Cybersecurity Fundamentals

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Cybersecurity Fundamentals

Original price was: ₦250 ,000.Current price is: ₦100 ,000.

Cybersecurity Fundamentals is a beginner-friendly, hands-on course that introduces students to the core concepts, tools, and techniques used to protect computers, networks, and data from cyber attacks. Students learn how hackers think, how defenders respond, and how modern organizations secure their digital environments.

After completing this course, students will be prepared to pursue entry-level and junior cybersecurity roles and begin building a successful career in the cybersecurity field, including:

  • Junior SOC Analyst / SOC Analyst I

  • Cybersecurity Analyst (Entry-Level)

  • Information Security Analyst (Junior)

  • IT Security Technician / Security Support Specialist

  • GRC Analyst (Junior)

  • Identity & Access Management (IAM) Analyst (Junior)

  • Vulnerability Management Analyst (Junior)

  • Junior Penetration Tester / Ethical Hacking Intern

  • Security Operations Center (SOC) Technician

  • Cybersecurity Intern/Trainee

Graduates will leave with the knowledge, confidence, and practical foundation to defend systems, analyze threats, and take their first step into the world of cybersecurity.

Module 1:

Introduction to Cybersecurity & Digital Threat Landscape
Why cybersecurity matters (real breaches & case studies)
CIA Triad: Confidentiality, Integrity, Availability
Cybersecurity domains (network, application, cloud, etc.)
Overview of cybersecurity careers
Types of threat actors (hackers, insiders, nation states)
Common cyber threats
Cyber Kill Chain (high-level)

Module 2:

Computing & Networking Basics
Hardware vs software
Operating systems (Windows, Linux, macOS)
Files, processes, memory (conceptual)
Why OS security matters
Networking Fundamentals
LAN, WAN, Internet
IP addresses, DNS, ports, protocols
What happens when you visit a website

Module 3:

Cyber Attacks & Vulnerabilities
Malware types
How malware spreads
Basic malware prevention
Vulnerabilities & Exploits
Zero-day vulnerabilities
CVE & CVSS basics
Human vulnerabilities (social engineering)

Module 4:

Security Controls & Defense Basics
Firewalls (conceptual)
Antivirus & EDR basics
Authentication & Access Control
Password security
Multi-Factor Authentication (MFA)
Role-Based Access Control (RBAC)
Identity and Access Management

Module 5:

Network & Web Security Basics
Wi-Fi security (WEP vs WPA2/WPA3)
VPNs explained simply
Web & Application Security Basics
Common web vulnerabilities
OWASP Top 10 overview

Module 6:

Data, Cloud & Endpoint Security
Symmetric vs asymmetric encryption
Hashing
HTTPS & SSL/TLS
Cloud & Endpoint Security
Shared responsibility model
Cloud security risks
Endpoint security basics (laptops, phones)

Module 7:

Security Operations & Incident Response
Logs & monitoring
SIEM explained for beginners
Alerts vs incidents
Incident Response & Cyber Hygiene
Backup strategies
Personal cyber hygiene

Module 8:

Cybersecurity Ethics & Careers
Ethical hacking vs illegal hacking
Vulnerability & Penetration testing and management
Laws & regulations (high-level)
Cybersecurity roles
Certifications roadmap (Security+, CEH, etc.)

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.