Home > Cybersecurity

Cybersecurity

Learn to develop innovative processes and tools to protect systems, networks, and programs from digital malicious attacks, fostering a safer digital world for all.

NGN 192,000     NGN 320,000      40% Discount

Get free Consultation

1 Step 1
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right
FormCraft - WordPress form builder

Format

Live Virtual Classes

Next start date

Reg start: 20-05-2025
Reg end: 09-06-2025

Schedule

Twice on weekdays 10am-12pm
Once on weekends 10am-2pm

Duration

3 months

Our Curriculum
Includes:

What you will learn during the training

Introduction to cybersecurity

  • Understanding the significance of cybersecurity
  • Types of cyber threat
  • Network basics
  • Installations and setup of all tools required in course of study.
  • Networking protocols (TCP/IP, DNS, HTTP/HTTPS)
  • IP Addressing and Subnetting

Information gathering (footprinting and reconnaissance)

  • Open Source Intelligence (OSINT)
  • Passive Information Gathering

  • Active Information Gathering

  • DNS Enumeration

  • WHOIS Data Collection

  •  

Scanning and enumeration

  • Port Scanning Techniques

  • Service Enumeration

  • Vulnerability Scanning

  • Banner Grabbing

  • SNMP Enumeration

Social engineering

  • Privilege Escalation

  • Backdoors and Logic Bombs

  • Rootkits and Trojans

  • Post-Exploitation Activities

Web servers & web application security

  • Web Server Enumeration

  • Web Application Vulnerabilities

  • Cross-Site Scripting (XSS)

  • Cross-Site Request Forgery (CSRF)
  • SQL Injection Basics

Phishing techniques & open-source intelligence gathering

  • Firewall Evasion Methods

  • Honeypots and Honeynets

  • Packet Fragmentation

  • Protocol Tunneling

  • Spoofing and Masquerading

  • Encrypted Attacks

Cryptography

  • Symmetric Key Cryptography

  • Asymmetric Key Cryptography

  • Public Key Infrastructure (PKI)

  • Secure Key Exchange

  • Applications of Cryptography

Wireless networks security

  • Wireless Network Basics

  • Wi-Fi Security Protocols (WEP, WPA, WPA2, WPA3)

  • Wireless Network Authentication Methods

  • Wireless Access Point (AP) Security

  • Rogue Access Point Detection

Artificial Intelligence (AI) concepts and tools

  • Throughout this course, you will be introduced to Artificial Intelligence (AI) concepts and tools that can enhance your productivity and workflow. You will learn how to leverage AI to automate tasks, gain insights, and improve overall efficiency.
  • Your instructor will guide you through the exploration of various AI tools and technologies, tailored to the specific needs and goals of the course. This hands-on experience will enable you to develop practical skills and apply AI solutions to real-world problems.
Scroll to Top