Cyber Security

Enhance your cyber defense skills with our comprehensive Cyber Security Training, designed to equip you with the knowledge to protect against modern digital threats

  • Duration: 3 months
  • Delivery Type: Delivery Type: Online/2hrs/3 classes a week
  • Weekdays: To be communicated
  • Time: 9am - 11am (WAT) or 1am - 3am
PRACTICAL AND JOB-READY CYBER SECURITY MODULES

Modules Covered

Cyber Security

View topics
bg

Ethical Hacking

View topics
bg

Cyber Security

Getting Started With Cyber Security

  • Overview of Cyber Security
  • Fundamental Concepts
  • Cyber Security Policies and Frameworks

Network Security

  • Network Fundamentals
  • Network Threats and Vulnerabilities
  • Network Defense Mechanisms

Endpoint Security

  • Understanding Endpoint Security
  • Endpoint Threats and Protection
  • Best Practices for Endpoint Security

Application Security

  • Introduction to Application Security
  • Secure Software Development Life Cycle (SDLC)
  • Application Security Testing

Data Security

  • Data Protection Fundamentals
  • Data Encryption and Cryptography
  • Data Loss Prevention (DLP)

Identity and Access Management (IAM)

  • IAM Concepts
  • IAM Technologies
  • IAM Best Practices

Incident Response and Management

  • Incident Response Overview
  • Developing an Incident Response Plan
  • Incident Handling and Recovery

Cyber Security Risk Management

  • Risk Management Basics
  • Risk Mitigation Strategies
  • Continuous Monitoring and Improvement

Emerging Threats and Technologies

  • Current and Emerging Threats
  • Emerging Technologies in Cyber Security
  • Future Trends in Cyber Security

Ethical Hacking

Getting Started With Ethical Hacking

  • Definition and importance
  • History of hacking and ethical hacking
  • Types of hackers: White Hat, Black Hat, Grey Hat
  • Laws and regulations
  • Code of ethics for ethical hackers
  • Case studies of ethical hacking

Footprinting and Reconnaissance

    • Passive and active reconnaissance
    • Footprinting tools and methodologies

Tools for Footprinting

  • WHOIS lookup
  • DNS enumeration
  • Network scanning tools

Scanning Networks

  • Types of scanning: port scanning, network scanning, vulnerability scanning
  • Techniques for scanning

Scanning Tools

  • Nmap
  • OpenVAS
  • Nessus

Enumeration Techniques

  • Network enumeration
  • Service enumeration

Tools for Enumeration

  • Netcat
  • SNMP enumeration tools
  • LDAP enumeration tools

Understanding System Hacking

  • Goals of system hacking
  • Types of system hacking

Techniques and Tools

  • Password cracking: John the Ripper, Hashcat
  • Privilege escalation
  • Rootkits and backdoors

Malware Threats

  • Types of malware: viruses, worms, Trojans, ransomware
  • Malware propagation techniques
  • Malware analysis tools
  • Anti-malware strategies

Sniffing

  • What is sniffing?
  • Types of sniffing: active, passive
  • Wireshark
  • Tcpdump
  • Man-in-the-Middle (MitM) attacks

Social Engineering

Social Engineering Fundamentals

  • Psychological principles of social engineering
  • Types of social engineering attacks

Tools and Techniques

  • Phishing
  • Pretexting
  • Baiting and tailgating

Denial of Service (DoS) Attacks

Understanding DoS and DDoS

  • Types of DoS attacks
  • Botnets and amplification attacks

Mitigation Strategies

  • DoS protection tools
  • Network configuration and defense mechanisms

Session Hijacking Techniques

  • Understanding session hijacking
  • Types of session hijacking: active, passive

Tools and Countermeasures

  • Session hijacking tools
  • Prevention strategies

Web Server Attacks

  • Types of web server attacks
  • Exploiting web server vulnerabilities

Tools and Techniques

  • Metasploit
  • Web server security tools

Module 12: Hacking Web Applications

  • Common vulnerabilities: SQL injection, XSS, CSRF
  • OWASP Top 10

Penetration Testing Tools

  • Burp Suite
  • OWASP ZAP

Understanding SQL Injection

  • Types of SQL injection attacks
  • Detection and exploitation

Tools and Techniques

  • SQLMap
  • Manual SQL injection methods

Hacking Wireless Networks

  • Types of wireless networks and security protocols
  • Wireless encryption standards

Attacking Wireless Networks

  • Wireless hacking tools: Aircrack-ng, Kismet
  • WPA/WPA2 cracking

Module 15: Mobile Platform Hacking

  • Mobile operating systems: Android, iOS
  • Common mobile vulnerabilities

Mobile Hacking Tools

  • Mobile penetration testing tools
  • Mobile security strategies

Evading IDS, Firewalls, and Honeypots

Intrusion Detection Systems (IDS) and Firewalls

  • Understanding IDS and firewalls
  • Techniques for evasion

Honeypots

  • Types and purpose of honeypots
  • Detecting and evading honeypots

Cloud Computing and Security

Cloud Computing Fundamentals

  • Cloud service models
  • Cloud security challenges

Attacking and Securing Cloud Environments

  • Cloud penetration testing tools
  • Cloud security best practices

Cryptography

Cryptographic Concepts

  • Basics of encryption and decryption
  • Types of cryptographic algorithms

Cryptographic Attacks

  • Types of cryptographic attacks
  • Tools and techniques

Ethical Hacking Tools and Frameworks

  • Kali Linux
  • Metasploit Framework
  • Setup and configuration
  • Practical usage scenarios

Course Fees

Cybersecurity Fundamentals

Cover every aspect of Cybersecurity basics modules

N500, 000

$500

3 Months

Enroll Now

Cybersecurity Advanced

Covers Cybersecurity basics and advanced topics

N900, 000

$800

5 Months

Enroll Now

Cybersecurity + DevOps

Covers all Cybersecurity modules + DevOps modules

N1200, 000

$1,000

5 Months

Enroll Now

Frequently Asked Question

Q1. Why should I take your training?


Q2. How can I start?


Q3.Is the training practical and suitable for beginners?


Q4. Can I participate in the training programs remotely?


Q5. Is it necessary to bring my own laptop for the training?


Q6. Can working-class people take the training?


Q7. Is there installmental payment?


Q8. Will I receive a certificate after the training?


Q9. Do you provide support after the training?


Q10. Can I expect immediate job placement upon completing the training?