| Start & End Date | Duration | Kenyan Cost | Non-Kenyan Cost | Enroll | |
|---|---|---|---|---|---|
| Mar 09āMar 17, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Mar 23āMar 31, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Apr 06āApr 14, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Apr 20āApr 28, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| May 04āMay 12, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| May 18āMay 26, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jun 01āJun 09, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jun 15āJun 23, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jun 29āJul 07, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jul 13āJul 21, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Jul 27āAug 04, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Aug 10āAug 18, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Aug 24āSep 01, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Sep 07āSep 15, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Sep 21āSep 29, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Oct 05āOct 13, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Oct 19āOct 27, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Nov 02āNov 10, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
| Nov 16āNov 24, 2026 | 7 Days | KES 90,000 | USD 1,000 | Register | |
About the Course
Cybersecurity has become a core organizational priority as digital systems, networks, and data face constant exposure to cyber threats such as malware, ransomware, phishing, insider attacks, and system vulnerabilities. This training provides a comprehensive and practical foundation in cybersecurity, equipping participants with the knowledge and skills required to protect IT infrastructure, secure sensitive information, and respond effectively to cyber incidents.
Training on CybersecurityĀ blends theoretical concepts with hands-on practices, covering cybersecurity fundamentals, secure systems configuration, network defense mechanisms, ethical hacking principles, risk management, and incident response. Participants are introduced to industry-aligned practices commonly associated with globally recognized certifications and real-world cybersecurity environments. Emphasis is placed on proactive defense, threat detection, and resilience building to ensure organizations can prevent, detect, and recover from cyberattacks efficiently.
Target Participants
This Training on Cybersecurity is designed for IT professionals, system and network administrators, cybersecurity officers, software developers, risk and compliance staff, and managers responsible for information security and digital operations.
What You Will Learn
By the end of this Training on Cybersecurity, the participants will be able to:
- Understand core cybersecurity concepts, threats, and vulnerabilities
- Implement essential system and network security controls
- Apply ethical hacking techniques to identify security weaknesses
- Assess and manage cybersecurity risks
- Respond effectively to security incidents and support recovery efforts
Course Duration
One week
Course Outline
Cybersecurity Foundations
- Cybersecurity concepts and terminology
- Cyber threat landscape overview
- Types of attacks and threat actors
- Information security principles
- Introduction to security frameworks
Data Protection Principles
- Data classification methods
- Confidentiality, integrity, availability concepts
- Encryption fundamentals
- Data privacy considerations
- Secure data handling practices
Secure Systems Configuration
- Operating system security basics
- User access control models
- Authentication mechanisms
- Patch and update management
- Secure system hardening concepts
Network Security Architecture
- Network design for security
- Segmentation and defense layers
- Perimeter security concepts
- Monitoring network traffic
- Introduction to intrusion detection
Firewalls and Virtual Private Networks
- Firewall types and functions
- Firewall rule configuration principles
- VPN concepts and use cases
- Secure remote access
- Network access control basics
Linux and Wireless Security
- Linux security fundamentals
- System hardening techniques
- File permissions and logging
- Wireless security threats
- Securing wireless networks
Ethical Hacking Fundamentals
- Ethical hacking methodology
- Reconnaissance techniques
- Vulnerability scanning basics
- Exploitation concepts
- Legal and ethical boundaries
Penetration Testing Practices
- Penetration testing lifecycle
- Common tools and platforms
- Identifying and validating vulnerabilities
- Reporting security findings
- Remediation recommendations
Cybersecurity Risk Management
- Cyber risk identification
- Risk analysis techniques
- Security governance structures
- Policies and controls development
- Threat intelligence basics
Incident Response and Recovery
- Incident response lifecycle
- Detection and containment strategies
- Eradication and system recovery
- Disaster recovery planning
- Post-incident review and lessons learned
Training Approach
- Practical exercises
- Roleplays and simulations
- Interactive presentations and expert facilitation
- Group work and problem-solving exercises
- Case studies
Certification
Upon successful completion of this Training on Cybersecurity, participants will be issued with a certificate of Completion.