For Starters

Cybersecurity Bootcamp

Begin your journey towards a cybersecurity profession. This comprehensive program equips you with the essential skills needed to excel as a security expert. Gain expertise in evaluating, preserving, and overseeing the safety of computer systems.

3 Months

Duration

₦200,000

Total Fee

Physical

Class Format

Certificate

On Completion

Cybersecurity

Begin your journey towards a cybersecurity profession. This comprehensive program equips you with the essential skills needed to excel as a security expert. Gain expertise in evaluating, preserving, and overseeing the safety of computer systems.

What you will learn

Comprehensive curriculum with 8 learning units

1

Unit 1: Cybersecurity Foundations

The basic concepts of security, important controls, and best practices for safeguarding systems and data are all covered in this introductory cybersecurity course. You'll gain knowledge of how to analyze security methods, make sure industry standards are followed, and evaluate threats, weaknesses, and attack strategies. In order to prepare you to handle real-world cybersecurity concerns, the course also offers ideas for putting strong security measures in place and keeping them up to date.
Project: Securing a Business Network

You will use cybersecurity principles in this assignment to evaluate and address vulnerabilities in Kali Linux, Windows 10, and Windows 11. You will show that you are skilled at lowering risks and managing possible attack vectors in a practical situation by examining security configurations, spotting flaws, and implementing industry best practices.

2

Unit 2: Defending and Securing Systems

This program helps you develop and improve your cybersecurity abilities through practical training with industry tools and approaches. It addresses defense in depth, incident analysis, network and application vulnerability mitigation, and fundamental encryption techniques, and is intended for both novices and experts. Working on real-world projects will include developing risk mitigation plans, putting multi-layered security policies into practice, and performing security evaluations for enterprise network simulations.
Project: Monitoring and securing network infrastructure

You will evaluate Windows and Linux servers in this assignment by assuming the role of a cybersecurity analyst. Among your responsibilities are system security evaluation, OS hardening recommendations, compliance assurance, encryption strategy recommendations, and network security enhancement. This practice develops critical abilities for server environment security

3

Unit 3: Threats, Vulnerabilities, and Incident Response

You will get the ability to recognize and manage security threats, react to cyberattacks, and comprehend the connections among actors, threats, vulnerabilities, and exploits thanks to this course. You'll discover how to evaluate and thwart sophisticated attack tactics, recognize indications of compromise (IoCs), differentiate security events from incidents, and take preventative action to lessen risks by using the MITRE ATT&CK architecture.
Project: Navigating a Cybersecurity Incident

You will take on the role of a cybersecurity analyst looking into a mock cyber event in a medical facility for this project. You will investigate vulnerabilities, find attack vectors, and suggest mitigation techniques using tools such as the MITRE ATT&CK framework, Wireshark, Nmap or Nessus, and log analysis tools. To safeguard vital healthcare infrastructure, you must identify the threat actor, carry out risk and vulnerability assessments, and create plans for incident response and corrective action.

4

Unit 4: Governance, Risk, and Compliance

The importance of cybersecurity governance, risk, and compliance (GRC) in creating a solid cybersecurity strategy is the main topic of this course. In order to safeguard important assets and guarantee adherence to legal and industry requirements, students will learn how to evaluate, implement, and enhance GRC frameworks. By the end, participants will have a solid understanding of GRC principles, improve organizational resilience, assess and match security measures to compliance objectives, reduce risks, and effectively participate in GRC efforts in any kind of business.
Project: Create a business GRC for a business

To improve delivery time and customer satisfaction, a mid-sized IT company is moving to the cloud to increase scalability, cost-effectiveness, and flexibility while speeding up product development cycles. By comprehending company processes, improving GRC documentation, strengthening cloud governance, guaranteeing compliance, and encouraging risk awareness and training, cybersecurity analysts can improve cybersecurity GRC procedures. Through these initiatives, the business will be able to manage its transition while upholding operational excellence and compliance safely.

5

Unit 5: Security Engineering Fundamentals

With an emphasis on assessing, ranking, and conveying security threats, this course offers a thorough introduction to security engineering. Students will gain knowledge of how to create safe systems, evaluate risks, use best practices, and investigate how cryptography fits into information security. Participants will find system flaws, suggest fixes, and evaluate risks through practical laboratories and security review scenarios. To create a solid foundation in cybersecurity, the course integrates industry-recognized frameworks such as the NIST Cybersecurity Framework, OWASP Top 10, and CIS Controls.
Project: TimeSheets Security Assessment

Since it was recently made publicly available, your company's proprietary TimeSheets application has been acting strangely, exhibiting suspicious access from odd times and places, erroneous data, and unauthorized logins. Your team was entrusted with assessing the application following the resolution of an incident. Using an initial threat model, a senior security engineer found the main cause and a number of vulnerabilities connected to encryption. They have requested that you finish the assessment and offer suggestions because of other commitments.

6

Unit 6: System Security

This course provides a thorough understanding of system security fundamentals, focusing on key principles like authentication, authorization, and responding to system changes to protect data and services from unauthorized access. It covers advanced techniques for detecting and addressing security breaches, as well as creating effective logging, monitoring, and auditing tools. The course includes a practical project where you'll assess a vulnerable system, identify threats, implement solutions, and create a detailed report, demonstrating your ability to apply course concepts to real-world scenarios.
Project: Investigating a Cyber Espionage Attack on an Organisation

In this scenario, Tridanium renewable energy research is the target of a cyberattack on a nuclear plant. Using scanning, monitoring, and auditing tools, you will examine a Linux virtual image from a hacked server in order to determine the infection chain, weaknesses, and defenses. Initial assessment, vulnerability scanning, monitoring, infection chain analysis, and bolstering system resilience are important responsibilities. By the conclusion, you'll have practical experience with industry-standard tools, malware analysis, incident response, vulnerability scanning, and other techniques to tackle actual cybersecurity issues.

7

Unit 7: Infrastructure Security

This course introduces industry best practices for security setups and controls. You'll evaluate security setups, perform vulnerability assessments on critical infrastructure systems, and create a detailed report based on a real-world scenario. By the end, you'll gain a solid understanding of security best practices, industry terminology, and the skills to conduct assessments and produce professional reports to support robust security measures.
Project: Assessing infrastructure security

An organization's IT environment is examined by an infrastructure security assessment to find security flaws, configuration errors, and vulnerabilities. You will evaluate if Tech Business A can be incorporated into a wider network in this scenario. To guarantee resilience against attacks, this entails conducting vulnerability scans, comparing setups to CIS Benchmarks, and generating a thorough report with recommendations.

8

Unit 8: Application Security

Participants in this course gain the fundamental knowledge and useful skills needed to improve web application security. With an emphasis on industry-standard frameworks and the OWASP Top 10, you will discover how to find, stop, and fix vulnerabilities in the design and coding of web applications. You will acquire practical security skills, enhance secure development practices, and comprehend the main dangers to online applications at the conclusion.
Project: Vulnerable Web Application Assessment

In order to address a recent security breach, you must thoroughly evaluate the business's web application and systems. This include looking into the underlying reason of the breach, locating weak points, and making suggestions to secure the program and stop similar occurrences in the future. Incident analysis, web application testing, documentation, and reporting are the main topics of the workshop.

Course Information

Course Fee

₦200,000

One-time payment for 3 Months program

Enroll Now