Cybersecurity Training” right from the start:
Explore our Cybersecurity Training program, where you’ll gain a deep understanding of essential cybersecurity principles, concepts, and terminology. This expert-led Cybersecurity Training is designed to equip you with the skills needed to effectively protect digital assets and advance your career in cybersecurity.
Course schedule and outline: The course is application-based, offering live, thorough, and intensive tutor-led sessions from November 27th to 30th of January 2025, every Wednesday and Thursday from 10am to 4pm for Midweek Candidates and November 30th to 2nd of February 2025, every Saturday and Sunday from 10am to 4pm for Weekend Candidates. The training is designed for candidates with little or no prior knowledge.
Learning Objectives
1. Gain a comprehensive understanding of cybersecurity principles, concepts, and terminology through our Cybersecurity Training, empowering you to effectively protect digital assets. This Cybersecurity Training will equip you with the knowledge needed to safeguard your organization’s information
2. Develop proficiency in identifying cyber threats and vulnerabilities across various network environments.
3. Explore the fundamentals of ethical hacking and penetration testing to assess and strengthen cybersecurity defenses.
4. Acquire hands-on experience with industry-standard cybersecurity tools and technologies used for threat detection and mitigation.
5. Demonstrate mastery of cybersecurity concepts through practical exercises, projects, and presentations, showcasing your ability to analyze and address security challenges effectively.
Eligibility:
Basic computer skills
Minimum System Requirements:
- Windows PC and Mac PCs are supported
- Minimum hardware specifications required for virtual labs:
- 8GB RAM
- 256GB SSD storage
- Intel Core i5 processor or higher
Course Outline
![]()
Module 1: Introduction & General Security Concepts
Introduction & General Security Concepts
Compare and contrast various types of security controls.
Summarize fundamental security concepts.
![]()
Module 2: Threats, Vulnerabilities & Mitigation
Explain common threat vectors and attack surfaces.
Compare and contrast common threat actors and motivations.
Explain the various types of vulnerabilities.
![]()
Module 3: Security Architecture
Compare and contrast security implications of different architecture models.
Given a scenario, apply security principles to secure enterprise infrastructure.
Compare and contrast concepts and strategies to protect data.
![]()
Module 4: Security Operations
Given a scenario, apply common security techniques to computing resources.
Explain the security implications of proper hardware, software, and data asset management.
Explain various activities associated with vulnerability management.
Explain security alerting and monitoring concepts and tools.
![]()
Module 5: Security Program Management & Oversight
Summarize elements of effective security governance.
Explain elements of the risk management process.
Explain the processes associated with third-party risk assessment and management.
Cost:
₦400,000
PROMO! PROMO!! PROMO!!!
We’re offering you a special promotion: instead of paying ₦400,000, you only pay ₦200,000*. A minimum payment of ₦150,000 is required for candidates to begin their training on November 2nd.
*Use the pre-enrollment form below to register your interest before the end of the promo and get a special onetime payment and installment option that comes in the mail after completing the form below as PROMO ENDS IN:
