| Location | Duration | Kenyan Cost | Non-Kenyan Cost | Upcoming Schedules |
|---|---|---|---|---|
| Nairobi, Kenya | 10 Days | KES 230,000 | USD 2,900 | Enroll |
| Kigali, Rwanda | 10 Days | USD 3,800 | USD 3,800 | Enroll |
| Kampala, Uganda | 10 Days | USD 3,800 | USD 3,800 | Enroll |
| Dar es Salaam, Tanzania | 10 Days | USD 4,000 | USD 4,000 | Enroll |
| Dubai, UAE | 10 Days | USD 7,500 | USD 7,500 | Enroll |
| Abuja, Nigeria | 10 Days | USD 7,800 | USD 7,800 | Enroll |
| Accra, Ghana | 10 Days | USD 7,500 | USD 7,500 | Enroll |
| Pretoria, South Africa | 10 Days | USD 7,500 | USD 7,500 | Enroll |
| Start & End Date | Duration | Kenyan Cost | Non-Kenyan Cost | Enroll | |
|---|---|---|---|---|---|
| May 04āMay 12, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| May 18āMay 26, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jun 01āJun 09, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jun 15āJun 23, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jun 29āJul 07, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jul 13āJul 21, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jul 27āAug 04, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Aug 10āAug 18, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Aug 24āSep 01, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Sep 07āSep 15, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Sep 21āSep 29, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Oct 05āOct 13, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Oct 19āOct 27, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Nov 02āNov 10, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Nov 16āNov 24, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Nov 30āDec 08, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Dec 14āDec 22, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Dec 28, 2026āJan 05, 2027 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jan 11āJan 19, 2027 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jan 25āFeb 02, 2027 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Feb 08āFeb 16, 2027 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Feb 22āMar 02, 2027 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Mar 08āMar 16, 2027 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Mar 22āMar 30, 2027 | 7 Days | KES 90,000 | USD 1,000 | Register | |
About the Course
The rapid expansion of digital systems has increased organizational exposure to cyber threats, making cyber security competence a critical requirement across all sectors. Attackers are now more sophisticated, exploiting vulnerabilities in networks, systems, and applications to disrupt operations, steal data, or compromise services. To counter these risks, professionals must understand both defensive security principles and the techniques used by malicious actors.
This course equips participants with comprehensive knowledge of cyber security foundations while introducing them to ethical hacking concepts aligned with global best practices. The training blends theory with practical demonstrations to provide a deeper understanding of vulnerabilities, security controls, exploitation techniques, and incident response. Participants gain hands-on skills to strengthen systems, assess weaknesses, and contribute effectively to organizational cyber resilience.
Target Participants
This course is ideal for individuals involved in protecting or managing digital systems, including IT officers, system administrators, network technicians, cyber security beginners, technical support staff, and professionals looking to transition into cyber security roles. It is also suitable for risk officers, auditors, and compliance staff who require an understanding of security vulnerabilities and ethical hacking practices. Basic knowledge of networking or IT systems is beneficial but not mandatory.
What You Will Learn
By the end of this course the participants will be able to:
- Explain key concepts of cyber security and organizational threat landscapes
- Secure networks and systems using recognized defensive security controls
- Conduct reconnaissance, scanning, and vulnerability assessment activities
- Apply ethical hacking methodologies to identify and exploit common weaknesses
- Analyze system vulnerabilities and recommend effective mitigation strategies
- Evaluate web applications for common security flaws using industry frameworks
- Implement incident response procedures to detect, contain, and recover from attacks
Course Duration
One week
Course Outline
Cyber Security Foundations
- Principles of information security
- Types of cyber threats
- Security architecture frameworks
- Network security basics
- Introduction to security governance
Network Security Essentials
- Network protocols and vulnerabilities
- Firewalls and intrusion detection systems
- Secure network design
- Access control mechanisms
- Network traffic monitoring
System Security Hardening
- Operating system vulnerabilities
- Server configuration techniques
- Patch management processes
- Endpoint protection mechanisms
- Secure authentication practices
Ethical Hacking Fundamentals
- Ethical hacking concepts
- Legal requirements for penetration testing
- Reconnaissance techniques
- Foot printing and intelligence gathering
- Attack lifecycle methodology
Vulnerability Assessment Techniques
- Scanning methodologies
- Vulnerability identification tools
- Enumeration processes
- Risk rating frameworks
- Reporting of assessment findings
System Exploitation Techniques
- Password attack strategies
- Privilege escalation methods
- Malware exploitation tactics
- Session hijacking mechanisms
- Exploitation toolkits overview
Network Attack Techniques
- Packet sniffing operations
- Man in the middle techniques
- DNS attack mechanisms
- Spoofing strategies
- Wireless attack tools
Web Application Security
- OWASP vulnerability categories
- Input validation weaknesses
- Injection vulnerability exploitation
- Cross site scripting techniques
- Web application testing workflows
Penetration Testing Process
- Planning and scope definition
- Target discovery techniques
- Exploitation procedures
- Post exploitation activities
- Reporting and documentation
Cyber Security Incident Management
- Incident detection methods
- Incident response procedures
- Containment and eradication
- Forensic data collection
- Recovery and post incident review
Training Approach
This course is delivered by our seasoned trainers who have vast experience as expert professionals in their respective fields of practice. The course is taught through a mix of practical activities, presentations, group works and case studies.
Training notes and additional reference materials are provided to the participants.
Certification
Upon successful completion of this course, participants will be issued a certificate.
Tailor-Made Course
We can also do this as a tailor-made course to meet organization-wide needs.