Master the Essentials of Cybersecurity and Secure the Digital Future!
Cybersecurity is crucial to safeguarding our networks, computers, and sensitive data from cyberattacks and unauthorized access. Our comprehensive cybersecurity course equips professionals with the knowledge and tools to detect, prevent, and respond to cybersecurity threats. From identifying vulnerabilities to implementing protective measures, this course covers all aspects of cybersecurity. With hands-on practice, students learn to protect their work with robust passwords and apply multiple security models and systems to keep their systems safe. Join us today to get started on your journey into the world of cybersecurity!.
Duration:
2 Months
Learning Options:
On-Campus
Course Fee:
₦200,000 ₦140,000
Prerequisite:
None
Next Start Date:
Certification:
- Cisco CyberOps Associate
- Cisco CyberOps Professional
- CCNP
- CCIE
Course Outline
Cyber security and the Security Operations Center
Explain the role of the Cyber security Operations Analyst in the enterprise.
Explain why networks and data are attacked.
Explain how to prepare for a career in Cyber security operations.
Windows Operating System
Explain the Windows Operating System features and characteristics needed to
support cyber security analyses.
Explain the operation of the Windows Operating System.
Explain how to secure Windows endpoints.
Linux Operating System
Explain the features and characteristics of the Linux Operating System.
Perform basic operations in the Linux shell.
Perform basic Linux administration tasks.
Network Protocols and Services
Analyze the operation of network protocols and services.
Explain how the Ethernet and IP protocols support network communications and
operations
Explain how network services enable network functionality.
Network Infrastructure
Explain network topologies and the operation of the network infrastructure.
Explain how network devices enable wired and wireless network communication.
Explain how devices and services are used to enhance network security.
Principles of Network Security
Classify the various types of network attacks.
Explain how networks are attacked.
Explain the various types of threats and attacks.
Network Attacks: A Deeper Look
Use network monitoring tools to identify attacks against network protocols and
services.
Explain network traffic monitoring.
Explain how TCP/IP vulnerabilities enable network attacks.
Explain how common network applications and services are vulnerable to attack.
Protecting the Network
Use various methods to prevent malicious access to computer networks, hosts, and
data.
Explain approaches to network security defense.
Use various intelligence sources to locate current security threats.
Cryptography and the Public Key Infrastructure
Explain the impacts of cryptography on network security monitoring.
Use tools to encrypt and decrypt data.
Explain how the public key infrastructure (PKI) supports network security.
Endpoint Security and Analysis
Explain endpoint vulnerabilities and attacks investigation process.
Use tools to generate a malware analysis report.
Classify endpoint vulnerability assessment information.
Security Monitoring
Evaluate network security alerts.
Explain how security technologies affect security monitoring.
Explain the types of log files used in security monitoring.
Intrusion Data Analysis
Analyze network intrusion data to identify compromised hosts and vulnerabilities.
Explain how security-related data is collected.
Analyze intrusion data to determine the source of an attack.
Incident Response and Handling
Explain how network security incidents are handled by CSIRTs.
Apply incident response models, such as NIST 800-61r2 to a security incident.