Cyber Security [ 3 Months ] - KES 30,000
Mode of Learning: FULLY ONLINE
Cybersecurity Course Outline
Cybersecurity Fundamentals
- Introduction to Cybersecurity and Its Importance
- Understanding the CIA Triad (Confidentiality, Integrity, Availability)
Cyber Attacks
- Common Cyber Attacks
- Cybersecurity Ethics and Laws
- Cybersecurity Standards
Essential Security Concepts
- Encryption and Cryptography
- Authentication and Authorization
- Password Management and Best Practices
- Firewalls and Antivirus Software Basics
Networking for Cybersecurity
- Introduction to Networking
- Understanding Network Components (Routers, Switches)
- Setting Up Networks
- IP Addressing and Subnetting Basics
- Virtual Private Networks (VPNs)
- Wireless Network Security Basics
- Firewall Types and Configuration
Operating System Security
- Introduction to Operating Systems (Windows, Linux)
- Configuring User Accounts and Permissions
- Securing Files and Directories
- Keeping Systems Updated (Patching and Updates)
- System Logs and Monitoring
Ethical Hacking Fundamentals
- Penetration Testing
- Hacking Phases
- Common Hacking Tools
- Legal and Ethical Boundaries of Ethical Hacking
Malware and Threat Prevention
- Understanding Malware (Viruses, Worms, Trojans)
- How Antivirus and Anti-Malware Tools Work
- Basics of Threat Detection and Prevention
- Identifying and Mitigating Phishing Attacks
- Analyzing Unwanted Software
Denial of Service (DoS) Attacks
- What is a Denial of Service (DoS) Attack?
- Types of DoS and DDoS Attacks
- Tools Used in DoS Attacks
- Mitigating DoS Attacks with Firewalls and Load Balancers
- DDoS Prevention Strategies
System Hacking
- System Hacking Objectives and Techniques
- Password Cracking, Privilege Escalation, Spyware
- Tools Used in System Hacking
- Detecting and Preventing System Hacking Attempts
Incident Response
- Incident Response Definition and Lifecycle
- Preparing an Incident Response Plan (IRP)
- Detecting and Analyzing Incidents
- Containment, Eradication, and Recovery
- Post-Incident Activities and Lessons Learned