Cyber Defenders of Tomorrow

Keeping the Cyber World secure.

Diploma in Infocomm Security Management (DISM) JAE Code: S54

What You'll Study

What You'll Study

DISM Students Awarded DSO Diploma Scholarship
Daniel Ho and Aloysius Lee awarded DSO Diploma Scholarship 2015
5 Things You Probably Didn't Know About Our Course
To find out what it’s like in DISM and what the profession entails.
Young Thinkers Challenge
National Infocomm Competition | Data Analytics
DMIT inks agreement with Proxor to offer Software Developer Examinations
Students and alumni better prepared for programming tests at I.T. job interviews with new certification.
SingTel unveils scholarships for poly students
SingTel works with polys to nurture talent in engineering and cyber security through 2million scholarship.
Singapore Polytechnic launches Singapore's first Cyber Security Academy
To provide cyber-defence assessment services and training
Security Kingpins!
DMIT alumni wins National Infocomm Security Competition
S.E.E.D SIG student Techno-Journey in Hackathons
Serious Coding and Successful Habits


I feel that the comprehensive and flexible curriculum, industrial exposure and certifications as well as real-life practices and competitions are the core benefits of studying in DISM. On top of that, there are also plenty of opportunities to hang out with friends while having loads of fun in a wide range of activities. Most importantly there are these friendly, encouraging and helpful lecturers. For those genuinely passionate about an Infocomm Security career, DISM is definitely the path one would not regret taking.
Mr Yang Xudong
Class of 2013, Diploma with Merit
IDA Gold Medal and ISACA Award
DISM Student, winner of the LKY - STEP Scholarship 2008 with Prime Minister Lee Hsien Loong at the Scholarship Presentation Ceremony.
Mr Alvin Loo
At the Bill Gates Live! Forum in Singapore, Bill Gates was asked what the biggest technology challenge was. His answer: Security.
SPH - The Straits Times

First Year

Module Code
Module Name
Total Hours
Communicating for Project (Report) Effectiveness
Aims to equip students with skills in effective communication, teamwork and interpersonal communication, and report writing.
General Education 1
Aims to equip students with critical reasoning skills and provide them with opportunities to practise critical thinking through the exploration of contemporary social issues. It also provides a platform for students to learn the basics of arguments through the formal argumentation structure.
General Education 2
Aims to equip students with the skills to critically analyse the elements of persuasion in narratives used in a variety of contexts to appreciate the power of storytelling in our daily life. Students will also explore the history of discrimination in societies and craft their responses through their own narrative.
Provides students with knowledge in mathematics and statistics to solve problems encountered in their course of study. Topics include set theory, function, Boolean algebra, computer arithmetic, matrix algebra, geometric transformations, probability and statistics.
Education and Career Guidance 1
A compulsory module for all first year students, ECG 1 aims to develop an understanding of personal interests, strengths, values and life goals. With greater knowledge and understanding of self, planning and decision making in choosing a future career can be better developed. Some topics covered in ECG 1 include ‘Defining My SP Life’, ‘Personal Branding’, ‘Discovering My Interests’, ‘Planning for Success – My Personal Action Plan’ and more.
Essential LINUX System Administration
Aims to provide student with the hands-on sessions on Linux operating systems. Students will be taught on the use of various Linux commands / system tools for user management, security administration, software installation, network administration and configuration of services. These topics are essential and prerequisite to learning the skills of an entry level Linux administrator or helpdesk technician in an enterprise environment.
Database Management Systems
Equips students with database knowledge including the characteristics of a relational model, functions of relational database management system (RDBMS), process of normalization, entity-relationship modelling and Structure Query Language (SQL). Students will also be introduced to the concepts of Big Data and its impact to businesses.
Aims to help students discover how Information Technology enables them to go beyond borders, connect instantaneously, and make a difference to the way people work, play, communicate and live. In this module, students will discover what roles they can play in bringing about change and improvement to the world through Information Technology with the use of Business Design methodologies (empathy, ideation & prototype).
Infocomm Security
Provides students with an understanding of Infocomm security concepts and issues. Students will be able to identify the risks, threats and the vulnerabilities of the Internet and learn how to defend against security breaches by identifying effective counter measures to be taken against identified vulnerabilities. Students will also learn about ethical and responsibility issues through case studies of security breaches.
Web Client Development
Teaches techniques and skills required for front-end web development. Students will learn to use latest front-end Web technologies to build interactive and responsive sites that can support various platforms.
Network Fundamentals
Equips students with the fundamental concepts and skills in data networking, both wired and wireless. Students will learn basic network devices, functions, standards, and protocols and will acquire basic networking skills like designing and setting up a local area network.
Programming Fundamentals
Teaches students programming fundamentals and object oriented concepts using Java. Students will be taught programming fundamentals such as data types and operators, control structures, methods and arrays. Object-oriented concepts will also be introduced. At the end of the module, students will be competent in using programming for problem solving.
Computer Architecture and Operating Systems
Provides students with an understanding of the basic architecture of computers, data representation, process and memory management, concepts and functions of operating systems. The fundamental concepts taught in this module will serve as a basis for students to continue their study in the field of IT.

Second Year

Module Code
Module Name
Total Hours
Communicating for Professional Effectiveness
Aims to equip students with the essential communication and interpersonal skills necessary for work and the pursuit of further studies.
LC8003 or LC8006
Social Innovation Project or Overseas Social Innovation Project
Aims to equip students with the Design Thinking mindset, methods and tools to conceptualise innovative solutions for real life problems. Students will explore a social cause, go through the practical rigour of the Design Thinking process and apply suitable tools to fulfil the objectives of the project. Students will also be exposed to trends and issues related to themes, such as Healthcare, Active Ageing, Environment, and Social Integration. In the process, they will develop a better understanding of themselves and the world, as well as the positive impact they can make.
General Education 3
Aims to enhance students’ knowledge and appreciation of a broad range of social, political and economic issues. Students will learn about the importance and relevance of information literacy skills as well as develop their ability to assess the validity and reliability of information from different sources, consider diverse perspectives, and put forward a convincing point of view.
Education and Career Guidance 2
ECG 2 is taken by all second year students. This module aims to develop professional skills necessary to seek and secure work. It also guides the students on how to discover and develop skills, knowledge and attitudes needed for work effectiveness and changes related to work. Topics covered in this module include ‘Job Search and Market Trends’, ‘Discovering Your Unique Selling Point’, ‘Resilience’, ‘Work Place Values’ and more.
Enterprise Application Development
Equips students with knowledge in enterprise web application development, with the use of J2EE (Java 2 Platform, Enterprise Edition). Students will be able to develop a web application that facilitates various means of online payment, implement Java server side programs that have database access and deploy a web server. Students would also be taught on good practices of secure coding.
Computer Law and Investigation
Examines the criminal trial process and cases involving computer hacking, denial of service, modification of data, distortion and fabrication of information. Students will examine the Computer Misuse Act, Evidence Act and the Criminal Procedure Code when dealing with the various cyber threats issues.
Database Security and Management
Teaches a comprehensive understanding of the database server architecture and administration with respect to database and server security, database backup and recovery. Students should be aware of common threats, identify and implement appropriate security measures to protect and secure databases and its server. Students should be able to plan and implement a successful backup and recovery strategy. In addition, students should be able to manage the distribution of data and manage database objects using Transact-SQL.
Applied Cryptography
Teaches students the principles and application of cryptography to secure data and network. Different encryption algorithms and techniques will be introduced, including conventional and public-key cryptography, authentication and digital signatures. Students will learn to apply these concepts to secure and authenticate electronic mails and messages. Key management, digital certificates and public-key infrastructure will be discussed to understand the deployment of public-key cryptography.
Programming in Security
This module aims to develop fundamental programming skills in students through learning an imperative programming language and a scripting language. The basic programming techniques and constructs in these two types of programming languages will be explained, including regular expressions, recursions, pointers, functions, structs and modules. The module strives to build up the foundation in programming and develop students towards problem solving.
Ethical Hacking and Defences
This module provides students with a foundation on network protocols, network security, secure coding and penetration testing to protect computer resources. Students are taught offensive and defensive skills for the organisation’s wired and wireless networks in order to protect important assets against hackers.
Computer Forensics
Aims to equip students with the fundamental concepts and techniques of computer forensics. Students will learn to preserve, acquire, analyse and present computer data as evidence. The module will cover tools and techniques of computer forensics, file structures, data recovery, imaging and storage of electronic evidence.
Securing Microsoft Windows
Aims at equipping the students with hands-on knowledge in securing and hardening a Windows operating system. The course will cover the security mechanism used in the operating system, configuring different levels of security measures, best practices and security related tools and utilities.

Elective Modules (choose one from the following)

Module Code
Module Name
Total Hours
Cloud and Service Computing
Provides practical introduction to cloud computing architecture and service development. Topics cover from design to implementation of services consumed by normal web clients, AJAX clients, or other applications. Students will be taught the skills required to design, code and implement services based on cloud platform and web platform.
Geospatial Visualization
Equips students with the capability to build engaging applications that incorporates location-aware data with the power of geospatial analysis. The module introduces the fundamental concepts of a Geospatial Information System (GIS) as well as the properties and structure of a GIS map. It will cover the use of GIS APIs to incorporate basemaps as well as working with queries to create GIS enabled web and mobile applications. At the end of the course, the student will be able to choose an application development environment that is suitable for a particular need as well as design an application for efficient querying and editing of GIS data.
Business Analytics
Teaches students the concepts and applications of different analytical techniques such as association rules and clustering to solve different business objectives. Students will be taught how to segment and profile customers so that they can better understand them and know when to market to the right customers with an objective to increase the return on investment for the business. Students will learn how to explore and mine data, apply the different algorithms to different contexts, interpret the generated solutions and provide insightful findings to management for decision making.
Independent Study 1
Aims to provide opportunities for students to study in-depth an area of interest related to their field of study. Students will demonstrate their knowledge, skills and competencies in the chosen field of study through various means such as case study reports, prototypes, presentations or participate in national level competitions.
Mobile Applications
Imparts general domain knowledge in the area of mobile networks and applications development. The architecture of the mobile network, the operating systems used in different mobile devices as well as the software tools used for mobile applications development will be taught. Students will also understand how deployment and bringing the application to market are done. On completion of the module, students will also be able to program, among others; user interfaces, persistence storage, 2D graphics and location-aware applications using Android as an example platform.

Third Year

Module Code
Module Name
Total Hours
InfoSec Project Development and Management
Provides students an opportunity to integrate knowledge and technical skills they have acquired from the course and experience problem solving, communication and working as a team to work on an InfoSec Project Development and Management. In the project, the students are expected to perform problem analysis, investigation, solution design, implementation of security related project. In addition, project management will also be taught as part of the module.
IT Security Policies and Auditing
Teaches students the principles and practices of IT auditing and the use of computer assisted auditing techniques (CAATs). This module will enable students to identify and evaluate risks in different IT environment and to recommend controls to minimise those risks. Students will also learn the essentials of security policy development.
Securing Linux
Aims at equipping the students with hands-on knowledge in securing and hardening a Linux operating system. The course will cover the security mechanism used in the operating system, configuring different levels of security measures, best practices and security related tools and utilities.
Provides students with work exposure to an industrial environment, with opportunity to relate what is taught in the classroom to actual work situation. This module creates a valuable learning opportunity for students to sharpen their IT security skills and knowledge.
24 Weeks

(choose one from the following)

Module Code
Module Name
Total Hours
Advanced Java Programming
Covers the more advanced Java programming and OO concepts and is a follow up to the Object-Oriented Programming module or Java Programming module offered in Year 1. Students will learn more advanced Java programming topics like threading, generics, the Java collections framework and new features present in J2SE.
Enterprise Business Processes
Provides students with broad-based understanding of how basic business processes in the areas of accounting, materials management, procurement, production, sales and services are represented within an Enterprise Resource Planning (ERP) solution.
Principles of Infocomm Law
Introduces the various infocomm laws including the formation of online contracts and the potential security problems that may arise in the infocomm industry. The ethical issues and regulatory framework relating to online transactions, data protection and privacy will also be covered, with particular emphasis on the Electronic Transactions Act, infocomm regulations and intellectual property laws.
Independent Study 2
Provides opportunities for students to study in-depth an area of interest related to their field of study. Students will demonstrate their knowledge, skills and competencies in the chosen field of study through various means such as case study reports, prototypes, presentations or participate in national level competitions.

For students who choose Elective Focus in Security Incident Management

Module Code
Module Name
Total Hours
Operations Security and Contingency Management
Provides students with an understanding of the concepts and issues in operations security and contingency planning. Students will learn the security mechanism in protecting key resources, the best practices of operation security in a computing facility and plan for the eventuality of a disaster. Students will be able to carry out the steps in developing disaster recovery and business continuity plans.
Security Management and Incident Response
Aims to equip students with the fundamental concepts and techniques of Security Information and Event Management (SIEM). Students will learn the basics of correlation of events, real-time monitoring and presentation of information from network and security devices using SIEM technology. Students will understand the key characteristics of log auditing, event management, and how to handle the situation as the incident responders to contain the incident and plan for the recovery steps.

For students who choose Elective Focus in Forensics and Investigation

Module Code
Module Name
Total Hours
Mobile Forensics and Investigation
Aims to equip students with the fundamental concepts and techniques of handling the forensics process in mobile phones, sim cards and hybrid devices. Students will learn to acquire, analyse and present crucial data as evidence. Platforms include iOS, Android and Windows Mobile. The module will cover tools and techniques of mobile forensics, data recovery, imaging and storage of electronic evidence.
Malware Reverse Engineering
Equips students with the basic knowledge of malware analysis to reverse-engineer the malware using practical tools and techniques. The three phases of behavioral, code and memory analysis of malware will be taught. Students will learn how to explore and understand the key characteristics of malware and the techniques of reverse-engineering compiled Windows executables and browser-based malware.



Please note: Course structure subjected to change.