Intelligence Life Cycle

Course Provider

School of Computer Science and Engineering (SCSE)

Certification

FlexiMasters

Academic Unit

1

Introduction

The cyber threat intelligence lifecycle constitutes an ongoing process that encompasses the gathering, analysis, and dissemination of information pertaining to potential cyber threats. It commences with the collection of data from a multitude of sources, including security logs, monitoring of the dark web, and feeds from threat intelligence sources. Subsequently, this data undergoes scrutiny and assessment to discern patterns, trends, and potential risks.

 

Upon the completion of the analysis, actionable intelligence is generated and shared with relevant stakeholders. This equips them with the insights needed to make informed decisions and proactively counteract cyber threats. Feedback and insights derived from the outcomes of these actions are then utilised to refine and enhance the process of collecting and analysing intelligence, thereby ensuring a continuous cycle of improvement in threat intelligence.

This course serves as a valuable resource for enhancing the skills of current information technology (IT) professionals aspiring to excel in the realms of cyber or data governance. It is particularly relevant for those operating within the banking and finance sector, as well as in other industries engaged in e-business interactions with the banking and financial sector.

 

This course is part of:

- Graduate Certificate in Cybersecurity and Digital Trust
- FlexiMasters in Cybersecurity and Digital Trust

Learners are encouraged to complete the following core courses before enrolling in the remaining courses:

  1. Foundations of Cybersecurity (1 AU)
  2. Basic Cybersecurity Risk Management (1 AU)
  3. Intermediate Cybersecurity Risk Management (1 AU)

 


This course explores the Cyber Threat Intelligence Lifecycle, covering strategic planning, data collection, processing and exploitation, analysis and production, and dissemination. Students will gain practical skills to effectively manage and apply this lifecycle framework in real-world scenarios.

At the end of the course, the learner will be able to: 

  • State and describe the Cyber Threat Intelligence Lifecycle. 
  • Explain the significance of each step of the Cyber Threat Intelligence Lifecycle.
  • Apply this lifecycle framework in real-world scenarios.


This course explores the Cyber Threat Intelligence Lifecycle, covering strategic planning, data collection, processing and exploitation, analysis and production, and dissemination. Students will gain practical skills to effectively manage and apply this lifecycle framework in real-world scenarios.


This programme is suitable for cybersecurity analysts, information system auditors, law enforcement, security architects, system designers, and system administrator. Participants are expected to have basic knowledge in the core modules of  cybersecurity, cybersecurity risk management and cryptography before taking this module.

Learners are encouraged to complete the following core courses before enrolling in the remaining courses:

  1. Foundations of Cybersecurity (1 AU)
  2. Basic Cybersecurity Risk Management (1 AU)
  3. Intermediate Cybersecurity Risk Management (1 AU)


Standard Course Fee: S$2,180

SSG Funding Support

 Course fee

Course fee payable after SSG funding, if eligible under various schemes

 

BEFORE funding & GST

AFTER funding & 9% GST

Singapore Citizens (SCs) and Permanent Residents (PRs) (Up to 70% funding)

S$2,000.00

S$654.00

Enhanced Training Support for SMEs (ETSS)

S$254.00

SCs aged ≥ 40 years old
SkillsFuture Mid-career Enhanced Subsidy (MCES)
(Up to 90% funding)

  • Standard course fee is inclusive of GST.
  • NTU/NIE alumni may utilise their $1,600 Alumni Course Credits. Click here for more information.

 

Read more about funding

 

COURSE TITLEACADEMIC UNIT
Foundations of Cybersecurity
1
Basic Cybersecurity Risk Management1
Intermediate Cybersecurity Risk Management1
Payment Flows
1
Cyber Fraud Loss Cycle
1
Mastercard Cybersecurity Tools1
Cybercriminal Profiling 1
Enterprise Cyber Risk Management 1
Insider Threat1
Corporate Security Structure1
Public-Private Sector Partnerships1
Intelligence Life Cycle1
Introduction to Cryptography1
Hardware Trojan Threats and Countermeasures 1
Hardware Security and Design for Trust1


    Listed courses are:

    • Credit-bearing and stackable to Graduate Certificate in Cybersecurity and Digital Trust (total 9 AUs) and FlexiMasters in Cybersecurity and Digital Trust (15 AUs)

    Learners are encouraged to complete the following core courses before enrolling in the remaining courses:

    1. Foundations of Cybersecurity (1 AU)
    2. Basic Cybersecurity Risk Management (1 AU)
    3. Intermediate Cybersecurity Risk Management (1 AU)