Course Overview
This comprehensive IT security training program covers the fundamentals of cybersecurity, risk assessment, security policies, incident response, and security technologies and a practical training program covering the fundamentals of information security, risk assessment, security policies, incident response, and compliance with relevant regulations. Participants will learn to identify and mitigate cyber threats, protect valuable data and systems, develop effective cybersecurity strategies, implement effective security measures and develop strategies to safeguard valuable information assets and protect against potential cyber threats.
What you’ll learn
- Understand the importance of cybersecurity in protecting against cyber threats and attacks.
- Learn the key concepts and principles of cybersecurity, including the CIA triad (Confidentiality, Integrity, and Availability).
- Develop skills in assessing and managing cybersecurity risks effectively.
- Design and implement security policies, standards, and procedures to guide cybersecurity practices.
- Acquire techniques for responding to cybersecurity incidents and planning for recovery.
- Explore network security technologies and best practices for securing networks.
- Understand how to detect and analyze malware and cyber threats.
- Learn about cryptographic techniques for securing data and communications.
- Understand the importance of information security and its role in protecting organizational assets.
- Learn the key concepts and principles of information security.
- Develop skills in assessing and managing information security risks effectively.
- Design and implement security policies, standards, and procedures to guide information security practices.
- Acquire techniques for responding to security incidents and planning for disaster recovery.
- Explore various cybersecurity technologies and tools for threat detection and prevention.
- Understand the importance of compliance with relevant laws, regulations, and industry standards.
- Develop a culture of security awareness and provide training to employees on information security best practices.
Requirements
- We recommend a basic competence in computing, especially networking basics.
- Basic proficiency in the English language, numeracy and computer literacy.
- Candidates must have access to either a computer or smartphone with internet connectivity.
- Candidates must be equipped with quality webcam and headphones.
Duration & Fees
- Regular Course – 12 Weeks – ₦400,000
- Personalized Training – 8 Weeks – ₦500,000
Program Dates
- Cohort Y253 – September – November, 2025
- Cohort Y261 – February – April, 2026
- Cohort Y262 – June – August, 2026
Curriculum
- 2 Sections
- 12 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Cybersecurity8 Modules8
- 1.1Module 1 – Introduction to Cybersecurity
- 1.2Module 2 – Cybersecurity Fundamentals
- 1.3Module 3 – Risk Assessment and Management
- 1.4Module 4 – Security Policies and Procedures
- 1.5Module 5 – Incident Response and Recovery
- 1.6Module 6 – Network Security
- 1.7Module 7 – Malware Analysis and Threat Detection
- 1.8Module 8 – Cryptography and Data Protection
- IT Security Management4