Cyber Security Training in Abuja

Gideon Abayomi
Gideon Abayomi
Instructor
  • Wishlist
  • Share
    Share Course
    Page Link
    Share On Social Media
  • Course Info

  • Reviews

About Course

Click Here to Register for the Cyber Security Training in Abuja Nigeria

OVERVIEW OF CYBER SECURITY TRAINING IN ABUJA

There has never been a better moment to study cybersecurity than right now. Because of the significance in this day and age, systems, data, and information are continuously under attack, and tech workers and managers must be able to stay aware of and apply the latest technologies and tactics to protect their important data from falling into the wrong hands.
Enroll in our cybersecurity course to learn the terminologies, technical know-how, and practical skills needed to combat threats. Get hands-on experience and technical knowledge to protect your digital assets. Learn about numerous attack kinds and how to combat all aspects of a company’s technology and commercial processes. Make sure your skills are up to date and your systems are effectively protected in the fierce struggle for information security.

 

OBJECTIVE OF THE COURSE

 

This course aims to:
• Make you understand why you should take Cybersecurity seriously.
• Teach how simple it is to secure your devices. And how this can prevent attacks and make your devices more secure.
• Teach participants what Social Engineering is and how the hackers are using it. What the most common forms of Social Engineering are.
• Teach participants how to protect the personal data you have recorded on your computers, laptops and mobile devices.
• Make you job ready if you wish to pursue a career in cybersecurity.

 

LEARNING OUTCOME

 

• Protect and defend computer systems and networks from cybersecurity attacks.
• Diagnose and investigate cybersecurity events or crimes related to computer systems and digital evidence.
• Apply critical thinking and problem-solving skills to detect current and future attacks on an organization’s computer systems and networks.
• Effectively communicate in a professional setting to address information security issues.

 

WHO THIS COURSE IS MEANT FOR?

 

• Anyone with a keen interest in ethical hacking and internet security/safe practices.
• Anyone with access to electronic device….Like you!

 

DETAILED COURSE CONTENT

 

• Neo Cloud Technologies offers Professional Training in Cybersecurity from beginner level through intermediate to professional

COURSE REQUIREMENT

• Learning Cyber Security, you must have the basic knowledge of Hardware, Software and Networking.

 

Show More

What Will You Learn?

  • Protect and defend computer systems and networks from cybersecurity attacks.

Syllabus

WEEK 1: Introduction to Operating System Basics

  • What Is an Operating System?
    00:00
  • What Is a Kernel?
    00:00
  • The Ring Architecture
    00:00
  • What Is a File System?
    00:00
  • What Are Device Drivers?
    00:00
  • Memory Management: Stack versus Heap
    00:00
  • Microsoft Windows
    00:00
  • Windows Authentication: Local versus Centralized
    00:00
  • The Windows Registry
    00:00
  • The Windows Event Viewer
    00:00
  • Windows Services
    00:00
  • Windows Processes
    00:00
  • Windows Security Policies
    00:00
  • The Windows Firewall
    00:00
  • Cheat-Sheet to Windows Commands
    00:00
  • Linux
    00:00
  • Linux Directory Structure
    00:00
  • Passwords in Linux
    00:00
  • Linux Permissions in a Nutshell
    00:00
  • Processes
    00:00
  • Understanding the Linux Firewall (IP tables)
    00:00
  • TCP Wrappers
    00:00
  • Cheat-Sheet to Linux Commands
    00:00
  • Test Your Knowledge: Sample Questions
    00:00

WEEK 2: Database Basics

WEEK 3: Networking Basics

WEEK 4: Programming Basics for Security Enthusiasts And Hackers

WEEK 5: Virtualization and Cloud Basics

WEEK 6: Information Security Basics

WEEK 7: Penetration Testing

WEEK 8: Penetration Testing (contd.)

WEEK 9: Information Gathering

WEEK 10: Hacking Basics

WEEK 11: Web Application Hacking

WEEK 12: Wireless Hacking

WEEK 13: Hacking Mobile Platforms

WEEK 14: IDSes, Firewalls, and Honeypots

WEEK 15: Cryptography

WEEK 16: Projects, Defense, Certification.

Student Ratings & Reviews

No Review Yet
No Review Yet