Cybersecurity/Ethical Hacking Training in Lagos, Nigeria and Online

Cybersecurity Training Institute in Surulare, Lagos, Nigeria and Online
Duration: 5 Months (3 Times per Week)
Classroom Training: Mondays, Tuesdays and Thursdays
Online Training: Flexible Days and Timing

Classroom Training: ₦850,000
Online Group Training: ₦1,350,000
One-on-One Online Training: ₦1,550,000
Home Training: Cost Depends on Your Location

Cybersecurity Course Curiculum

  • Introduction to Linux

    • What is UNIX?
    • A Brief History of UNIX
    • Logging In
    • Logging Out
    • Try a Few More Commands
    • Changing Your Password
    • Using Online Manuals
    • The File System – Files
    • What is a File?
    • The ls Command
    • The cat Command
    • The more and pg Commands
    • The head and tail Commands
    • The cp Command
    • The mv Command
    • The rm Command
    • File names
    • The File System – Directories
    • Hierarchical File System
    • Pathnames
    • The pwd Command – Print Working Directory
    • The cd Command – Change Directory
    • The mkdir Command – Make Directories
    • The rmdir Command – Remove Directories
    • The cp Command (again) – Copy Files
    • Two useful directory names
    • What is a Shell?
    • Which Shell?
    • The Command Line
    • Standard Input, Standard Output and Standard Error
    • Using Default Standard In and Standard Output
    • I/O Redirection
    • Appending Output of a File
    • Pipes
    • The tee Utility
  • Metasploit

      Module 1: Introduction to Metasploit Framework

    • Metasploit Framework
    • Implementation
    • Pro Components
    • Basic Concepts
    • Pro Workflow

      Module 2: Using Metasploit Web Interface

    • Supported Browsers
    • Navigational Menus and Features
    • Touring the Projects Page

      Module 3: Getting Started with Metasploit Framework

    • Creating a Project
    • Getting Target Data
    • View and Manage Host Data
    • Exploiting Known Vulnerabilities
    • Post-Exploitation and Collecting Evidence
    • Cleaning Up Sessions
    • Generating a Report

      Module 4: Setting Up a Vulnerable Target

    • Downloading and Setting Up Metasploitable
    • Services
    • Weak Passwords
    • Vulnerable Web Services

      Module 5: Managing Projects

    • Export Project Data
    • Adding Users to Project
    • Removing Users from a Project
    • Assigning Project to User
    • Host Comments

      Module 6: Managing and Updating Metasploit

    • Managing User Accounts
    • Managing License Keys
    • Verifying Downloads with SHA-1 Hashes
    • Accessing Logs
    • Backing Up and Restoring Metasploit Data
    • Notification Center
    • Updating Metasploit
    • Restarting Metasploit Services

      Module 7: Managing Hosts

    • Host Management Interfaces
    • Adding and Deleting Hosts
    • Viewing and Editing Host Metadata
    • Add, Edit, and Delete Service
    • Add, Edit, and Delete Vulnerabilities

      Module 8: Exploring Vulnerabilities

    • Discovery Scan
    • Vulnerability Scanning with Nexpose
    • Importing Data
    • Validating a Vulnerability
    • Working with the Vulnerability Validation Wizard
    • Validating Vulnerabilities Discovered by Nexpose
    • Sharing Validation Results with Nexpose

      Module 9: Working with Payloads

    • Single and Staged Payloads
    • Viewing Payloads
    • Manually Selecting a Payload
    • Auto-selecting a Payload
    • Payload Generator

      Module 10: Introduction to Credentials

    • Understanding Credentials
    • Managing
    • Reusing
    • Searching
    • Brute-force Attacks

      Module 11: Overview of Metamodules

    • Credentials Domino MetaModule
    • Single Credential Testing MetaModule
    • SSH Key Testing MetaModule
    • Known Credentials Intrusion MetaModule
    • Segmentation and Firewall Testing MetaModule

      Module 12: Social Engineering

    • Introduction to Social Engineering
    • Managing Campaigns

      Module 13: Automating Tasks

    • Working with Task Chains
    • Adding a Task to a Task Chain
    • Manage and Edit Task Chains
    • Scheduling Task Chains

      Module 14: Introduction to Reporting

    • Audit Reports
    • Credentials Report
    • FISMA and PCI Compliance Report
    • Social Engineering Campaign Details Report
    • Custom Templates
    • MetaModule Reports

      Module 15: Metasploit Framework

    • Accessing MSFconsole
    • Managing Database and Workspaces
    • Modules
    • Run Metasploit Remotely
    • Tag Hosts in MFSconsole

      Module 16: Working with Pro Console

    • About Pro Console
    • Auto-Exploitation
    • Manage Credentials
    • Managing Notes, Tasks, and Vulnerabilities
    • Scanning and Managing Hosts
    • Pro Console Reports
  • Networking

      Module 1: Introduction to Networking

    • What is Networking?
    • Importance of Networking
    • How Networking Works
    • Communicating at a Distance
    • Computers Communicate Differently
    • Early Wide Area Store-and-Forward Networks
    • Packets and Routers
    • Addressing and Packets

      Module 2: Network Architecture

    • Link Layer
    • Internetwork Layer (IP)
    • Transport Layer (TCP)
    • Application Layer
    • Stacking the Layers

      Module 3: Internetworking Layer (IP)

    • Internet Protocol (IP) Addresses
    • How Routers Determine the Routes
    • When Things Get Worse and Better
    • Determining Your Route
    • Getting an IP Address
    • Different Kind of Address Reuse
    • Global IP Address Allocation

      Module 4: Domain Name System

    • Allocating Domain Names
    • Reading Domain Names

      Module 5: Transport and Application Layer

    • Packet Headers
    • Packet Reassembly and Retransmission
    • Transport Layer in Operation
    • Application Clients and Servers
    • Server Applications and Ports
    • Client and Server Applications
    • Application Layer Protocols
    • Exploring the HTTP Protocol
    • IMAP Protocol for Retrieving Mail
    • Flow Control
    • Writing Networked Applications

      Module 6: Secure Transport Layer

    • Encrypting and Decrypting Data
    • Two Kinds of Secrets
    • Secure Sockets Layer (SSL)
    • Encrypting Web Browser Traffic
    • Certificates and Certificate Authorities

      Module 7: OSI Model

    • OSI Model Overview
    • Physical Layer
    • Data Link Layer
    • Network Layer
    • Transport Layer
    • Session Layer
    • Presentation Layer
    • Application Layer
    • Difference Between OSI and TCP/IP Models
    • Link Layer (TCP/IP)
    • Internetwork Layer (TCP/IP)
    • Transport Layer (TCP/IP)
    • Application Layer (TCP/IP)
  • Nmap

      Module 1:

    • Introduction to Nmap
    • Why to use Nmap
    • Scanning types and Features
    • Installing Nmap
    • Nmap basic Commands

      Module 2:

    • Three-Way Handshake
    • TCP & ICMP Sweep
    • Broadcast, Non-Echo & UDP

      Module 3:

    • Port States in Nmap
    • TCP SYN and CONNECT Scan
    • TCP Xmas, NULL and FIN Scans
    • FTP Bounce, ACK and Idle Scan
    • Scanning and Port Specification on Nmap

      Module 4:

    • OS and Version Detection

      Module 5:

    • How to spoof Firewall, IPS, IDS
    • Firewall spoofing Practical

      Module 6:

    • NSE Introduction and Categories Types
    • Nmap Script Engine Types
    • NSE Practical on Kali or Parrot OS

      Module 7:

    • ZenMap Introduction
    • ZenMap Practical
  • Social Engineering

    • Phishing
      • Spear Phishing
      • SMShing
      • Vishing
      • Web Scraping
      • Email Harvesting Techniques
      • Spamming
    • Baiting
    • Pretexting
    • Scareware
    • Website Cloning
    • HTML5 Form and CSS3
    • PHP Form Processing
    • Doxing
  • Remote Access Tools (RATs)

  • Malware

    • Viruses
    • Worms
    • Trojans
    • Spyware
    • Ransomware
  • DDoS Attacks

  • Darknets

    • Tor Browser
  • Exploit Kits

    • MPack
    • XSS Attacks
  • Penetration Testing

    • Virtual Machines
    • Kali Linux
  • Project



Learn ethical hacking and how to conduct web application security from seasoned, proven and tested professionals in the field.

Cybersecurity or computer security, or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

The field is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.

Learn Ethical Hacking from the Cybersecurity Experts at FlamyTech Computer School how these malicious attacks occur and ultimately how to protect computer systems and networks.


Who Cybersecurity Course Is For:

Our Diploma in Cybersecurity is for those who are interested in computer and network security and how to protect systems against malicious attacks from hackers and other intruders.


Prerequisites:

  1. Basic computer knowledge is required as a prerequisite. Our Cybersecurity/Ethical Hacking course assumes the aspiring student already has a basic knowledge of computer usage, but no prior programming skill is required.
  2. Your willingness to learn Cybersecurity/Ethical Hacking
  3. Your own laptop! FlamyTech strongly requires that each programming student comes with his/her own laptop, to enable the learner practice at home. In programming, everyone agrees that practice makes perfect!

Why You Should Learn Cybersecurity:

In today’s society everything is online and information security has never been more important. Any individual or organisation can be at risk of data breaches and hacks, so specialising in cyber security will put you in an excellent position for securing future employment. A cyber security degree teaches you how to protect computer operating systems, networks, and data from cyber attacks. You’ll learn how to monitor systems and mitigate threats when they happen.

Below are some of the reasons why you should learn Cybersecurity:

  • Growing Job Opportunities
    Cyber security is relatively new as a specialisation in its own right, with companies recognising more and more that they need in-house experts to protect them from cybercrime. There is also a global shortage of cyber security professionals, which is estimated to reach 3.5 million by 2021 (source: AECC Global). Good news if you want to start a career in cyber security!

  • Variety of Specialisms
    Cyber security professionals can further specialise in areas such as the dark web, digital forensics and cyberwarfare. Depending on your technical background you might be working on the security for networks, apps or data in an operational setting. You could even be an ethical hacker.

  • Solve Complex Technical Puzzles
    Studying cyber security gives you the opportunity to use your analytical skills to solve complex problems and analyse data patterns. In your professional life, if a security issue occurs then you’ll need to be able to think quickly to research the problem and troubleshoot to find the cause.

  • Make an Impact
    Recovering from a data security breach as an organisation is highly challenging and costly, so having the right people in charge of protecting against this is vital. By working in cyber security you have the chance to make a real impact, and it can be rewarding if you manage to track down an attacker or stop a serious threat.

  • Fast-moving industry
    With digital threats and technologies evolving and our digital networks expanding, cyber security professionals need to be on top of industry trends and ahead of cybercriminals. This constantly changing industry makes for an exciting career choice with plenty of opportunities to learn new skills.

Job Prospects:

With Cybersecurity on your resume, you stand a good chance of getting a very lucrative IT job in a big corporation.

And the Cybersecurity Job Opportunities include, but not limited to:
  • Application Analyst
  • Security Analyst
  • Security Engineer
  • Security Architect

A Diploma Will Be Given Upon Course Completion

After successfully completing your Cybersecurity training at FlamyTech Computer School, the Management will award you a Diploma in Cybersecurity. Please, note that FlamyTech is duly-registered in Nigeria with RC: 1195702. So, never worry, because the diploma we award is recognized.


Related Courses:
Diploma in Software Engineering
Diploma in Data Analytics
Diploma in Python Programming
Diploma in Python Web Development
Diploma in Java Programming
Diploma in Cross-platform Mobile App Development
Diploma in Android App Development
Diploma in Oracle Database
Diploma in Web Development
Diploma in Full Stack Web Development
Diploma in Front-end Web Development
Diploma in C Programming
Diploma in C++ Programming



Register Now For Computer Training

Or are your confused about which course would better serve your specific needs? Don't worry; FlamyTech is right here to help you! Just get in touch with us now through the "Contact Us Now" button below, to get recommendation:

Contact FlamyTech Computer School