What is Cybersecurity
Cyber security is a discipline that covers how to defend devices and services from electronic attacks by nefarious actors such as hackers, spammers, and cybercriminals. While some components of cyber security are designed to strike first, most of today’s professionals focus more on determining the best way to defend all assets, from computers and smartphones to networks and databases, from attacks.
Importance of Cybersecurity
In today’s digital world, one cannot ignore cybersecurity. One single security breach can lead to exposing the personal information of millions of people. These breaches have a strong financial impact on the companies and also loss of the trust of customers. Hence, cyber security is very essential to protect businesses and individuals from spammers and cyber criminals.
Cybersecurity course outline
In this course, you will learn the following:
Week 1: FUNDAMENTAL OF CYBERSECURITY
- Introduction to cybersecurity
- Cyber security roles and processes
- Cybersecurity principles and policies
- Cyber security compliance framework
- Cyber safety and security
- Cyber security tools and their uses Week 2: NETWORK AND SYSTEM SECURITY
- Understanding the Local area network
- Data transfer on LANS
- Understanding OSI model
- Understanding wireless networks
- Understanding Internet Protocol Version 4
- Introduction to network security and its tools
Week 3: Capture the flag and Hacking competition
Week 4: bash scripting and Linux System Administration
- Introduction to bash scripting, setup and Navigation
- Working with files and folders
- Text files, users and programming
- Bash shortcuts
- Working with bash files and programming
- Course assessment
Week 5: WEB APPLICATION SECURITY
- Introduction to web application security
- Web security issues and secure programming
- Web application vulnerabilities
- Classified web application attacks and defense mechanisms
- Redirects, clickjacking and secure programming
- Authentication vulnerabilities
- Course assessment
Week 6: Capture the flag and Hacking competition 2 Week 7: MOBILE SECURITY
- Android mobile security
- Interacting with android
- Hands-on android security
- Attacking android platform
- Android malware battles
- Course summary
- Course assessment
Week 8: PENETRATION TESTING / ETHICAL HACKING
- Introduction to penetration testing/ethical hacking
- Reconnaissance
- Scanning
- Exploitation
- Maintaining access
- Covering of track
- Report and documentation Week 9: ACTIVE DIRECTORY
- Definition of key component
- Tools for active directory pen testing and it’s uses
- Base Linux machine toolkits
- Window box tools
- Active directory enumeration
- Active directory cheat sheet of command and tips
- Reporting and documentation
Week 10 : Advance hacking competition
Week 11: AUTOMATION WITH PYTHON
- Python setup and components
- Basic python commands and scripting
- Creating a basic python network Recon framework
- Python spy- Web Recon
- Python for pentester- First assessment
- The password cracker – working with brute-force tools
- Evade anti-virus with python
- Python forensics – using python scripts for network investigation
- Python for databases and wrapping up
- Second assessment
- Course assessment
Week 12: PROJECT AND DEFENSE
Course FEES: N200.000
Do you need online classes, Join the Online School
Click below to join the Online LIVE School