valuable enough to attackers. 0‹#›

  6. CYBER SECURITY: RESPONSIBILITY Nearly all organizations depend on digital technology to function. The potential cost of remedying a cyber incident can be significant. The risk of reputational damage. Cyber security is therefore essential and needs to be understood as an enabler. 0‹#›

  7. Who is responsible for Cyber Attacks? 0‹#› https://mages.edu.sg/

  8. Nation State Actors Geopolitical events drive cyber operations. Destructive attacks & OT specific malware. Information Operations Espionage is still the main activity. 0

  9. Criminal Actors Increasing specialization, sophistication & collaboration. Weaponization of discovered vulnerabilities. Crime is migrating to the cloud

  10. GROWTH OF CYBERCRIME Nominal Gross Domestic Product 2024 US 28.78 trillion China 18.53 trillion Cybercrime 9.22 trillion Japan 4.59 trillion Germany 4.11 trillion https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide

  11. Why Cybersecurity as a Career Now? The cybersecurity job market in Singapore is booming with a high demand for Cloud Security, Threat Intelligence, Data Privacy, and Incident Response skills. The market is expected to grow to USD 4.82 billion by 2029, emphasizing the need for professionals with certifications like CISSP and CISM. ( 9 Apr 2024 )

  12. What Job roles are available?

  13. Cybersecurity Career Paths

  14. Cybersecurity Careers in SG 01 02 03 Penetration Tester Security Architect Security Analyst • Find vulnerabilities before attackers • Simulate cyberattacks to improve security • Monitor Networks & system for threats • Investigate security incidents • Design & implement secure IT system • Analyse risks & create security solutions Avg. Salary: $5,367 / month Avg. Salary: $135,102 / year ($65/hour) Avg. Salary: $114,762 / year ($55/hour) 04 05 Cybersecurity Consultant Cybersecurity Engineer • Implement security measures & tools • Perform vulnerability assessments • Advise organization on cybersecurity • Conduct security audits & recommend solutions Avg. Salary: $4,000-$6,000 / month Avg. Salary: $7,000-$9,500 / month

  15. Why MAGES Institute of Excellence ? The Rookie Top Creative Schools Production Excellence - Mobile Games 2019,2023 & 2024

  16. Established in 2010, MAGES Institute of Excellence stands as a leading Creative Technology institution in Asia, ranking among the Top 50 Design and Media Schools worldwide. Our dedication to educational excellence is validated through partnerships with Enterprise Singapore and SkillsFuture Singapore, establishing us as a trusted provider of industry-relevant education. MAGES STUDIO PTE. LTD.MAGES Studio represents the intersection of creativity and technological innovation, delivering cutting-edge solutions for global industry leaders. As a dynamic production house, we bring real-world expertise and industry best practices to every project. Our collaborations with renowned organisations such as Singapore Airlines, Disney, KPMG, and The World Bank demonstrate our capability to deliver world-class creative solutions. MILE 3MILE 3 is an innovative creative technology incubator where youth, industry, and community converge to create transformative solutions. Through strategic industry collaborations and community design programs, MILE 3 bridges the gap between education and real-world application, fostering the next generation of creative technologists. MAGES INSTITUTE OF EXCELLENCE 0‹#› https://mages.edu.sg/

  17. MAGES REGISTRATION CERTIFICATES

  18. CORPORATE TRAINING CLIENTS (B2B) *And More

  19. Previous Partners

  20. TECH IMMERSION AND PLACEMENT PROGRAM(TIPP) SUPPORTED BY: IMDA

  21. TECH IMMERSION AND PLACEMENT PROGRAMME Aims to convert non-ICT professionals into industry-ready ICT professionals. They will be placed into tech job roles, after undergoing a short intensive and immersive training course or mentorship and coaching programmes delivered by industry practitioners. NON-ICT PROFESSIONALS IMMERSIVE PROGRAMS ICT PROFESSIONALS For More Information - https://www.imda.gov.sg/imtalent/programmes/tipp

  22. What will I Learn?

  23. CYBERSECURITY Module Division CS101 Cybersecurity Fundamentals CS104 Advanced Cybersecurity Techniques CS102 Networking and Security Fundamentals CS105 Capstone Project CS103: Ethical Hacking and Security Techniques DURATION : 6 MONTHS (24 WEEKS) – PART TIME

  24. CYBERSECURITY CS101 – CYBERSECURITY FUNDAMENTALS (Week 1- Week 4) Gain foundational knowledge of cybersecurity principles, threats, and defence strategies. Key Topics Introduction to Cybersecurity Cybersecurity Principles Types of Cyber Threats Defensive Strategies Basic Cybersecurity Concepts Cybersecurity Challenges and Solutions Tools/Software Used: VMware Workstation - Kali Linux - File Integrity Management * Trainer will guide the Learners on how to install the above tools/software ** Subject to Change

  25. CYBERSECURITY CS102 Networking and Security Fundamentals | CS103 Ethical Hacking and Security Techniques (Week 5- Week 16) = CEH CERTIFICATION (CERTIFIED ETHICAL HACKER – EC COUNCIL) Explore ethical hacking techniques for analysing and securing systems. Gain skills in web security, network analysis, and wireless network defence. Outcomes Understand network structures and protocols. Gain skills in securing wireless networks. Learn to identify and mitigate network vulnerabilities. Tools/Software Used: Access to ILab's – CEH Certification

  26. CEHSTUDENT LEARNING MATERIALS E-Book 24 months access iLab 6 months access Online exam voucher to be taken in-person at MAGES valid for 12 months

  27. EC-Council |iLabs The Only Official Ethical Hacking Cyber Range Introducing….. You want to learn to hack in a safe environment? iLabs come with a complete set of lab exercises for hours of guided, hands-on, practical learning

  28. CEH Exam 4-hours exam 125 MCQ Knowledge-based exam

  29. CEH Certificate & Digital Badge

  30. GLOBALLY RECOGNISED AND ENDORSED Meeting the international standards in professional training and certification CNSS Committee on National Security Systems NSA National Security Agency USA NICE National Initiative for Cybersecurity Education NCSC National Cybersecurity Center, UK (part of GCHQ) ANSI 17024 American National Standards Institute CREST Pentesting & SOC Accreditation DoD Department of Defense Directive 8140

  31. CYBERSECURITY CS104 – ADVANCED CYBERSECURITY TECHNIQUES (WEEK17-WEEK20) Advanced cybersecurity practices, including threat detection, incident response, and penetration testing. Develop skills in using tools for vulnerability assessment, SIEM, and threat intelligence. Key Topics Network Attacks Threat Intelligence Incident Handling and Response Threat Detection and SIEM Risk Management Tools/Software Used: VMware Workstation - Kali Linux etc.* Trainer will guide the Learners on how to use the above tools/software ** Subject to Change

  32. CYBERSECURITY CS105 – CAPSTONE PROJECT (WEEK21-WEEK24) CEH Exam(Recommended) Trainer will guide the learner prior to this on how to prepare for exam Project – Solution Presentation & Report Soft Skill Training Project Solution Development Project Consultation Project Solution Development Project Statement Brief CEH Exam (Recommended) Trainer will guide the learner prior to this on how to prepare for exam Learners will engage with a real-world cybersecurity case study, identifying key issues and discussing challenges. Research, plan, and design a feasible solution, applying their knowledge to develop practical cybersecurity strategies while honing problem-solving and critical thinking skills.

  33. Course journey With our flagship PT/FT Cybersecurity program, you will master essential cybersecurity skills, gain hands-on experience in ethical hacking, and prepare yourself for certification and career advancement in a high-demand field. Skill set learned Problem statement ethical hacking techniques and tools, also aligned with CEH certification. Hands on Lab/Simulation with CEH/ILab Cybersecurity Fundamentals Cybersecurity Analyst Cybersecurity Solution Student Advanced topics such as intrusion detection, and defense mechanisms. Applying learned skills to a real-world problem to create a cybersecurity solution. Networking basics and security practices, aligned with CEH certification. Soft skills training (learn communication, teamwork, resume writing, mock interview etc.)

  34. Laptop / Hardware Requirements

  35. Immersive Program Features It is our endeavor based on the ever-changing needs of the gaming industry and feedback from our students and alumni. You will develop a range of portfolio pieces under constructive peer review. Serious Commitment Structured Curriculum We will bring the right support and resources to help you thrive. Recommended commitment is 15 hours a week outside classroom. We focus on the right skills in the right order. Our curriculum designed very carefully to meet the demand of the industry. Mentor Meetings Career Support Once the Program begins, you’ll meet with the Mentor during project with reviews to keep you making progress. We provide each of our graduates with access to job readiness training, an alumni network, connections to employers and opportunities.

  36. Cybersecurity Trainers

  37. Experienced Cybersecurity Professional. A graduate specializing in cybersecurity, has been teaching in the field for the past five years, spanning institutions of higher learning, universities, and corporate environments. He focuses on infrastructure security and offensive security, bringing a wealth of practical experience to his teaching. Prior to his teaching career, Bernard worked as a vulnerability analyst, cybersecurity consultant, and principal cybersecurity engineer, further enhancing his expertise in the industry. Certifications: CEH, CHFI, CTIA, GICSP, QISP Bernard Tang Lecturer at MAGES institute of excellence

  38. IT Specialist Thomas significant experience in the IT industry enriches both his industrial training and his academic teaching. He has teaching experience in subjects like Computing, Programming, Game Dev. at various Singaporean institutions. Vast On-the-Ground Experience Thomas O’Dell Adjunct Lecturer in MAGES Institute of Excellence and Republic Polytechnic B.A Honours in Computer Science, University of Toronto, Canada With over 25 years of working experience, in companies such as ICONIX International and Delcan Corporation in Toronto, Canada.

  39. Experienced Developer Nanda has more than 20 years experience in the IT industry and the education industry specially in the field of IT Infra, Programming, Game Development. Vast International Exposure Nanda Ye Aung Lecturer at MAGES institute of excellence Master Degree in Computer Science, University of Yangon, Myanmar Nanda has working experience in United States, India and Singapore. He has certifications from both Microsoft and Oracle.

  40. Placement Facilitation Support for TIPP Graduates Supported by:

More Related