Course Overview
This comprehensive IT security training program covers the fundamentals of cybersecurity, risk assessment, security policies, incident response, and security technologies and a practical training program covering the fundamentals of information security, risk assessment, security policies, incident response, and compliance with relevant regulations. Participants will learn to identify and mitigate cyber threats, protect valuable data and systems, develop effective cybersecurity strategies, implement effective security measures and develop strategies to safeguard valuable information assets and protect against potential cyber threats.
What you’ll learn
- Understand the importance of cybersecurity in protecting against cyber threats and attacks.
- Learn the key concepts and principles of cybersecurity, including the CIA triad (Confidentiality, Integrity, and Availability).
- Develop skills in assessing and managing cybersecurity risks effectively.
- Design and implement security policies, standards, and procedures to guide cybersecurity practices.
- Acquire techniques for responding to cybersecurity incidents and planning for recovery.
- Explore network security technologies and best practices for securing networks.
- Understand how to detect and analyze malware and cyber threats.
- Learn about cryptographic techniques for securing data and communications.
- Understand the importance of information security and its role in protecting organizational assets.
- Learn the key concepts and principles of information security.
- Develop skills in assessing and managing information security risks effectively.
- Design and implement security policies, standards, and procedures to guide information security practices.
- Acquire techniques for responding to security incidents and planning for disaster recovery.
- Explore various cybersecurity technologies and tools for threat detection and prevention.
- Understand the importance of compliance with relevant laws, regulations, and industry standards.
- Develop a culture of security awareness and provide training to employees on information security best practices.
Requirements
- We recommend a basic competence in computing, especially networking basics.
- Basic proficiency in the English language, numeracy and computer literacy.
- Candidates must have access to either a computer or smartphone with internet connectivity.
- Candidates must be equipped with quality webcam and headphones.
Duration & Fees
- Regular Course – 12 Weeks – ₦400,000
- Personalized Training – 8 Weeks – ₦500,000
Program Dates
- Cohort Y261: February – April, 2026
- Cohort Y262: June – August, 2026
- Cohort Y263: October – December, 2026
Curriculum
- 2 Sections
- 12 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Cybersecurity8 Modules8
- 1.1Module 1 – Introduction to Cybersecurity1.2Module 2 – Cybersecurity Fundamentals1.3Module 3 – Risk Assessment and Management1.4Module 4 – Security Policies and Procedures1.5Module 5 – Incident Response and Recovery1.6Module 6 – Network Security1.7Module 7 – Malware Analysis and Threat Detection1.8Module 8 – Cryptography and Data ProtectionIT Security Management4
- 2.1Module 1 – Introduction to Information Security2.2Module 2 – Information Security Fundamentals2.3Module 3 – Compliance and Legal Considerations2.4Module 4 – Security Awareness and Training



