Visit Broadbeans Inc., your one-stop education center


Broadbeans Inc.

We want to help make you succeed in the fast-paced world of technology. That is why, we, at Broadbeans Inc., are committed to providing customized courses uniquely tailored for each individual person or business. We want to be your one-stop education center. Because we understand that you would rather deal with one than many, we want to provide you courses that will help you and your business succeed. We provide both scheduled short courses for individuals and groups as well as custom courses for your company's training needs. We specialize in programming courses in software engineering essentials, object-oriented software engineering, Java, C++, UML, mobile application development, JavaScript, PHP/ MySQL, and Perl. We also can customize a course directly for your company. And we can be there every step of the way.

 Broadbeans Inc.
 Your one-stop
 education center.

 For more info on how 
 Broadbeans Inc. can serve
 you, contact:


Cyber Security 

Learning Objectives

The objective of this course is to provide students with basic appreciation and understanding of the underlying security issues and implications of the use of various networked systems and electronic devices in the modern cyber-society from both user and management perspectives. Topics to be covered include overview of information systems and devices in a global network environment, threats to information systems and devices, security models, and concepts for secrecy, integrity and availability. Other topics of security concerns will also be explored: evaluations of secure information systems, security requirements analysis, security management policies, security trends and emerging technologies.  

Upon completion of this course, the participants will be able to:

* Provide an overview of Cyber Security.
* Understand the need for security, cyber crimes, potential threats and risks associated with activities in a cyber-environment involving electronic devices and networked systems.
* Know basic information security measures for conducting secure transactions and related activities in a cyber environment via wired and wireless networks.
* Appreciate basic security solutions and models; concepts for secrecy, integrity and availability.
* Appreciate concepts and approaches for security requirements analysis, evaluation of secure information systems, and set-up of security management policies.
* Comprehend applications of common security solutions, security and technology trends.


Course Topics

DAY 1:
* Introduction to Security in a Cyber-environment
* Basic Definition of cyber security attacks, mechanisms and services
Digital Exposure and Liability
* Assessing and Protecting Digital Assets
* Common Sources of Risk
* Factors Exacerbating Digital Liability
Cyber Security Threats
* Sources of Security Threats : hackers and lawyers
* Digital Liability, Threats, Vulnerabilities and Risk Exposure
* Malware: Viruses, Worms, Trojans overview and vulnerability of the file system
* Types of damages

DAY 2:
Digital Liability Management
* DLM 4 Tiers Defense Infrastructure
* Senior Management Commitment
* Acceptable-Use Policies
* Secure Use Practices
Overview of Technology Solutions
* Firewalls : Stateful inspection, Proxy server, DMZ Demilitarized zone, Personal
* Intrusion Detection System (IDS) : Network IDS, Host IDS
* Access Control and Virtual Private Networks (VPN)
* Biometrics and tokens
* Anti-virus (AV) software
* Cryptography/ Encryption Keys
* Public-key infrastructure (PKI) and digital certificates
Web Security and Electronic Payments
* Secure Sockets Layer (SSL) and Secure-HTTP (S-HTTP)
* Electronic payment systems:
* Digital cash
* Online stored value systems
* Digital accumulating balance payment systems
* Digital credit accounts
* Digital checking
* Secure Electronic Transaction (SET)

DAY 3 :
Encryption Algorithms
* Symmetric Encryption Algorithms
* Feistel Cipher Structure
* Data Encryption Standard (DES)
* Triple DES (3DES)
* Advanced Encryption Standard (AES)
* Other Symmetric Block Ciphers (IDEA, Blowfish, RC5)
* Cipher Block Modes of Operation
* Public Key Encryption Algorithms
* RSA Public-Key Encryption Algorithm
* Diffie-Hellman Key Exchange
* Digital Signature Standard (DSS)
* Elliptic-Curve Cryptography (ECC)
Security Applications and Cases
* Trusted systems
* Data access control
* Multilevel security
* Reference monitor
* Case Study



Dr. Flora S. Tsai

Dr. Tsai has over 16 years of teaching experience for undergraduate subjects. She was a graduate of MIT, Columbia University, and NTU. Dr. Tsai has many years of industrial experience in software research and development in USA and Singapore. She has taught Cyber Security, Object-Oriented Software Engineering Design, Object-Oriented Programming, and Software Engineering at the undergraduate level. She has previously conducted numerous professional short courses for the industry, including Object-Oriented Software Engineering Using UML, Java, and Eclipse, Object-Oriented Analysis & Design Using UML, Software Engineering Essentials, Object-Oriented Programming Using C++, Object-Oriented Programming Using Java, and Mobile Application Development with Java. She has edited three textbooks related to the subjects: Object-Oriented Software Engineering, Cyber Security, and E-Business Management. Her recent awards include the 2005 IBM Faculty Award, 2007 Real-Time Innovation Award, 2010 Smarter Planet Innovation Award, and 2012 Smarter Communications Innovation Award. She is currently a senior member of both IEEE and ACM.


This course is intended for engineers, programmers and managers who wish to learn the basics of Cyber Security, and work with or understand Cyber Security from user and management perspectives.



May 8-10, 2019 


9:00am to 5:00pm 


Seattle, WA

Closing Date:

4 weeks before the course begins 

Course Fee:



Registration fees inclusive of:

  • Course materials

  • Light refreshments

  • Certificate of Completion


Note that all participants are requested to bring their own laptop to class. 

Online Registration

Register Online or email


Payment Options

1. Online Payment (Visa / Mastercard / Amex / Paypal)

2. Check

3. Invoice to Company (for Company Sponsored Participants)

Cancellation & Refund Policy

Withdrawal or deferment notice must be made in writing to at least 4 weeks before the course begins.
In the event that the course is cancelled due to unforeseen circumstances, full refund will be given. Broadbeans Inc. reserves the right to substitute the course instructor with another of similar experience in case of extenuating conditions.


Participating Organizations

Cengage Learning Asia Pte Ltd

Singapore Pools Pte Ltd



For general questions or comments about the Broadbeans Inc. site, please send e-mail to

Thanks for taking the time to give us your comments.

Broadbeans Inc.