Cybersecurity/Ethical Hacking Training in Lagos, Nigeria and Online

Cybersecurity Training Institute in Surulare, Lagos, Nigeria and Online
Duration: 5 Months (3 Times per Week)
Classroom Training: Mondays, Tuesdays and Thursdays
Online Training: Flexible Days and Timing

Classroom Training: ₦850,000
Online Group Training: ₦1,350,000
One-on-One Online Training: ₦1,550,000
Home Training: Cost Depends on Your Location

Cybersecurity Course Curiculum


Expand all (Click to view course outline in details) | Collapse all (Click to hide course outline detais)
Introduction to Linux
Develop a good working knowledge of Linux operating system using both the graphical interface and command line across the major Linux distribution families.
    • What is UNIX?
    • A Brief History of UNIX
    • Logging In
    • Logging Out
    • Try a Few More Commands
    • Changing Your Password
    • Using Online Manuals
    • The File System – Files
    • What is a File?
    • The ls Command
    • The cat Command
    • The more and pg Commands
    • The head and tail Commands
    • The cp Command
    • The mv Command
    • The rm Command
    • File names
    • The File System – Directories
    • Hierarchical File System
    • Pathnames
    • The pwd Command – Print Working Directory
    • The cd Command – Change Directory
    • The mkdir Command – Make Directories
    • The rmdir Command – Remove Directories
    • The cp Command (again) – Copy Files
    • Two useful directory names
    • What is a Shell?
    • Which Shell?
    • The Command Line
    • Standard Input, Standard Output and Standard Error
    • Using Default Standard In and Standard Output
    • I/O Redirection
    • Appending Output of a File
    • Pipes
    • The tee Utility




Networking
This module is designed to provide a full overview of computer networking. We’ll cover everything from the fundamentals of modern networking technologies and protocols


    • Module 1: Introduction to Networking

    • What is Networking?
    • Importance of Networking
    • How Networking Works
    • Communicating at a Distance
    • Computers Communicate Differently
    • Early Wide Area Store-and-Forward Networks
    • Packets and Routers
    • Addressing and Packets

      Module 2: Network Architecture

    • Link Layer
    • Internetwork Layer (IP)
    • Transport Layer (TCP)
    • Application Layer
    • Stacking the Layers

      Module 3: Internetworking Layer (IP)

    • Internet Protocol (IP) Addresses
    • How Routers Determine the Routes
    • When Things Get Worse and Better
    • Determining Your Route
    • Getting an IP Address
    • Different Kind of Address Reuse
    • Global IP Address Allocation

      Module 4: Domain Name System

    • Allocating Domain Names
    • Reading Domain Names

      Module 5: Transport and Application Layer

    • Packet Headers
    • Packet Reassembly and Retransmission
    • Transport Layer in Operation
    • Application Clients and Servers
    • Server Applications and Ports
    • Client and Server Applications
    • Application Layer Protocols
    • Exploring the https Protocol
    • IMAP Protocol for Retrieving Mail
    • Flow Control
    • Writing Networked Applications

      Module 6: Secure Transport Layer

    • Encrypting and Decrypting Data
    • Two Kinds of Secrets
    • Secure Sockets Layer (SSL)
    • Encrypting Web Browser Traffic
    • Certificates and Certificate Authorities

      Module 7: OSI Model

    • OSI Model Overview
    • Physical Layer
    • Data Link Layer
    • Network Layer
    • Transport Layer
    • Session Layer
    • Presentation Layer
    • Application Layer
    • Difference Between OSI and TCP/IP Models
    • Link Layer (TCP/IP)
    • Internetwork Layer (TCP/IP)
    • Transport Layer (TCP/IP)
    • Application Layer (TCP/IP)
Metasploit Framework
Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness.
    • Module 1: Introduction to Metasploit Framework

    • Metasploit Framework
    • Implementation
    • Pro Components
    • Basic Concepts
    • Pro Workflow

      Module 2: Using Metasploit Web Interface

    • Supported Browsers
    • Navigational Menus and Features
    • Touring the Projects Page

      Module 3: Getting Started with Metasploit Framework

    • Creating a Project
    • Getting Target Data
    • View and Manage Host Data
    • Exploiting Known Vulnerabilities
    • Post-Exploitation and Collecting Evidence
    • Cleaning Up Sessions
    • Generating a Report

      Module 4: Setting Up a Vulnerable Target

    • Downloading and Setting Up Metasploitable
    • Services
    • Weak Passwords
    • Vulnerable Web Services

      Module 5: Managing Projects

    • Export Project Data
    • Adding Users to Project
    • Removing Users from a Project
    • Assigning Project to User
    • Host Comments

      Module 6: Managing and Updating Metasploit

    • Managing User Accounts
    • Managing License Keys
    • Verifying Downloads with SHA-1 Hashes
    • Accessing Logs
    • Backing Up and Restoring Metasploit Data
    • Notification Center
    • Updating Metasploit
    • Restarting Metasploit Services

      Module 7: Managing Hosts

    • Host Management Interfaces
    • Adding and Deleting Hosts
    • Viewing and Editing Host Metadata
    • Add, Edit, and Delete Service
    • Add, Edit, and Delete Vulnerabilities

      Module 8: Exploring Vulnerabilities

    • Discovery Scan
    • Vulnerability Scanning with Nexpose
    • Importing Data
    • Validating a Vulnerability
    • Working with the Vulnerability Validation Wizard
    • Validating Vulnerabilities Discovered by Nexpose
    • Sharing Validation Results with Nexpose

      Module 9: Working with Payloads

    • Single and Staged Payloads
    • Viewing Payloads
    • Manually Selecting a Payload
    • Auto-selecting a Payload
    • Payload Generator

      Module 10: Introduction to Credentials

    • Understanding Credentials
    • Managing
    • Reusing
    • Searching
    • Brute-force Attacks

      Module 11: Overview of Metamodules

    • Credentials Domino MetaModule
    • Single Credential Testing MetaModule
    • SSH Key Testing MetaModule
    • Known Credentials Intrusion MetaModule
    • Segmentation and Firewall Testing MetaModule

      Module 12: Social Engineering

    • Introduction to Social Engineering
    • Managing Campaigns

      Module 13: Automating Tasks

    • Working with Task Chains
    • Adding a Task to a Task Chain
    • Manage and Edit Task Chains
    • Scheduling Task Chains

      Module 14: Introduction to Reporting

    • Audit Reports
    • Credentials Report
    • FISMA and PCI Compliance Report
    • Social Engineering Campaign Details Report
    • Custom Templates
    • MetaModule Reports

      Module 15: Metasploit Framework

    • Accessing MSFconsole
    • Managing Database and Workspaces
    • Modules
    • Run Metasploit Remotely
    • Tag Hosts in MFSconsole

      Module 16: Working with Pro Console

    • About Pro Console
    • Auto-Exploitation
    • Manage Credentials
    • Managing Notes, Tasks, and Vulnerabilities
    • Scanning and Managing Hosts
    • Pro Console Reports
Nmap
Nmap (Network Mapper) is a free and open source utility for network discovery and security auditing. It is used for sending packets and analyzing the responses.
    • Module 1:

    • Introduction to Nmap
    • Why to use Nmap
    • Scanning types and Features
    • Installing Nmap
    • Nmap basic Commands

      Module 2:

    • Three-Way Handshake
    • TCP & ICMP Sweep
    • Broadcast, Non-Echo & UDP

      Module 3:

    • Port States in Nmap
    • TCP SYN and CONNECT Scan
    • TCP Xmas, NULL and FIN Scans
    • FTP Bounce, ACK and Idle Scan
    • Scanning and Port Specification on Nmap

      Module 4:

    • OS and Version Detection

      Module 5:

    • How to spoof Firewall, IPS, IDS
    • Firewall spoofing Practical

      Module 6:

    • NSE Introduction and Categories Types
    • Nmap Script Engine Types
    • NSE Practical on Kali or Parrot OS

      Module 7:

    • ZenMap Introduction
    • ZenMap Practical


Wireshark
Wireshark is a powerful, open-source network protocol analyzer that enables users to capture, troubleshoot and interactively browse the traffic running on a computer network.
  • Wireshark

    • Introduction to Wireshark and it's uses
    • Control and Select the correct Network interface to capture packets
    • Interface Tour Part1 - Let us understand the overwhelming interface of Wireshark
    • What is the filter & Types of filters in Wireshark
    • Learn to write and apply the basic filters
    • Optimizing filtering techniques with Logical operators
    • Filter traffic by ip address / addresses
    • Filter packets by port numbers
    • Filter traffic by Mac address
    • Optimizing Filtering Techniques with in Operator : Write Compact Filters
    • Special Operators : Contains and Matches
    • Capture Filters : Learn to write & apply basic capture filters
    • Capture Filters : Capture & Control the Application Layer Traffic
    • Capture Filters : Capture traffic by IP address with Host filter
    • Capture Filter : Capture Traffic/Frames by Mac Address


Zenmap
Zenmap is the official cross-platform and free GUI for the Nmap Security Scanner. It runs on on many operating systems, including Linux, Windows, and Mac OS X.
    • Introduction to Zenmap

    • The Purpose of a Graphical Frontend for Nmap

      Scanning

    • Profiles
    • Scan Aggregation

      Interpreting Scan Results

    • Scan Results Tabs
      • The “Nmap Output” tab
      • The “Ports / Hosts” tab
      • The “Topology” tab
      • The “Host Details” tab
      • The “Scans” tab
    • Sorting by Host
    • Sorting by Service

      Saving and Loading Scan Results

    • The Recent Scans Database

      Surfing the Network Topology

    • An Overview of the “Topology” Tab
    • Legend
    • Controls
      • Action controls
      • Interpolation controls
      • Layout controls
      • View controls
      • Fisheye controls
    • Keyboard Shortcuts
    • The Hosts Viewer

      The Profile Editor

    • Editing a Command
    • Script selection
    • Creating a New Profile
    • Editing or Deleting a Profile

      Host Filtering

      Searching Saved Results



Nessus
Nessus is a popular vulnerability scanner used to identify security weaknesses, missing patches, and misconfigurations in a computer network.
    • Introduction & Setup
    • Why vulnerability assessment is important
    • Downloading and installing Nessus Essentials
    • Setting up a practice lab
    • The theory behind vulnerability analysis
    • Passive and active information gathering
    • Manual vulnerability assessment
    • Overview of the Nessus interface and tabs
    • Using folders and scan policies
    • Running basic network, host discovery, and OS identification scans
    • Interpreting scan results to prioritize vulnerabilities
    • Exporting scan results in various formats (PDF, CSV, HTML)


Burp Suite
Burp Suite is a software security application used for penetration testing of web applications, combining manual and automated techniques.
  • Why a Proxy Service? | 5m 57s
  • Launching Burp Suite Against Your Target
  • Configuring Burp Proxy
  • Demo: Configuring Burp Proxy
  • Trusting Portswigger in Your Browser
  • Setting up Your Configuration File
  • Why Spider?
  • Spidering Options
  • Spidering Web Forms
  • Identifying Your Target
  • Spidering Against Your Target
  • Examining Your Results
  • Crawling Target Websites Using Burp
  • Why Scan?
  • What Are the Scanner Functions?
  • Let's Passively Scan Together
  • Let's Customize Active Scanner
  • Auditing Target Websites with Burp
  • Crawl and Audit Scanning with Burp
  • Analyzing Scan Results
  • Repeater to Your Rescue
  • Intruder for the Win
  • Intruder for the Win Demo
  • Sequencer for Your Tokens
  • Decoder Is Delightful


Armitage
Armitage is a graphical cyber attack management tool for the Metasploit framework. It is used to visualize targets and recommends exploits.
  • Introduction to Armitage
  • Cyberattacks
  • Cyberattack Cycle
  • Remote Exploit
  • Use credentials/Pass the hash
  • Armitage Interface
  • Example Target: Metasploitable
  • Armitage Scanning
  • Armitage Exploitation
  • Armitage Post Exploitation
  • Example Post Exploitation
  • Maintaining Access
  • Meterpreter commands!!!
  • Screen Capture!!!
  • Reports
  • Demo Setup
  • Steps
  • References


OWASP ZAP
OWASP ZAP is an open-source tool for detecting security vulnerabilities in web applications. It acts as a "man-in-the-middle" proxy, intercepting and analyzing traffic between a browser and a web application to detect flaws like cross-site scripting (XSS) and SQL injection.
  • Introduction to and Overview of OWASP ZAP
  • OWASP ZAP Layout and First Scan
  • Analyzing the OWASP ZAP Scan Results and Generating a Report
  • Setting up FoxyProxy in Firefox to use OWASP ZAP as a Proxy
  • Finding Files and Folders Using a Dictionary List within OWASP ZAP
  • Use OWASP ZAP to Spider Crawl a website to find URLs and Links
  • Use OWASP to View and Alter Requests


OpenVAS
OpenVAS is a full-featured, cross platform (Windows/Linux/Mac) vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test.
  • How to Setup a Lab Environment
  • Penetration Testing
  • Penetration Testing Methodology
  • OpenVAS Installation
  • OpenVAS Setup
  • OpenVAS Overview
  • OpenVAS Vulnerability Scanning
  • OpenVAS Exploitation
  • OpenVAS Reporting
  • Exploiting Metasploitable 2


Hashcat
Hashcat is a multi-platform (Linux, Windows and macOS) password cracking tool used for licit and illicit purposes. It is an extremely fast, efficient, and versatile hacking tool.
  • Introduction to Hashcat
  • Hash Type
  • Common Options used in Hashcat
  • Introduction to Attack Types
  • Dictionary Files
  • Wordlist Mixed with Rules
  • Creating a Custom Wordlist
  • Combination Attack
  • Straight & Combinator Attack Cheat Sheet
  • Charset Types
  • Mask Attack Demo
  • Brute-Force Attack
  • Mask Attack Cheat Sheet


SQLMap
SQLMap is a penetration testing utility that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
  • Introduction to SQL Injection
  • Web Application Architecture Basics
  • Databases Overview (MySQL, PostgreSQL, MSSQL, Oracle)
  • Types of SQL Injection Attacks
  • Manual vs Automated SQL Injection
  • Introduction to SQLMap
  • Installing SQLMap (Linux / Kali / Windows)
  • SQLMap Basic Usage & Syntax
  • Identifying Vulnerable Parameters
  • Database Fingerprinting with SQLMap
  • Enumerating Databases
  • Enumerating Tables and Columns
  • Dumping Database Data
  • SQLMap Risk & Level Options
  • Using SQLMap with https Requests
  • SQLMap and Cookies Handling
  • SQLMap with POST Requests
  • Bypassing WAFs & Filters
  • SQLMap Tamper Scripts
  • Authentication Bypass Techniques
  • SQLMap OS Shell & File System Access


Aircrack-ng
Aircrack-ng is a complete suite of tools to assess WiFi network security. It consists of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.
  • Introduction to Wireless Security
  • Basics of Wi-Fi (802.11 Standards)
  • Wireless Networking Components
  • Understanding Encryption & Authentication
  • Wireless Attacks Overview
  • Introduction to Aircrack-ng Suite
  • Installing Aircrack-ng (Linux/Kali)
  • Wireless Adapter & Driver Requirements
  • Enabling Monitor Mode
  • Packet Capture with Airodump-ng
  • Deauthentication Attacks (Aireplay-ng)
  • Capturing WPA/WPA2 Handshakes
  • Cracking WEP Encryption
  • Cracking WPA/WPA2-PSK
  • Wordlists and Dictionary Attacks
  • Creating & Using Custom Wordlists
  • Using Rules with Aircrack-ng
  • WPS Attacks (Reaver & Bully)
  • Evil Twin Attacks Overview
  • Wireless Attack Detection & Prevention
  • Legal & Ethical Considerations
  • Wireless Security Best Practices


Social Engineering
Social engineering is a manipulation technique that exploits human psychology and error to trick victims into revealing sensitive information, granting unauthorized access, or performing actions that compromise their security.
  • Phishing
    • Spear Phishing
    • SMShing
    • Vishing
    • Web Scraping
    • Email Harvesting Techniques
    • Spamming
  • Baiting
  • Pretexting
  • Scareware
  • Website Cloning
  • HTML5 Form and CSS3
  • PHP Form Processing
  • Doxing


Malware
Malware is malicious software designed to cause disruption, steal information, or gain unauthorized access to computer systems.
  • Viruses
  • Worms
  • Trojans
  • Spyware
  • Ransomware


Darknets
A darknet is an overlay network (a network built on top of another network – the Internet) that isn't discoverable by normal methods. It can only be accessed with specific software, configurations, or authorization.
  • Tor Browser


Exploit Kits
An exploit kit is a tool used for automatically managing and deploying exploits against a target computer. Learn how attackers use exploit kits to target software vulnerabilities and deliver malware to compromised systems. Prevent cyber attacks with exploit kit awareness.
  • MPack
  • XSS Attacks


Penetration Testing
Penetration testing is a simulated, authorized cyberattack on a computer system to evaluate its security by finding and exploiting vulnerabilities. Security professionals use the tools and techniques to identify weaknesses, helping organizations fix them before real breaches occur, ensure regulatory compliance, and improve their overall defenses. Attackers also utilise them.
  • Virtual Machines
  • Kali Linux


Remote Access Tools (RATs)
A remote access tool (RAT) is a type of software that enables a local user to connect to and access a remote computer, server or network. RATs are a dual-purpose technology. They can be legitimate software used by IT professionals for system management, or malicious software used by cybercriminals to gain unauthorized control over a system.
DDoS Attacks
A DDoS (distributed denial-of-service) attack is a malicious attempt to overwhelm an online service, such as a website or server, with a flood of illegitimate traffic from many sources, making it unavailable to legitimate users.



Learn ethical hacking and how to conduct web application security from seasoned, proven and tested professionals in the field.

Cybersecurity or computer security, or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

The field is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.

Learn Ethical Hacking from the Cybersecurity Experts at FlamyTech Computer School how these malicious attacks occur and ultimately how to protect computer systems and networks.


Who Cybersecurity Course Is For:

Our Diploma in Cybersecurity is for those who are interested in computer and network security and how to protect systems against malicious attacks from hackers and other intruders.



Prerequisites:

  1. Basic computer knowledge is required as a prerequisite. Our Cybersecurity/Ethical Hacking course assumes the aspiring student already has a basic knowledge of computer usage, but no prior programming skill is required.
  2. Your willingness to learn Cybersecurity/Ethical Hacking
  3. Your own laptop! FlamyTech strongly requires that each programming student comes with his/her own laptop, to enable the learner practice at home. In programming, everyone agrees that practice makes perfect!




Why You Should Learn Cybersecurity:

In today’s society everything is online and information security has never been more important. Any individual or organisation can be at risk of data breaches and hacks, so specialising in cyber security will put you in an excellent position for securing future employment. A cyber security degree teaches you how to protect computer operating systems, networks, and data from cyber attacks. You’ll learn how to monitor systems and mitigate threats when they happen.

Below are some of the reasons why you should learn Cybersecurity:

  • Growing Job Opportunities
    Cyber security is relatively new as a specialisation in its own right, with companies recognising more and more that they need in-house experts to protect them from cybercrime. There is also a global shortage of cyber security professionals, which is estimated to reach 3.5 million by 2021 (source: AECC Global). Good news if you want to start a career in cyber security!

  • Variety of Specialisms
    Cyber security professionals can further specialise in areas such as the dark web, digital forensics and cyberwarfare. Depending on your technical background you might be working on the security for networks, apps or data in an operational setting. You could even be an ethical hacker.

  • Solve Complex Technical Puzzles
    Studying cyber security gives you the opportunity to use your analytical skills to solve complex problems and analyse data patterns. In your professional life, if a security issue occurs then you’ll need to be able to think quickly to research the problem and troubleshoot to find the cause.

  • Make an Impact
    Recovering from a data security breach as an organisation is highly challenging and costly, so having the right people in charge of protecting against this is vital. By working in cyber security you have the chance to make a real impact, and it can be rewarding if you manage to track down an attacker or stop a serious threat.

  • Fast-moving industry
    With digital threats and technologies evolving and our digital networks expanding, cyber security professionals need to be on top of industry trends and ahead of cybercriminals. This constantly changing industry makes for an exciting career choice with plenty of opportunities to learn new skills.




Cybersecurity Job Opportunities:

With Cybersecurity on your resume, you stand a good chance of getting a very lucrative IT job in a big corporation.

And the Cybersecurity Job Opportunities include, but not limited to:
  • Application Analyst
  • Security Analyst
  • Security Engineer
  • Security Architect


A Diploma Will Be Given Upon Course Completion

After successfully completing your Cybersecurity training at FlamyTech Computer School, the Management will award you a Diploma in Cybersecurity. Please, note that FlamyTech is duly-registered in Nigeria with RC: 1195702. So, never worry, because the diploma we award is recognized.


Related Courses:
Diploma in Software Engineering
Diploma in Data Analytics
Diploma in Python Programming
Diploma in Python Web Development
Diploma in Java Programming
Diploma in Cross-platform Mobile App Development
Diploma in Android App Development
Diploma in Oracle Database
Diploma in Web Development
Diploma in Full Stack Web Development
Diploma in Front-end Web Development
Diploma in C Programming
Diploma in C++ Programming




Register Now For Computer Training


Or are your confused about which course would better serve your specific needs? Don't worry; FlamyTech is right here to help you! Just get in touch with us now through the "Contact Us Now" button below, to get recommendation:
Contact FlamyTech Computer School