Cyber Security Training in Port Harcourt

Join our Cybersecurity Course and gain hands-on skills

Course Objective:

This course provides a comprehensive overview of cybersecurity concepts, practices, and technologies, starting from foundational principles to advanced techniques. Students will learn to identify, assess, and mitigate cybersecurity threats across various domains, including networks, systems, applications, and data. Through a combination of theoretical lectures, practical demonstrations, and hands-on exercises, participants will develop the necessary skills to protect digital assets and enhance cybersecurity posture in both personal and organizational contexts.

This course provides a comprehensive review of information systems security concepts, industry best practices and terminology, covering the twelve modules below:

FOUNDATION:

Network Security

– Basics of Networking (IP, TCP/IP, DNS, Firewalls, VPNs)
– Common Network Threats (MITM, DDoS, Sniffing)
– Securing Networks with Firewalls & Intrusion Detection Systems (IDS)
– Hands-on: Setting Up a Basic Firewall and Packet Analysis with Wireshark

Endpoint Security

– Understanding Endpoints (Workstations, Mobile, IoT)
– Common Endpoint Threats (Malware, Ransomware, Phishing)
– Endpoint Protection Solutions (Antivirus, EDR, DLP)
– Hands-on: Configuring Endpoint Security Software & Conducting Malware Scans

Offensive Security (Ethical Hacking)

– Understanding Ethical Hacking & Pentesting Methodology
– Basics of Reconnaissance & Footprinting
– Common Exploits (SQL Injection, XSS, Buffer Overflow)
– Hands-on: Using Kali Linux for Basic Scanning (Nmap, Metasploit)

Defensive Security (Blue Teaming)

– Security Monitoring & Incident Detection (SIEM, Log Analysis)
– Security Policies & Compliance (ISO 27001, NIST)
– Incident Response Basics (SOC Operations)
– Hands-on: Setting Up a SIEM (e.g., Splunk, ELK) & Analysing Logs

Incident Response & Digital Forensics

– Incident Response Lifecycle (Preparation, Detection, Containment, Eradication, Recovery)
– Basics of Digital Forensics (File System Analysis, Memory Forensics)
– Hands-on: Capturing and Analysing Logs from a Cyber Incident

Malware Analysis & Reverse Engineering

– Types of Malwares & Their Behaviours – Static & Dynamic Malware Analysis Techniques
– Basics of Reverse Engineering (Disassemblers, Debuggers)
– Hands-on: Analysing a Malware Sample in a Safe Lab Environment

Threat Intelligence & Cyber Threat Hunting

– Understanding Threat Intelligence (TTPs, Cyber Kill Chain, MITRE ATT&CK)
– Proactive Threat Hunting Techniques
– Threat Intelligence Sources & Tools (OSINT, VirusTotal, Threat Feeds)
– Hands-on: Conducting a Threat Hunt Using Open-Source Tools

Cost & Duration:

FOUNDATION: N250,000 (2 Months)
INTERMEDIATE: N400,000 (3 Months)

INTERMEDIATE (HANDS-ON):

Vulnerability Management

Vulnerabilities are the weaknesses in our systems which hackers use to attack the system. We’ll start this lesson by learning how to scan for vulnerabilities using automated tools. Then we will learn how to manage any found vulnerabilities in a central dashboard, prioritize them based on risk levels, and track response efforts and management decisions. We’ll also learn how to manually calculate risk scores and assign risk ratings to the vulnerabilities. We’ll conclude the lesson with a discussion of false positives and false negatives.

System Auditing

In this lesson, we will learn how to read a test scope document and start gathering information about our target system. We will learn how to research the vulnerabilities find their exploits and how to validate the vulnerabilities by executing an exploit. Then we’ll learn how to prepare a report on our findings. We will end this lesson with a discussion about why some exploits are intentionally written with bugs.

Application Auditing

We will start learning about application auditing by looking at the OWASP Web Security Testing Guide and how it can be used in our testing. Next, we will learn how to send requests to a web application and analyse the response that comes back. We will use semi-automated tools to increase the efficiency and accuracy of our tests. We’ll also use fully automated tools to perform specific tasks to create output we can use in further testing. Finally, we’ll look at other systems and products that are vulnerable to hacking.

Social Engineering

In this lesson, we will take a look at the human side of Ethical Hacking. We will begin with a discussion of five opportunities in human psychology that hackers use to manipulate our employees. Then we will learn how to perform an enterprise-level phishing simulation and create malware. We will also learn how to create an effective landing page for social engineering attempts. We will wrap up our lesson with a discussion about the ethics of social engineering.

Open-Source Intelligence (OSINT)

We’ll start gathering open-source intelligence by using Exploratory Link Analysis. Next, we’ll learn how to do data mining. After we have gathered information, we will start grouping information and building links using a tool called Maltego. Then we will learn how to analyse the links and relationships we have established to create new information and draw conclusions based on the information we have uncovered. We will end the lesson with a brief discussion about using OSINT to uncover a hacker’s identity.

Benefits of learning Cyber Security:

PREREQUISITE:

Application form

Training Enrolment Form
First
Last
click to choose
How did you hear about us?
Gender
Posted in Security Training

Leave a Comment