digitalskillsacademy@kabarak.ac.ke
Have any Questions?

Cyber Security

Cyber Security [ 3 Months ] - KES 30,000

Mode of Learning: FULLY ONLINE

Cybersecurity Course Outline

Cybersecurity Fundamentals

  • Introduction to Cybersecurity and Its Importance
  • Understanding the CIA Triad (Confidentiality, Integrity, Availability)

Cyber Attacks

  • Common Cyber Attacks
  • Cybersecurity Ethics and Laws
  • Cybersecurity Standards

Essential Security Concepts

  • Encryption and Cryptography
  • Authentication and Authorization
  • Password Management and Best Practices
  • Firewalls and Antivirus Software Basics

Networking for Cybersecurity

  • Introduction to Networking
  • Understanding Network Components (Routers, Switches)
  • Setting Up Networks
  • IP Addressing and Subnetting Basics
  • Virtual Private Networks (VPNs)
  • Wireless Network Security Basics
  • Firewall Types and Configuration

Operating System Security

  • Introduction to Operating Systems (Windows, Linux)
  • Configuring User Accounts and Permissions
  • Securing Files and Directories
  • Keeping Systems Updated (Patching and Updates)
  • System Logs and Monitoring

Ethical Hacking Fundamentals

  • Penetration Testing
  • Hacking Phases
  • Common Hacking Tools
  • Legal and Ethical Boundaries of Ethical Hacking

Malware and Threat Prevention

  • Understanding Malware (Viruses, Worms, Trojans)
  • How Antivirus and Anti-Malware Tools Work
  • Basics of Threat Detection and Prevention
  • Identifying and Mitigating Phishing Attacks
  • Analyzing Unwanted Software

Denial of Service (DoS) Attacks

  • What is a Denial of Service (DoS) Attack?
  • Types of DoS and DDoS Attacks
  • Tools Used in DoS Attacks
  • Mitigating DoS Attacks with Firewalls and Load Balancers
  • DDoS Prevention Strategies

System Hacking

  • System Hacking Objectives and Techniques
  • Password Cracking, Privilege Escalation, Spyware
  • Tools Used in System Hacking
  • Detecting and Preventing System Hacking Attempts

Incident Response

  • Incident Response Definition and Lifecycle
  • Preparing an Incident Response Plan (IRP)
  • Detecting and Analyzing Incidents
  • Containment, Eradication, and Recovery
  • Post-Incident Activities and Lessons Learned