Event Profile | |
Class/ Online | Classroom |
Date | October 10, 2025 |
Time | 9:00am to 5:00pm |
Venue | Hotel Grand Pacific Singapore 101 Victoria Street Singapore 188018 |
Fee | 9% GST will apply SGD 550.003 & above: SGD520.00 each For Member SGD 522.5 3 & above: SGD494 each |
Note | Two tea breaks and set lunch or buffet will be served. Limited complimentary car parking coupons are available upon request. Participants should bring a laptop with administrative rights |
Other Date(s) | 1) May 09, 2025 2) Jul 11, 2025 |
Trainer | |
Activity | |
You may reach us via T: 6204 6214 E: info@ccisg.com Alternatively, you may send below details to register Contact Person Company (optional), Name, Job Title, Mailing Address, Tel, Email Participant(s) Name, Job Title, Email |
Hackers today get more sophisticated and unpredictable in their persistent attacks and cyber activities. As we move towards a more digitized AI world, the threats and security risks increase greatly. The breach of personal and company data, disruption to businesses will affect our work, and daily lives. Employees and organization must be able to tackle and handle these cyber-attacks, devise and develop risk assessment and prevent information from being hacked or stolen. The need to be prepared and ready for any online threats and vulnerabilities starts with the right training in the AI era.
Learn various techniques and tools to identify, prevent, protect and response to cyber attacks, by equipping yourself with the right knowledge, to secure your business, protect your assets and mitigate risk in your systems, networks and devices.
Participants are encourage to bring a laptop with administrative rights/privileges
Learn various techniques and tools to identify, prevent, protect and response to cyber attacks, by equipping yourself with the right knowledge, to secure your business, protect your assets and mitigate risk in your systems, networks and devices.
Participants are encourage to bring a laptop with administrative rights/privileges
Objective
- Gain the right knowledge and understanding of security, type of attacks and vulnerabilities
- Know the various threats and implement tools that can protect against it in the AI Age
- Identify the various malwares, know the weaknesses in your systems, networks or devices.
- Mitigate security exploits and prevent data breach or falling victim to stolen critical information
- Devise techniques and develop cyber risk assessments to Protect against malicious attacks and Business Risk
Outline
Online Security?
• Information and Security
• Information Security - Risks, Threats and Vulnerabilities with AI deepfake (How to identify)
Identify Security Threats and Vulnerabilities
• Various Attacks / Types of Threats / Weaknesses in the Security Environment, Assess Website vulnerability
Data Security
• Sharing, Storing, Protecting, Transporting Data/Information
Phishing and Malicious Threats
• Attachments, Hoaxes, Malware, Symptoms, Social, Mobile, Wireless in the AI era
Roles and Responsibilities
• Guidelines, Control, Procedure and determine possible treatments
Other Attack, Demonstration and Hands-on Activities
After completing this course, learners will be more prepared and equipped to tackle Cyber Security Attacks and protection in Cyber Tools to fight against AI Deepfakes Scams and Cyber Security Threats
• Information and Security
• Information Security - Risks, Threats and Vulnerabilities with AI deepfake (How to identify)
Identify Security Threats and Vulnerabilities
• Various Attacks / Types of Threats / Weaknesses in the Security Environment, Assess Website vulnerability
Data Security
• Sharing, Storing, Protecting, Transporting Data/Information
Phishing and Malicious Threats
• Attachments, Hoaxes, Malware, Symptoms, Social, Mobile, Wireless in the AI era
Roles and Responsibilities
• Guidelines, Control, Procedure and determine possible treatments
Other Attack, Demonstration and Hands-on Activities
After completing this course, learners will be more prepared and equipped to tackle Cyber Security Attacks and protection in Cyber Tools to fight against AI Deepfakes Scams and Cyber Security Threats
Who should attend
This course is design for anyone who is interested to learn about security, physical and cyber security, understand how to prevent and protect against cyber crimes
- All Staff within an Organisation
- Managers, Team Leaders, Executives, Officers, Secretaries, Assistants
- IT Personnel, Operations
- Personnel involved in info-security, online security
- Personnel looking to gain knowledge or have skillsets in cyber security
Methodology
This is a demo and activity course, so bringing along a laptop is useful. There will be hands-on practices, activities, demonstration for various topics so that you can apply what is being taught.
A combination of lectures, case examples, videos and hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.
The trainer will explain on the topic and then guide you through with step-by-step practice or demonstrate on the topic.
A combination of lectures, case examples, videos and hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.
The trainer will explain on the topic and then guide you through with step-by-step practice or demonstrate on the topic.
Testimonial
Swee Chye was effective in delivering complex topics in simple to understand form -ST Electronics
The practical examples, concepts and skills taught by the Trainer are relevant and useful to everyone - International SOS
The hands-on activities, and demonstration made the training very realistic and relevant to learn about security -Hitachi Asia
The practical examples, concepts and skills taught by the Trainer are relevant and useful to everyone - International SOS
The hands-on activities, and demonstration made the training very realistic and relevant to learn about security -Hitachi Asia
Ang Swee Chye's Profile
Certified Technology Trainer, Facilitator and Consultant
Certifications
Swee Chye is an experience trainer certified by various organization. He is certified by the following organizations:
Education
He holds an honours degree in Electrical and Electronics Engineering, who possesses a strong passion in ICT Training, and has trained many organizations and customers globally.
Working Experience
He has more than 27 years of ICT experience. He has been providing ICT training to government, private institutions and organizations in 5 different continents. He specializes in Cyber Security, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence, Machine Learning, Gen AI and Prompt Engineering, Cloud Computing and Web Development. He focuses on data and data-related training programs to create, diagnose, analyse and predict (Gen AI, Data Science, Data Analytics, IoT, AI & ML), to protect data and mitigate risk (Cybersecurity) and to automate system and processes (Programming, Robotics & RPA). All these can be scaled and performed on premise or in the cloud.
Customers/Clients Credentials
Clients from diverse industries he has trained include GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Proctor & Gamble, Nanyang University, Republic Polytechnic, Singapore Polytechnic, Pavilion Energy, Nanyang Polytechnic, HTX, SPF, more than 10 different SG Govt Ministries, and overseas clients like Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, DOW Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG among many others.
Professional Work
Apart from being a corporate trainer, Swee Chye does consultancy work in ICT in areas like Cyber Security, Data Analytics, IoT, Robotics, Mobile Application, Data Analytics and Web Development.
Certifications
Swee Chye is an experience trainer certified by various organization. He is certified by the following organizations:
- Microsoft-certified - Microsoft Certified Educator,
- Apple-certified - Apple Professional Learning Specialist & Apple teacher,
- IBM-certified - IBM Data Science Practitioner – Instructor & IBM Enterprise Design Thinking Practitioner,
- Certified EC Council - Computer Hacking Forensic Investigator & Certified Ethical Hacker, CyberSecurity Career Mentor, Prompt Engineering for Developers, and Generative AI
- AWS-certified - AWS Cloud Quest: Cloud Practitioner,
- AI Professionals Fundamental, Data Engineering Foundation, ChatGPT Prompt Engineering for Developers
Education
He holds an honours degree in Electrical and Electronics Engineering, who possesses a strong passion in ICT Training, and has trained many organizations and customers globally.
Working Experience
He has more than 27 years of ICT experience. He has been providing ICT training to government, private institutions and organizations in 5 different continents. He specializes in Cyber Security, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence, Machine Learning, Gen AI and Prompt Engineering, Cloud Computing and Web Development. He focuses on data and data-related training programs to create, diagnose, analyse and predict (Gen AI, Data Science, Data Analytics, IoT, AI & ML), to protect data and mitigate risk (Cybersecurity) and to automate system and processes (Programming, Robotics & RPA). All these can be scaled and performed on premise or in the cloud.
Customers/Clients Credentials
Clients from diverse industries he has trained include GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Proctor & Gamble, Nanyang University, Republic Polytechnic, Singapore Polytechnic, Pavilion Energy, Nanyang Polytechnic, HTX, SPF, more than 10 different SG Govt Ministries, and overseas clients like Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, DOW Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG among many others.
Professional Work
Apart from being a corporate trainer, Swee Chye does consultancy work in ICT in areas like Cyber Security, Data Analytics, IoT, Robotics, Mobile Application, Data Analytics and Web Development.