CBS Training

Cybersecurity in Your Pocket: Outsmart Deepfakes, Scams & AI Threats

Defend Your Digital Life: Mobile & AI-Era Cybersecurity Essentials

This thorough cybersecurity training course is designed to provide you with the knowledge and tools you need to navigate the ever-changing environment of cyber threats. In today’s digital age, cyber threats, crimes, and attacks are on the rise, affecting both individuals and businesses.

This course will walk you through a number of real-world cyber assault scenarios, including a live demonstration, and teach you how to identify, assess, protect, and combat deepfakes, frauds, and malware in this AI age.

You will learn how to identify cybersecurity threats, remediate vulnerabilities, and protect mobile devices, emails, and social media accounts. Practical tools, case studies, and hands-on experience will enable you to detect and respond to business dangers such as ransomware, phishing, and social engineering.

By the end of this course, you’ll comprehend and develop critical cybersecurity response strategies, practices and protection to combat AI deepfake for both personal and business environment.

Participants may use their mobile phones for Hands-on activity; however, they are encouraged to bring a laptop with internet access that can connect to public or hotel Wi-Fi.

Course Objectives
Upon completion of the course, learners will be able to:

  1. Identify and prevent cyber-attacks and scams, including AI-based risks like deepfakes.
  2. Implement tools and tactics to prevent mobile malware, phishing, and e-commerce scams, including potential treatments.
  3. Create an effective incident response plan to address email breach, ransomware, social engineering risks, cyber threats, and vulnerabilities.
  4. Implement cybersecurity best practices for company and personal safety, such as password management and Wi-Fi security. Address gaps in rules and procedures.
Course Outline
1. Access Cyber Risk, Cyber Crimes, and Cyber Attacks

  • Overview of Cyber Attacks – with Live Cyber Attack demo
  • Rise in Cyber Crimes – Scams, AI Deepfake, recognize them and not be a victim
  • Tools to combat deepfake, scams and malware

2. Identify Cyber Security Risks, Threats and Vulnerabilities

  • Types of Cyber Security Threats and Tools to mitigate it
  • Top Scams as a Cyber Threats and Tools to fight scams and crafted by AI
  • Tool to validate and protect against QR codes scams
  • Steps and ways to Protect against Mobile malware
  • Safety and Ratings to validate and check against E-commerce scams
  • Ways to protect and secure against Email, Messaging, Social accounts

3. Threat Detection and Business Risk

  • Tools to mitigate email spoofing and fight against Business Email Compromise
  • Recognise and protect against Ransomware Attack
  • Tools to check against Phishing Links, and use AI to assist you
  • Fight against Social Engineering – the art of deception
  • Tools to protect and mitigate against USB malware risk and Wi-Fi Risk

4. Cyber Safe and Cyber Essentials in Enterprise and Personal Protection

  • Incident Response Process and Plan
  • Cyber Matrix Severity & Type, Escalation & Measures, Firewall, IDS, IPS
  • Cyber Safe for the Enterprise – Awareness, Action and Adoption
  • Case Studies

5. Session Wrap-up and Q&A

  • Key Takeaways
  • Next Steps
  • Open Floor with Q&A

6. Bonus (if time permits)

  • Cyber Attack Simulation facilitated by trainer for learners to participate
Training Methodology

A combination of lectures, case examples, videos and quizzes or hands-on exercises will be used to engage participants to understand, learn and acquire practical skills about the various topics.

The trainer will explain on the topic and then guide learners through with step-by-step practice or demonstrate on the topic.

Testimonials

“Swee Chye was highly effective in breaking down complex cybersecurity concepts into simple, easy-to-understand explanations.”

“The trainer provided practical examples, concepts, and skills that are highly relevant and applicable to everyday cybersecurity challenges.”

“The hands-on activities and live demonstrations made the training realistic and highly relevant for understanding cybersecurity threats and responses.”

Who Should Attend
  • All Staff within an Organisation seeking ways to protect against cyber threats, equip with tools to combat security vulnerabilities
  • IT Personnel, Operations, Engineering, Accounts, Human Resource
  • Personnel involved in info-security, online security, mobile security
  • Personnel who is interested to learn about cyber security in the AI digital world, understand how to prevent and protect against cyber crimes, fake QR codes, Phishing links
  • Personnel interested in expanding their knowledge and skills in cybersecurity
About The Trainer

Ang Swee Chye – Certified Technology Trainer, Facilitator and Consultant

A man with short dark hair wearing a light-colored collared shirt and a tie is facing the camera against a white background.

Mr. Ang holds an Honours Degree in Electrical and Electronics Engineering and has a strong passion for ICT training. Over the years, he has delivered training to numerous organizations and professionals across the globe.

With more than 27 years of ICT experience, Mr. Ang has provided training to government agencies, private institutions, and multinational organizations across five continents. His areas of specialization include Cybersecurity, Internet of Things (IoT), Mobile Development, Data Science, Data Analytics, Artificial Intelligence (AI), Machine Learning (ML), Generative AI, Prompt Engineering, Cloud Computing, and Web Development.

He focuses on delivering data-centric and technology-driven training programs that enable participants to:

  • Create, Diagnose, Analyze, and Predict (using Gen AI, Data Science, Data Analytics, IoT, AI & ML)
  • Protect Data and Mitigate Risk (through Cybersecurity solutions)
  • Automate Systems and Processes (leveraging Programming, Robotics, and Robotic Process Automation – RPA)

Mr. Ang has trained clients from a wide range of industries. His portfolio includes organizations such as GovTech, Temasek Holdings, JP Morgan, GIC, State Courts, DBS, IMDA, Procter & Gamble, Nanyang Technological University, Nanyang Polytechnic, Singapore Polytechnic, Republic Polytechnic, Pavilion Energy, HTX, SPF, and more than 10 Singapore Government ministries. His international clientele includes Hutchison Ports Holdings, Coscon Logistics, DHL, Panasonic, Dow Chemical, Damco, Yang Ming, Top Glove, Mitsui, LG, among many others.

In addition to his role as a corporate trainer, Mr. Ang also provides consultancy services in various ICT areas, including Cybersecurity, Data Analytics, IoT, Robotics, Mobile Application Development, and Web Development.

Certifications

  • Microsoft-certified – Microsoft Certified Educator,
  • Apple-certified – Apple Professional Learning Specialist & Apple teacher,
  • IBM-certified – IBM Data Science Practitioner – Instructor & IBM Enterprise Design Thinking Practitioner,
  • Certified EC Council – Computer Hacking Forensic Investigator & Certified Ethical Hacker, CyberSecurity Career Mentor, Prompt Engineering for Developers, and Generative AI
  • AWS-certified – AWS Cloud Quest: Cloud Practitioner,
  • AI Professionals Fundamental, Data Engineering Foundation, ChatGPT Prompt Engineering for Developers