inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
Tuition Fee
Start Date
Medium of studying
Duration
12 months
Program Facts
Program Details
Degree
Courses
Major
Cybersecurity
Area of study
Information and Communication Technologies
Timing
Full time
Course Language
English
About Program

Program Overview


This comprehensive cybersecurity program provides a solid foundation in cybersecurity principles, operating system security, network security, web application security, cloud security, and ethical hacking. Through hands-on experience and expert instruction, students develop the skills and knowledge necessary for careers in cybersecurity, including cybersecurity analyst, penetration tester, and network security engineer.

Program Outline

Outline:

  • Module 1: Fundamentals of Cybersecurity
  • Introduction to cybersecurity
  • Types of cyber threats and vulnerabilities
  • Cybersecurity principles and practices
  • Module 2: Windows Security
  • Windows operating system security
  • User account management
  • File and folder permissions
  • Security auditing and monitoring
  • Module 3: Unix Security
  • Unix operating system security
  • User and group management
  • File and directory permissions
  • Security auditing and monitoring
  • Module 4: Network and Perimeter Security
  • Network security concepts
  • Firewall configuration and management
  • Virtual LANs (VLANs)
  • Network intrusion detection and prevention systems (IDS/IPS)
  • Module 5: Web Application Security
  • Web application vulnerabilities
  • Web application security best practices
  • Web application firewalls (WAFs)
  • Security testing for web applications
  • Module 6: Cloud Security
  • Cloud computing security concepts
  • Cloud security services
  • Cloud security best practices
  • Module 7: Cybersecurity Controls and Operations
  • Cybersecurity controls
  • Cybersecurity incident response
  • Cybersecurity risk management
  • Module 8: Ethical Hacking and Computer Forensics
  • Ethical hacking techniques
  • Computer forensics principles and methods
  • Digital evidence collection and analysis
  • Module 9: System Recovery and Disaster Response
  • System recovery procedures
  • Disaster response planning
  • Business continuity and disaster recovery
  • Module 10: Career Development Internship
  • Hands-on experience in a cybersecurity role

Teaching:

  • Online delivery
  • Expert instructors with industry experience
  • Interactive learning environment

Careers:

  • Cybersecurity Analyst
  • Penetration Tester
  • Ethical Hacker
  • Cybersecurity Consultant
  • Network Security Engineer
SHOW MORE
How can I help you today?