472 NNEBISI ROAD, ASABA DELTA STATE
CYBER SECURITY ASSOCIATE
TRAINING PROSPECTUS
COURSE TITLE: Cyber Security Associate
DURATION: 3 Months
LEARNING OPTIONS: Class Room - Interactive Mode
COURSE FEE: ₦220,.000
CLASS ENGAGEMENT SCHEDULE: 3 Times a week 2hrs per lecture contact
PREREQUISITE: Cyber Security Essentials
ABOUT THE COURSE:
This is an advancement on Cyber Security Essentials. Topics under this Module provides comprehensive
view to intermediate /advance cybersecurity concepts, including foot printing and reconnaissance,
Scanning and enumeration, social engineering, Web servers & web application security, Phishing
techniques & open-source intelligence gathering, Cryptography and Wireless networks security
COURSE MOUDLES
Module 1 Overview of cybersecurity Essentials
• Understanding the significance of cybersecurity
• Types of cyber threat
• Network basics
• Installations and setup of all tools required in course of study.
• Networking protocols (TCP/IP, DNS, HTTP/HTTPS)
• IP Addressing and Subnetting
Module 2: Information gathering (foot printing and reconnaissance)
• Open Source Intelligence (OSINT)
• Passive Information Gathering
• Active Information Gathering
• DNS Enumeration
• WHOIS Data Collection
Module 3: Scanning and enumeration
• Port Scanning Techniques
• Service Enumeration
• Vulnerability Scanning
• Banner Grabbing
• SNMP Enumeration
Module 4: Social engineering
• Privilege Escalation
• Backdoors and Logic Bombs
• Rootkits and Trojans
• Post-Exploitation Activities
Module 5: Web servers & web application security
• Web Server Enumeration
• Web Application Vulnerabilities
• Cross-Site Scripting (XSS)
• Cross-Site Request Forgery (CSRF)
• SQL Injection Basics
Module 6: Phishing techniques & open-source intelligence gathering
• Firewall Evasion Methods
• Honeypots and Honeynets
• Packet Fragmentation
• Protocol Tunneling
• Spoofing and Masquerading
• Encrypted Attacks
Module 7: Cryptography
• Symmetric Key Cryptography
• Asymmetric Key Cryptography
• Public Key Infrastructure (PKI)
• Secure Key Exchange
• Applications of Cryptography
Module 8: Wireless networks security
• Wireless Network Basics
• Wi-Fi Security Protocols (WEP, WPA, WPA2, WPA3)
• Wireless Network Authentication Methods
• Wireless Access Point (AP) Security
• Rogue Access Point Detection
COURSE SUMMARY
Cybersecurity: Protecting the Digital World
While software developers build things, cybersecurity experts protect them. They’re like the security
guards of the digital world, defending against cyberattacks like hackers.
Imagine your online bank account. Cybersecurity professionals work hard to protect your money and
personal information from being stolen. They identify vulnerabilities in systems, develop security
measures, and respond to cyberattacks when they happen.
Key skills:
• Problem-solving: Identifying and fixing security weaknesses.
• Technical knowledge: Understanding how systems and networks work.
• Analytical thinking: Identifying patterns and threats.
• Communication: Explaining complex security issues to others.