Tuesdays and Thursdays
60 days
6 weeks of Intensive Tutor-led sessions + Project work, Mentorship and Portfolio Dev
National Agricultural Insurance Cooperation (NAIC Building) central business district, turning before Churchgate Building.
Google map here

4.5 10 ratings…

Course schedule and outline: The course is application-based training and candidates will experience Live, thorough, intensive tutor-led sessions from 4th of June till 1st of August 2024, every Tuesday and Thursday in that period from 10 am to 4 pm.
The training is designed for candidates with little or no knowledge.

Learning Objectives

    1. Gain a comprehensive understanding of cybersecurity principles, concepts, and terminology to effectively protect digital assets.

    2. Develop proficiency in identifying cyber threats and vulnerabilities across various network environments.

    3. Explore the fundamentals of ethical hacking and penetration testing to assess and strengthen cybersecurity defenses.

    4. Acquire hands-on experience with industry-standard cybersecurity tools and technologies used for threat detection and mitigation.

    5. Demonstrate mastery of cybersecurity concepts through practical exercises, projects, and presentations, showcasing your ability to analyze and address security challenges effectively.

Eligibility:

Basic computer skills

Minimum System Requirements:

  • Windows PC (Mac PCs not supported)
  • Minimum hardware specifications required for virtual labs:
  • 8GB RAM
  • 256GB SSD storage
  • Intel Core i5 processor or higher

Course Outline

Module 1: Introduction & General Security Concepts

Introduction & General Security Concepts
Compare and contrast various types of security controls.
Summarize fundamental security concepts.

Module 2: Threats, Vulnerabilities & Mitigation

Explain common threat vectors and attack surfaces.

Compare and contrast common threat actors and motivations.

Explain the various types of vulnerabilities.

Module 3: Security Architecture

Compare and contrast security implications of different architecture models.

Given a scenario, apply security principles to secure enterprise infrastructure.

Compare and contrast concepts and strategies to protect data.

Module 4: Security Operations

Given a scenario, apply common security techniques to computing resources.

Explain the security implications of proper hardware, software, and data asset management.

Explain various activities associated with vulnerability management.

Explain security alerting and monitoring concepts and tools.

Module 5: Security Program Management & Oversight

Summarize elements of effective security governance.

Explain elements of the risk management process.

Explain the processes associated with third-party risk assessment and management.

Cost:

₦400,000

PROMO! PROMO!! PROMO!!!

We’re offering you a PROMO so instead of paying 400,000, you pay ₦200,000*. A minimum payment of ₦150,000 is required for candidates to commence their training on the 4th of June.


*Use the pre-enrollment form below to register your interest before the end of the promo and get a special onetime payment and installment option that comes in the mail after completing the form below as PROMO ENDS IN: