He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. Truman is the founder of Nexplore (S) Pte Ltd. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States. Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design, Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project. Truman Ng graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. Note the minimal class size to start a class is 3 Pax. Note the venue of the training is subject to changes due to class size and availability of the classroom. If the course is cancelled, we will refund 100% to participants. We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. Please email your queries to and we will forward your queries to the subject matter experts and get back to you asap.
We provide free consultation related to the subject matter after the course.
This basic course on Cyber Security will increase the awareness of various cyber security threats and the best practices to protect from cyber attacks and online scams. Cyber attack is one of the biggest risk to organizations as organizations increasingly pursue digitization to drive efficiency, reduce costs and build data-driven businesses, they simultaneously move into the “target zone” of cyber attacksĬyber Security is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.