| Location | Duration | Kenyan Cost | Non-Kenyan Cost | Upcoming Schedules |
|---|---|---|---|---|
| Nairobi, Kenya | 5 Days | KES 115,000 | USD 1,500 | Enroll |
| Kigali, Rwanda | 5 Days | USD 1,900 | USD 1,900 | Enroll |
| Kampala, Uganda | 5 Days | USD 1,900 | USD 1,900 | Enroll |
| Dar es Salaam, Tanzania | Enroll | |||
| Dubai, UAE | Enroll | |||
| Abuja, Nigeria | Enroll | |||
| Accra, Ghana | Enroll | |||
| Pretoria, South Africa | Enroll |
No upcoming online schedules are available for this course at the moment.
About the Course
The rapid expansion of digital systems has increased organizational exposure to cyber threats, making cyber security competence a critical requirement across all sectors. Attackers are now more sophisticated, exploiting vulnerabilities in networks, systems, and applications to disrupt operations, steal data, or compromise services. To counter these risks, professionals must understand both defensive security principles and the techniques used by malicious actors.
This course equips participants with comprehensive knowledge of cyber security foundations while introducing them to ethical hacking concepts aligned with global best practices. The training blends theory with practical demonstrations to provide a deeper understanding of vulnerabilities, security controls, exploitation techniques, and incident response. Participants gain hands-on skills to strengthen systems, assess weaknesses, and contribute effectively to organizational cyber resilience.
Target Participants
This course is ideal for individuals involved in protecting or managing digital systems, including IT officers, system administrators, network technicians, cyber security beginners, technical support staff, and professionals looking to transition into cyber security roles. It is also suitable for risk officers, auditors, and compliance staff who require an understanding of security vulnerabilities and ethical hacking practices. Basic knowledge of networking or IT systems is beneficial but not mandatory.
What You Will Learn
By the end of this course the participants will be able to:
- Explain key concepts of cyber security and organizational threat landscapes
- Secure networks and systems using recognized defensive security controls
- Conduct reconnaissance, scanning, and vulnerability assessment activities
- Apply ethical hacking methodologies to identify and exploit common weaknesses
- Analyze system vulnerabilities and recommend effective mitigation strategies
- Evaluate web applications for common security flaws using industry frameworks
- Implement incident response procedures to detect, contain, and recover from attacks
Course Duration
One week
Course Outline
Cyber Security Foundations
- Principles of information security
- Types of cyber threats
- Security architecture frameworks
- Network security basics
- Introduction to security governance
Network Security Essentials
- Network protocols and vulnerabilities
- Firewalls and intrusion detection systems
- Secure network design
- Access control mechanisms
- Network traffic monitoring
System Security Hardening
- Operating system vulnerabilities
- Server configuration techniques
- Patch management processes
- Endpoint protection mechanisms
- Secure authentication practices
Ethical Hacking Fundamentals
- Ethical hacking concepts
- Legal requirements for penetration testing
- Reconnaissance techniques
- Foot printing and intelligence gathering
- Attack lifecycle methodology
Vulnerability Assessment Techniques
- Scanning methodologies
- Vulnerability identification tools
- Enumeration processes
- Risk rating frameworks
- Reporting of assessment findings
System Exploitation Techniques
- Password attack strategies
- Privilege escalation methods
- Malware exploitation tactics
- Session hijacking mechanisms
- Exploitation toolkits overview
Network Attack Techniques
- Packet sniffing operations
- Man in the middle techniques
- DNS attack mechanisms
- Spoofing strategies
- Wireless attack tools
Web Application Security
- OWASP vulnerability categories
- Input validation weaknesses
- Injection vulnerability exploitation
- Cross site scripting techniques
- Web application testing workflows
Penetration Testing Process
- Planning and scope definition
- Target discovery techniques
- Exploitation procedures
- Post exploitation activities
- Reporting and documentation
Cyber Security Incident Management
- Incident detection methods
- Incident response procedures
- Containment and eradication
- Forensic data collection
- Recovery and post incident review
Training Approach
This course is delivered by our seasoned trainers who have vast experience as expert professionals in their respective fields of practice. The course is taught through a mix of practical activities, presentations, group works and case studies.
Training notes and additional reference materials are provided to the participants.
Certification
Upon successful completion of this course, participants will be issued a certificate.
Tailor-Made Course
We can also do this as a tailor-made course to meet organization-wide needs.