Course schedule and outline: The course is application-based, offering live, thorough, and intensive tutor-led sessions from February 5th to May 6th, 2025, every Wednesday and Thursday from 10 am to 4 pm. The training is designed for candidates with little or no prior knowledge..
Learning Objectives
1. Gain a comprehensive understanding of cybersecurity principles, concepts, and terminology to effectively protect digital assets.
2. Develop proficiency in identifying cyber threats and vulnerabilities across various network environments.
3. Explore the fundamentals of ethical hacking and penetration testing to assess and strengthen cybersecurity defenses.
4. Acquire hands-on experience with industry-standard cybersecurity tools and technologies used for threat detection and mitigation.
5. Demonstrate mastery of cybersecurity concepts through practical exercises, projects, and presentations, showcasing your ability to analyze and address security challenges effectively.
Eligibility:
Basic computer skills
Minimum System Requirements:
- Windows PC and Mac PC
- Minimum hardware specifications required for virtual labs:
- 8GB RAM
- 256GB SSD storage
- Intel Core i5 processor or higher
Course Outline
Module 1: Introduction & General Security Concepts
Introduction & General Security Concepts
Compare and contrast various types of security controls.
Summarize fundamental security concepts.
Module 2: Threats, Vulnerabilities & Mitigation
Explain common threat vectors and attack surfaces.
Compare and contrast common threat actors and motivations.
Explain the various types of vulnerabilities.
Module 3: Security Architecture
Compare and contrast security implications of different architecture models.
Given a scenario, apply security principles to secure enterprise infrastructure.
Compare and contrast concepts and strategies to protect data.
Module 4: Security Operations
Given a scenario, apply common security techniques to computing resources.
Explain the security implications of proper hardware, software, and data asset management.
Explain various activities associated with vulnerability management.
Explain security alerting and monitoring concepts and tools.
Module 5: Security Program Management & Oversight
Summarize elements of effective security governance.
Explain elements of the risk management process.
Explain the processes associated with third-party risk assessment and management.
Cost:
₦400,000
PROMO! PROMO!! PROMO!!!
We’re offering you a PROMO so instead of paying ₦400,000, you pay ₦200,000*. A minimum payment of ₦150,000 is required for candidates to commence their training on the February 5th.
*Use the pre-enrollment form below to register your interest before the end of the promo and get a special onetime payment and installment option that comes in the mail after completing the form below as PROMO ENDS IN: