Introduction:
This course is designed for individuals seeking a comprehensive understanding of cybersecurity, from foundational concepts to advanced threats and defensive strategies. Through a blend of interactive lectures, hands-on labs, real-world case studies, and practical projects, participants will gain the knowledge and skills necessary to secure data and systems in today’s ever-evolving digital landscape.
Target Audience:
- Businesses interested in protecting their data and online safety
- Aspiring cybersecurity professionals
- IT professionals seeking to enhance their security skillset
Course Duration:
16 Week Program
Price:
₦1,200,000
Course Format:
- Virtual Training: Engaging and informative presentations and in-person video lectures delivered by cybersecurity experts.
- Interactive Labs: Hands-on exercises to apply security concepts in simulated environments.
- Real-World Case Studies: Analyzing successful cyberattacks and their consequences.
Course Outline:
Module 1: Introduction to Cybersecurity
- Understanding the cybersecurity landscape: threats, vulnerabilities, and attack vectors.
- The importance of cybersecurity for individuals and organizations.
- Introduction to the CIA triad (Confidentiality, Integrity, Availability) in cybersecurity
Module 2: Core Security Concepts
- Network security fundamentals: TCP/IP, network protocols, and network devices.
- Operating system security concepts: user accounts, permissions, and access control.
- Cryptography basics: encryption, decryption, and key management.
Module 3: Cybersecurity Threats and Attacks
- Demystifying common cyber threats: Malware (viruses, worms, ransomware).
- Exploring social engineering tactics and phishing scams.
- Understanding network security vulnerabilities and attack vectors (DoS, SQL injection).
Module 4: Cybersecurity Best Practices and Controls
- Implementing preventative security measures: firewalls, intrusion detection systems (IDS), and anti-malware software.
- Network segmentation and access control for improved security.
- Importance of strong passwords, multi-factor authentication (MFA), and secure configurations.
Module 5: User Security Awareness
- Identifying phishing attempts and social engineering tactics.
- Safe browsing practices and secure online habits.
- Securing personal devices and online accounts.
Module 6: Data Storytelling (The Power of Narrative)
- Explain the art of data storytelling: crafting a narrative using data to engage the audience and influence decisions.
- Discuss the key elements of a compelling data story (context, evidence, insights, recommendations).
- Cover effective communication techniques for presenting data insights clearly and concisely.
Activities:
- Interactive exercises on identifying the elements of a strong data story.
- Group projects on developing data stories from provided datasets.
- Peer-review sessions on refining data storytelling techniques.
Phase 2:
Module 6: Security Assessments and Vulnerability Management
- Identifying vulnerabilities in systems and networks using vulnerability scanners.
- Penetration testing methodologies and ethical hacking practices.
- Risk assessment frameworks and vulnerability prioritization techniques.
Module 7: Network Security
- Firewalls: configurations, types (stateful, packet filtering), and advanced features.
- Intrusion Detection/Prevention Systems (IDS/IPS): functionalities and deployment strategies.
- Wireless network security: securing Wi-Fi networks and access points (WPA2, WPA3).
Module 8: System and Application Security
- Operating system hardening: securing user accounts, permissions, and system configurations.
- Application security best practices: secure coding principles and vulnerabilities.
- Secure coding fundamentals (optional): common vulnerabilities and coding practices for mitigation
Module 9: Incident Response and Recovery
- Developing a cybersecurity incident response plan: detection, containment, eradication, and recovery procedures.
- Digital forensics basics: preserving evidence and conducting investigations after a cyberattack.
- Importance of reporting cyberattacks to appropriate authorities.
Phase 3:
Module 10: Cloud Security
- Security considerations for cloud computing platforms (AWS, Azure, GCP).
- Cloud security models: shared responsibility model, and securing cloud resources.
- Cloud security best practices: data encryption, access control, and incident response in the cloud.
Module 11: Web Application Security
- Common web application vulnerabilities (OWASP Top 10).
- Web application security testing (WAST) tools and methodologies.
- Secure coding practices for web developers.
Module 12: Security Operations Center (SOC)
- Understanding the role of SOC in cybersecurity operations.
- Security information and event management (SIEM) systems.
- Incident response procedures and threat hunting techniques
Module 13: Cryptography and Data Security
- Advanced encryption algorithms (AES, RSA) and key management techniques.
- Data security best practices: data encryption at rest and in transit.
- Understanding