Certificate in CyberSecurity

Objectives:

1. Teach and train hands on skills on cybersecurity

2. Improve your career as an ethical hacker / cybersecurity professional

3. Create your own self employment in cybersecurity

4. Develop a career in providing cybersecurity solutions to clients.
CyberSecurity Course Outline

Unit 1: Security Concepts and Mechanisms
    Module I: Networking Concepts Overview
       Lesson 1: Basics of Communication Systems
       Lesson 2: Transmission Media
       Lesson 3: ISO/OSI and TCP/IP Protocol Stacks
       Lesson 4: Local Area Networks
       Lesson 5: Wide Area Networks
       Lesson6 : Internetworking
       Lesson7 : Packet Formats
       Lesson8 : Wireless Networks
       Lesson9 : The Internet
     Module 2: Information Security Concepts
       Lesson1 : Information Security Overview
       Lesson2 : Information Security Services
       Lesson3 : Types of Attacks
       Lesson4 : Goals for Security
       Lesson5 : E-commerce Security
       Lesson6 : Computer Forensics
       Lesson7 : Steganography
       Lesson8 : Security Engineering
     Module 3: Security Threats and vulnerabilities
       Lesson1 : Overview of Security threats
       Lesson2 : Hacking Techniques
       Lesson3 : Password Cracking
       Lesson4 : Insecure Network connections
       Lesson5 : Malicious Code
       Lesson6 : Programming Bugs
       Lesson7 : Cyber crime and Cyber terrorism
       Lesson8 : Information Warfare and Surveillance
    Module 4: Cryptography
       Lesson1 : Introduction to Cryptography
       Lesson2 : Symmetric key Cryptography
       Lesson3 : Asymmetric key Cryptography
       Lesson4 : Message Authentication and Hash functions
       Lesson5 : Digital Signatures
       Lesson6 : Public Key infrastructure
       Lesson7 : Diffe-Hellman key exchange protocol
       Lesson8 : Applications of Cryptography

Unit 2: Security Management
     ModuleI: Security Management Practices
      Lesson 1: Overview of Security Management
      Lesson 2: Information Classification Process
      Lesson 3: Security Policy
      Lesson 4: Risk Management
      Lesson 5: Security Procedures and Guidelines
      Lesson 6: Business Continuity and Disaster Recovery
     Module2: Security Laws and Standards
      Lesson 1: Security Assurance
      Lesson 2: Security Laws
      Lesson 3: International Standards
      Lesson 4: Security Audit
      Lesson 5: OCTAVE approach
      Lesson 6: SSE-CMM Unit 3:

Unit 3: Network Security
    Module 1: Access Control and Intrusion Detection
      Lesson 1: Overview of Identification and Authorization
      Lesson 2: I & A Techniques
      Lesson 3: Overview of IDS
      Lesson 4: Intrusion Detection Systems and Intrusion Prevention Systems
    Module 2: Server Management and Firewalls
      Lesson 1: User Management
      Lesson 2: DNS Routing and Load Balancing
      Lesson 3: Overview of Firewalls
      Lesson 4: Types of Firewalls
      Lesson 5: DMZ and firewall features
    Module 3: Security for VPN and Next Generation Networks
      Lesson 1: VPN Security
      Lesson 2: Security in Multimedia Networks
      Lesson 3: Cloud Security
      Lesson 4: Link Encryption Devices

Unit 4: System and Application Security
    Module 1: Security Architectures and Models
      Lesson 1: Desiging Secure Operating Systems
      Lesson 2: Controls to enforce security services
      Lesson 3: Information flow model and Biba model
    Module 2: System Security
      Lesson 1: Desktop Security
      Lesson 2: Email security: PGP and SMIME
      Lesson 3: Web Security: web authentication, SSL and SET
    Module 3: OS Security
      Lesson 1: OS Security Vulnerabilities, updates and patches
      Lesson 2: OS integrity checks
      Lesson 3: Anti-virus software
      Lesson 4: Design of secure OS and OS hardening
      Lesson 5: Configuring the OS for security Lesson 6: Trusted OS
Unit 5: Tools and Operating System
    Module 1: Introduction to virtualization
      Lesson 1: Introduction to VirtualBox
      Lesson 2: Introduction to VMWare
      Lesson 3: Virtualization configuration
    Module 2: Introduction to KALI Linux
      Lesson 1: KALI Linux commands
      Lesson 2: KALI Linux tools and methodology
      Lesson 3: Reporting in KALI Linux
    Module 3: Ethical Hackers Mindset
      Lesson 1: Principles of ethical hacking
      Lesson 2: Mindset of ethical hacker
      Lesson 3: CyberSecurity Laws in Kenya
      Lesson 4: Blackhat, Whitehat and Greyhat hackers

Duration:

Between one to six months

Admission Requirements

Admission fee Kshs 1000

Basic computers packages

Linux operating system practical knowledge

Mathematics is a MUST in KCSE

C+ in KCSE (Result slip)

Cyber Incident Response

S5 Box

Register