+234 704 790 7048
Suite 401, 4th Floor
Kojo Motors Building, Mabushi, Abuja.
9:00 am – 4:30 pm
Monday - Saturdays

Cybersecurity Tools & Cyber Attacks

Cyber Wofare > Services > Cybersecurity Tools & Cyber Attacks
Cyber Wofare > Services > Cybersecurity Tools & Cyber Attacks

Cybersecurity Tools & Cyber Attacks

This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.

You will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersecurity.

Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.

Syllabus

  • History of Cybersecurity:
    This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.
  • A brief overview of types of actors and their motives:
    This module will provide you with a brief overview of types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.
  • An overview of key security concepts:
    This module will describe various key security concepts that are important in any cybersecurity position. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.
  • An overview of key security tools:
    In this module, you will be introduced to key security tools including firewalls, anti-virus and cryptography. You will explore penetration testing and digital forensics. You will learn where you can get resources on industry and current threats to assist in further research around cybersecurity.
X