Course Brief

The Advanced Certificate in Cyber Security is a comprehensive program designed to equip learners with the necessary knowledge and hands-on skills to protect modern digital infrastructures from evolving cyber threats. This program integrates three globally recognized EC-Council certifications—Certified Cybersecurity Technician (CCT), Certified Ethical Hacker (CEH), and Certified SOC Analyst (CSA)—along with a capstone project that provides practical, real-world experience. As cyber threats continue to grow in complexity, organizations require skilled professionals who can identify vulnerabilities, detect malicious activities, and respond to security incidents effectively. This program is structured to build expertise in network security, ethical hacking, security operations, and incident response, ensuring that learners are prepared for key cybersecurity roles such as SOC Analyst, Security Engineer, Ethical Hacker, and Incident Responder.

The program begins with the Certified Cybersecurity Technician (CCT) module, which provides a foundational understanding of cybersecurity principles, covering topics such as network security, cryptography, risk management, and security monitoring. Learners gain hands-on experience in configuring firewalls, implementing access controls, and analyzing security threats. The next module, Certified Ethical Hacker (CEH), develops offensive security skills by teaching learners how to conduct penetration testing, vulnerability assessments, and ethical hacking. They will explore real-world attack techniques, such as social engineering, malware exploitation, and web application security, while also learning countermeasures to mitigate threats. Following this, the Certified SOC Analyst (CSA) module focuses on the role of a Security Operations Center (SOC), equipping learners with skills in security monitoring, log analysis, threat intelligence, and incident response. Learners will work with Security Information and Event Management (SIEM) tools to detect cyber threats and develop proactive security measures.

The capstone project serves as the culmination of the program, allowing learners to apply their knowledge and skills in a simulated cybersecurity scenario. Over 60 hours, they will design and implement a cybersecurity solution for a fictional financial services company that has experienced security breaches and unauthorized access. Learners will conduct security assessments, implement security controls, simulate penetration testing, configure SIEM solutions, and develop incident response strategies. This hands-on project enhances problem-solving abilities and ensures that learners can handle real-world cybersecurity challenges with confidence.

Throughout the program, learners benefit from expert-led instruction, interactive lab exercises, and exposure to industry-leading cybersecurity tools. The curriculum is designed to bridge the gap between theory and practice, ensuring that learners can apply cybersecurity methodologies in professional settings. By the end of the program, learners will have gained proficiency in ethical hacking, threat detection, forensic analysis, security governance, and compliance, preparing them for cybersecurity certifications and career advancement. They will be equipped to take on high-demand cybersecurity roles, providing organizations with the expertise needed to safeguard critical digital assets against ever-evolving cyber threats.

Course Knowledge, Skills & Ability Summary

At the end of the course, you will be able to acquire the following:

Knowledge

  • Explain cybersecurity fundamentals, including network security, cryptography, risk management, and ethical hacking principles.
  • Identify and analyze vulnerabilities in IT infrastructures and cloud environments using penetration testing methodologies.
  • Describe various cyber threats and attack vectors, including malware, phishing, ransomware, and insider threats.
  • Understand the role of a Security Operations Center (SOC) and its importance in continuous security monitoring.
  • Explain threat intelligence techniques and how they are used to detect and mitigate cyber threats.
  • Describe incident response processes, including digital forensics, log analysis, and evidence collection.
  • Understand cybersecurity governance and compliance frameworks (ISO 27001, NIST, GDPR) and their role in security management.

Skills

  • Perform security assessments to identify vulnerabilities in networks, systems, and cloud environments.
  • Conduct ethical hacking and penetration testing to simulate cyberattacks and strengthen security defenses.
  • Utilize SIEM tools to monitor, detect, and respond to cyber threats in real-time.
  • Perform threat intelligence and threat hunting to proactively identify malicious activities.
  • Implement security controls such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
  • Develop and execute an incident response plan, including forensic investigations and remediation strategies.
  • Apply security policies and compliance standards to ensure organizations meet regulatory cybersecurity requirements.

Ability

At the end of the Advanced Certificate in Cyber Security, learners will have the practical skills, technical expertise, and problem-solving abilities to assess cybersecurity risks, implement security measures, conduct ethical hacking, manage SOC operations, and respond to cyber threats effectively. They will be job-ready for roles in cybersecurity operations, threat intelligence, ethical hacking, and incident response, making them valuable assets to organizations looking to strengthen their security posture.

Blended Learning Journey

(242 Hours)

Placeholder Image

E-Learning

42 Hours

Placeholder Image

Flipped Class

48 Hours

Placeholder Image

Mentoring Support (Sync) (Assignment)

54 Hours

Placeholder Image

Mentoring Support (Sync) (Project)

42 Hours

Placeholder Image

Mentoring Support (Async)

54 Hours

Placeholder Image

Summative Assessment

2 Hours

Module Summary

WSQ Security Fundamentals (SF)

Module Brief

The "Security Fundamentals" module is mapped to the EC-Council Certified Cybersecurity Technician (C|CT) program. It is a comprehensive entry-level certification designed to equip individuals with foundational skills across multiple cybersecurity domains. Developed by the creators of the renowned Certified Ethical Hacker (C|EH) certification, the C|CT addresses the global demand for skilled cybersecurity technicians. The curriculum encompasses essential areas such as network defense, ethical hacking, digital forensics, and security operations, ensuring a holistic understanding of the cybersecurity landscape.​

One of the program"s standout features is its emphasis on practical, hands-on learning. With over 85 labs and a Capture-The-Flag (CTF) style cyber range, participants gain real-world experience in identifying vulnerabilities, mitigating threats, and responding to security incidents. This experiential approach ensures that learners are not only versed in theoretical concepts but are also adept at applying their knowledge in real-world scenarios.​

The C|CT is tailored for individuals embarking on a cybersecurity career, including aspiring cybersecurity specialists, consultants, network engineers, and IT administrators. By completing this certification, participants validate their technician-level IT and cybersecurity skills, positioning themselves favorably in a competitive job market. Furthermore, the program lays a solid foundation for advanced cybersecurity certifications and specialized roles in the industry.​

In essence, the C|CT serves as a gateway to the cybersecurity profession, providing learners with the requisite knowledge, skills, and abilities to navigate and excel in the ever-evolving digital security domain.

Other Information
  • SSG Module Reference No: TGS-2023020569
  • Module Validity Date: 2027-01-31

WSQ Cloud Security (SF)

Module Brief

The "Cloud Security" module, aligned with EC-Council"s Certified Ethical Hacker (CEH) program, offers an in-depth exploration of securing cloud environments against evolving cyber threats. As organizations increasingly migrate to the cloud, understanding the unique security challenges and implementing robust protective measures become paramount. This module delves into the intricacies of cloud computing models—Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)—and the associated security implications.​

Participants will gain insights into cloud-specific vulnerabilities, threats, and attack vectors, including data breaches, insecure interfaces, and account hijacking. The module emphasizes the importance of shared responsibility models in cloud security, ensuring learners comprehend the delineation of security obligations between cloud service providers and clients.​

A significant focus is placed on practical skills, enabling learners to implement security controls, conduct risk assessments, and respond effectively to incidents within cloud environments. Through hands-on labs and real-world scenarios, participants will configure virtual networks, manage identity and access, and apply encryption techniques to safeguard data in transit and at rest.​

By the end of this module, learners will be equipped with the knowledge and skills necessary to assess, implement, and manage security in cloud infrastructures, preparing them for roles such as Cloud Security Analyst, Cloud Security Engineer, and related positions.

Other Information
  • SSG Module Reference No: TGS-2023020568
  • Module Validity Date: 2027-01-31

WSQ Security Operation analysis (SF)

Module Brief

The "Security Operation Analysis" module, aligned with the EC-Council"s Certified SOC Analyst (CSA) certification, provides comprehensive training for individuals aiming to excel in Security Operations Centers (SOCs). As cyber threats evolve, SOCs play a pivotal role in proactively detecting, analyzing, and responding to security incidents. This module is tailored for aspiring and current Tier I and Tier II SOC analysts, focusing on the essential skills and knowledge required to effectively monitor and defend organizational infrastructures.​

Participants will delve into the fundamentals of SOC operations, understanding the intricacies of security event monitoring, incident detection, and response mechanisms. The curriculum emphasizes hands-on experience with Security Information and Event Management (SIEM) solutions, enabling learners to correlate and analyze security events efficiently. Additionally, the module covers the utilization of threat intelligence to enhance predictive capabilities, allowing analysts to anticipate and mitigate potential threats proactively.​

A significant component of the training involves mastering the processes of log management and correlation, essential for identifying patterns indicative of malicious activities. Learners will also explore the methodologies of incident response, gaining insights into the systematic approach required to handle security breaches effectively. Collaborative exercises will highlight the importance of coordination within SOC teams and with Computer Security Incident Response Teams (CSIRTs) during critical situations.​

By the end of this module, participants will be equipped with the competencies to serve as frontline defenders in a SOC environment, adept at utilizing advanced tools and methodologies to safeguard organizational assets. This training lays the groundwork for a career in cybersecurity operations, preparing individuals for roles that demand vigilance, analytical prowess, and a proactive approach to threat management.

Other Information
  • SSG Module Reference No: TGS-2023020489
  • Module Validity Date: 2027-01-31

WSQ Capstone Project-Cyber security (SF)

Module Brief

The Cybersecurity Capstone Project serves as the culmination of the three core modules:

  • EC-Council Certified Cybersecurity Technician (CCT)
  • Certified Ethical Hacker (CEH)
  • Certified SOC Analyst (CSA)

This hands-on project enables learners to apply their acquired cybersecurity skills to a real-world scenario, integrating network security, cloud security, threat detection, and incident response.

Over a 60-hour duration, learners will work on a simulated cybersecurity challenge faced by a financial services company. The organization has experienced security breaches, phishing attacks, and unauthorized system access. Learners will assess the risks, design security controls, and implement solutions to safeguard the company’s digital assets.

Through synchronous mentor-led sessions (36 hours) and asynchronous project work (24 hours), participants will:

  • Perform cyber risk assessments and identify vulnerabilities.
  • Configure firewall rules, intrusion detection systems (IDS), and SIEM solutions.
  • Conduct penetration testing and ethical hacking to simulate cyberattacks.
  • Utilize threat intelligence for proactive threat hunting.
  • Deveop an incident response strategy and execute forensic investigations.
  • Align security implementations with compliance standards (ISO 27001, GDPR, NIST).

By the end of this capstone module, learners will demonstrate their cybersecurity expertise by delivering a comprehensive security report and presenting mitigation strategies to stakeholders.

This capstone project is designed to bridge the gap between theory and practice, ensuring that learners develop the critical thinking, technical proficiency, and problem-solving skills required to thrive in cybersecurity roles such as SOC Analyst, Security Engineer, or Cybersecurity Consultant.

This module provides a strong foundation for professional certifications and career advancement in cyber defense and security operations.

Other Information
  • SSG Module Reference No: TGS-2023020596
  • Module Validity Date: 2027-01-31

Target Audience & Prerequisite

Target Audience

Prerequisite

  • Minimum Age: Minimum 21 years.
  • English Proficiency: Minimum IELTS 5.5 or its equivalent.
  • Academic Qualification:
    • Minimum of one O-Level credit (or its equivalent) and completion of any one of the following courses:
    • Advanced Certificate in System Support
    • Advanced Certificate in Infrastructure Support
    • Professional Diploma in Cloud Administration
    • Advanced Certificate in Cloud Administration
  • Experience: At least one year of relevant work experience in cloud administration in the absence of the above-mentioned course completion

Graduation Requirements

Certificates

Academic Qualification

  • Advanced Certificate in Cyber Security awarded by Lithan. Academy

Statement of Attainment

  • WSQ Security Fundamentals (SF)

    ICT-OUS-4012-1.1: Security Administration

  • WSQ Cloud Security (SF)

    ICT-DIT-4024-1.1: Network Security

  • WSQ Security Operation analysis (SF)

    ICT-DIT-4022-1.1: Computer Vision Technology

  • WSQ Capstone Project-Cyber security (SF)

    ICT-OUS-4003-2.1: Cyber and Data Breach Incident Management

Industry Skills Certificate

  • WSQ Security Fundamentals (SF)

    EC-Council : EC-Council Certified Cybersecurity Technician

  • WSQ Cloud Security (SF)

    EC-Council : EC-Council Certified Ethical Hacker

  • WSQ Security Operation analysis (SF)

    EC-Council : EC-Council Certified SOC Analyst

*Taking this certification is not mandatory. However, if the learner wishes to pursue it, they need to register for the examination directly with the vendor after paying the necessary fees.

Other Information

Course Reference

  • SSG Course Reference No: TGS-2023022270

  • Course Validity Date: 2030-12-31

  • Course Developer : Lithan Academy

Pricing & Funding