Cybersecurity/Ethical Hacking Training in Lagos, Nigeria and Online

Classroom Training: Mondays, Tuesdays and Thursdays
Online Training: Flexible Days and Timing
Classroom Training: ₦850,000
Online Group Training: ₦1,350,000
One-on-One Online Training: ₦1,550,000
Home Training: Cost Depends on Your Location
Cybersecurity Course Curiculum
-
Introduction to Linux
- What is UNIX?
- A Brief History of UNIX
- Logging In
- Logging Out
- Try a Few More Commands
- Changing Your Password
- Using Online Manuals
- The File System – Files
- What is a File?
- The ls Command
- The cat Command
- The more and pg Commands
- The head and tail Commands
- The cp Command
- The mv Command
- The rm Command
- File names
- The File System – Directories
- Hierarchical File System
- Pathnames
- The pwd Command – Print Working Directory
- The cd Command – Change Directory
- The mkdir Command – Make Directories
- The rmdir Command – Remove Directories
- The cp Command (again) – Copy Files
- Two useful directory names
- What is a Shell?
- Which Shell?
- The Command Line
- Standard Input, Standard Output and Standard Error
- Using Default Standard In and Standard Output
- I/O Redirection
- Appending Output of a File
- Pipes
- The tee Utility
-
Networking
- What is Networking?
- Importance of Networking
- How Networking Works
- Communicating at a Distance
- Computers Communicate Differently
- Early Wide Area Store-and-Forward Networks
- Packets and Routers
- Addressing and Packets
Module 1: Introduction to Networking
- Link Layer
- Internetwork Layer (IP)
- Transport Layer (TCP)
- Application Layer
- Stacking the Layers
Module 2: Network Architecture
- Internet Protocol (IP) Addresses
- How Routers Determine the Routes
- When Things Get Worse and Better
- Determining Your Route
- Getting an IP Address
- Different Kind of Address Reuse
- Global IP Address Allocation
Module 3: Internetworking Layer (IP)
- Allocating Domain Names
- Reading Domain Names
Module 4: Domain Name System
- Packet Headers
- Packet Reassembly and Retransmission
- Transport Layer in Operation
- Application Clients and Servers
- Server Applications and Ports
- Client and Server Applications
- Application Layer Protocols
- Exploring the HTTP Protocol
- IMAP Protocol for Retrieving Mail
- Flow Control
- Writing Networked Applications
Module 5: Transport and Application Layer
- Encrypting and Decrypting Data
- Two Kinds of Secrets
- Secure Sockets Layer (SSL)
- Encrypting Web Browser Traffic
- Certificates and Certificate Authorities
Module 6: Secure Transport Layer
- OSI Model Overview
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Session Layer
- Presentation Layer
- Application Layer
- Difference Between OSI and TCP/IP Models
- Link Layer (TCP/IP)
- Internetwork Layer (TCP/IP)
- Transport Layer (TCP/IP)
- Application Layer (TCP/IP)
Module 7: OSI Model
-
Nmap
- Introduction to Nmap
- Why to use Nmap
- Scanning types and Features
- Installing Nmap
- Nmap basic Commands
Module 1:
- Three-Way Handshake
- TCP & ICMP Sweep
- Broadcast, Non-Echo & UDP
Module 2:
- Port States in Nmap
- TCP SYN and CONNECT Scan
- TCP Xmas, NULL and FIN Scans
- FTP Bounce, ACK and Idle Scan
- Scanning and Port Specification on Nmap
Module 3:
- OS and Version Detection
Module 4:
- How to spoof Firewall, IPS, IDS
- Firewall spoofing Practical
Module 5:
- NSE Introduction and Categories Types
- Nmap Script Engine Types
- NSE Practical on Kali or Parrot OS
Module 6:
- ZenMap Introduction
- ZenMap Practical
Module 7:
Social Engineering
- Phishing
- Spear Phishing
- SMShing
- Vishing
- Web Scraping
- Email Harvesting Techniques
- Spamming
- Baiting
- Pretexting
- Scareware
- Website Cloning
- HTML5 Form and CSS3
- PHP Form Processing
- Doxing
- Phishing
Remote Access Tools (RATs)
Malware
- Viruses
- Worms
- Trojans
- Spyware
- Ransomware
DDoS Attacks
Darknets
- Tor Browser
Exploit Kits
- MPack
- XSS Attacks
Penetration Testing
- Virtual Machines
- Kali Linux
- Project
Learn ethical hacking and how to conduct web application security from seasoned, proven and tested professionals in the field.
Cybersecurity or computer security, or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
The field is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
Learn Ethical Hacking from the Cybersecurity Experts at FlamyTech Computer School how these malicious attacks occur and ultimately how to protect computer systems and networks.
Who Cybersecurity Course Is For:
Our Diploma in Cybersecurity is for those who are interested in computer and network security and how to protect systems against malicious attacks from hackers and other intruders.Prerequisites:
- Basic computer knowledge is required as a prerequisite. Our Cybersecurity/Ethical Hacking course assumes the aspiring student already has a basic knowledge of computer usage, but no prior programming skill is required.
- Your willingness to learn Cybersecurity/Ethical Hacking
- Your own laptop! FlamyTech strongly requires that each programming student comes with his/her own laptop, to enable the learner practice at home. In programming, everyone agrees that practice makes perfect!
Why You Should Learn Cybersecurity:
In today’s society everything is online and information security has never been more important. Any individual or organisation can be at risk of data breaches and hacks, so specialising in cyber security will put you in an excellent position for securing future employment. A cyber security degree teaches you how to protect computer operating systems, networks, and data from cyber attacks. You’ll learn how to monitor systems and mitigate threats when they happen.Below are some of the reasons why you should learn Cybersecurity:
- Growing Job Opportunities
Cyber security is relatively new as a specialisation in its own right, with companies recognising more and more that they need in-house experts to protect them from cybercrime. There is also a global shortage of cyber security professionals, which is estimated to reach 3.5 million by 2021 (source: AECC Global). Good news if you want to start a career in cyber security! - Variety of Specialisms
Cyber security professionals can further specialise in areas such as the dark web, digital forensics and cyberwarfare. Depending on your technical background you might be working on the security for networks, apps or data in an operational setting. You could even be an ethical hacker. - Solve Complex Technical Puzzles
Studying cyber security gives you the opportunity to use your analytical skills to solve complex problems and analyse data patterns. In your professional life, if a security issue occurs then you’ll need to be able to think quickly to research the problem and troubleshoot to find the cause. - Make an Impact
Recovering from a data security breach as an organisation is highly challenging and costly, so having the right people in charge of protecting against this is vital. By working in cyber security you have the chance to make a real impact, and it can be rewarding if you manage to track down an attacker or stop a serious threat. - Fast-moving industry
With digital threats and technologies evolving and our digital networks expanding, cyber security professionals need to be on top of industry trends and ahead of cybercriminals. This constantly changing industry makes for an exciting career choice with plenty of opportunities to learn new skills.
Job Prospects:
With Cybersecurity on your resume, you stand a good chance of getting a very lucrative IT job in a big corporation.And the Cybersecurity Job Opportunities include, but not limited to:
- Application Analyst
- Security Analyst
- Security Engineer
- Security Architect
A Diploma Will Be Given Upon Course Completion
After successfully completing your Cybersecurity training at FlamyTech Computer School, the Management will award you a Diploma in Cybersecurity. Please, note that FlamyTech is duly-registered in Nigeria with RC: 1195702. So, never worry, because the diploma we award is recognized.Related Courses:
Diploma in Software Engineering
Diploma in Data Analytics
Diploma in Python Programming
Diploma in Python Web Development
Diploma in Java Programming
Diploma in Cross-platform Mobile App Development
Diploma in Android App Development
Diploma in Oracle Database
Diploma in Web Development
Diploma in Full Stack Web Development
Diploma in Front-end Web Development
Diploma in C Programming
Diploma in C++ Programming
Or are your confused about which course would better serve your specific needs? Don't worry; FlamyTech is right here to help you! Just get in touch with us now through the "Contact Us Now" button below, to get recommendation: