0% found this document useful (0 votes)
25 views3 pages

Cyber Security Prospectus Associte

Hi

Uploaded by

dexdeeintegrated
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views3 pages

Cyber Security Prospectus Associte

Hi

Uploaded by

dexdeeintegrated
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

472 NNEBISI ROAD, ASABA DELTA STATE

CYBER SECURITY ASSOCIATE


TRAINING PROSPECTUS
COURSE TITLE: Cyber Security Associate
DURATION: 3 Months

LEARNING OPTIONS: Class Room - Interactive Mode

COURSE FEE: ₦220,.000

CLASS ENGAGEMENT SCHEDULE: 3 Times a week 2hrs per lecture contact

PREREQUISITE: Cyber Security Essentials

ABOUT THE COURSE:

This is an advancement on Cyber Security Essentials. Topics under this Module provides comprehensive
view to intermediate /advance cybersecurity concepts, including foot printing and reconnaissance,
Scanning and enumeration, social engineering, Web servers & web application security, Phishing
techniques & open-source intelligence gathering, Cryptography and Wireless networks security

COURSE MOUDLES

Module 1 Overview of cybersecurity Essentials

• Understanding the significance of cybersecurity

• Types of cyber threat

• Network basics

• Installations and setup of all tools required in course of study.

• Networking protocols (TCP/IP, DNS, HTTP/HTTPS)


• IP Addressing and Subnetting

Module 2: Information gathering (foot printing and reconnaissance)

• Open Source Intelligence (OSINT)

• Passive Information Gathering

• Active Information Gathering

• DNS Enumeration

• WHOIS Data Collection

Module 3: Scanning and enumeration

• Port Scanning Techniques

• Service Enumeration

• Vulnerability Scanning

• Banner Grabbing

• SNMP Enumeration

Module 4: Social engineering

• Privilege Escalation

• Backdoors and Logic Bombs

• Rootkits and Trojans

• Post-Exploitation Activities

Module 5: Web servers & web application security

• Web Server Enumeration

• Web Application Vulnerabilities

• Cross-Site Scripting (XSS)

• Cross-Site Request Forgery (CSRF)

• SQL Injection Basics

Module 6: Phishing techniques & open-source intelligence gathering

• Firewall Evasion Methods

• Honeypots and Honeynets

• Packet Fragmentation

• Protocol Tunneling
• Spoofing and Masquerading

• Encrypted Attacks

Module 7: Cryptography

• Symmetric Key Cryptography

• Asymmetric Key Cryptography

• Public Key Infrastructure (PKI)

• Secure Key Exchange

• Applications of Cryptography

Module 8: Wireless networks security

• Wireless Network Basics

• Wi-Fi Security Protocols (WEP, WPA, WPA2, WPA3)

• Wireless Network Authentication Methods

• Wireless Access Point (AP) Security

• Rogue Access Point Detection

COURSE SUMMARY

Cybersecurity: Protecting the Digital World


While software developers build things, cybersecurity experts protect them. They’re like the security
guards of the digital world, defending against cyberattacks like hackers.

Imagine your online bank account. Cybersecurity professionals work hard to protect your money and
personal information from being stolen. They identify vulnerabilities in systems, develop security
measures, and respond to cyberattacks when they happen.

Key skills:

• Problem-solving: Identifying and fixing security weaknesses.

• Technical knowledge: Understanding how systems and networks work.

• Analytical thinking: Identifying patterns and threats.

• Communication: Explaining complex security issues to others.

You might also like