Cybersecurity/Ethical Hacking Training in Lagos, Nigeria and Online
Classroom Training: Mondays, Tuesdays and Thursdays
Online Training: Flexible Days and Timing
Classroom Training: ₦850,000
Online Group Training: ₦1,350,000
One-on-One Online Training: ₦1,550,000
Home Training: Cost Depends on Your Location
Cybersecurity Course Curiculum
Expand all (Click to view course outline in details) | Collapse all (Click to hide course outline detais)
-
- What is UNIX?
- A Brief History of UNIX
- Logging In
- Logging Out
- Try a Few More Commands
- Changing Your Password
- Using Online Manuals
- The File System – Files
- What is a File?
- The ls Command
- The cat Command
- The more and pg Commands
- The head and tail Commands
- The cp Command
- The mv Command
- The rm Command
- File names
- The File System – Directories
- Hierarchical File System
- Pathnames
- The pwd Command – Print Working Directory
- The cd Command – Change Directory
- The mkdir Command – Make Directories
- The rmdir Command – Remove Directories
- The cp Command (again) – Copy Files
- Two useful directory names
- What is a Shell?
- Which Shell?
- The Command Line
- Standard Input, Standard Output and Standard Error
- Using Default Standard In and Standard Output
- I/O Redirection
- Appending Output of a File
- Pipes
- The tee Utility
-
- What is Networking?
- Importance of Networking
- How Networking Works
- Communicating at a Distance
- Computers Communicate Differently
- Early Wide Area Store-and-Forward Networks
- Packets and Routers
- Addressing and Packets
Module 1: Introduction to Networking
- Link Layer
- Internetwork Layer (IP)
- Transport Layer (TCP)
- Application Layer
- Stacking the Layers
Module 2: Network Architecture
- Internet Protocol (IP) Addresses
- How Routers Determine the Routes
- When Things Get Worse and Better
- Determining Your Route
- Getting an IP Address
- Different Kind of Address Reuse
- Global IP Address Allocation
Module 3: Internetworking Layer (IP)
- Allocating Domain Names
- Reading Domain Names
Module 4: Domain Name System
- Packet Headers
- Packet Reassembly and Retransmission
- Transport Layer in Operation
- Application Clients and Servers
- Server Applications and Ports
- Client and Server Applications
- Application Layer Protocols
- Exploring the https Protocol
- IMAP Protocol for Retrieving Mail
- Flow Control
- Writing Networked Applications
Module 5: Transport and Application Layer
- Encrypting and Decrypting Data
- Two Kinds of Secrets
- Secure Sockets Layer (SSL)
- Encrypting Web Browser Traffic
- Certificates and Certificate Authorities
Module 6: Secure Transport Layer
- OSI Model Overview
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Session Layer
- Presentation Layer
- Application Layer
- Difference Between OSI and TCP/IP Models
- Link Layer (TCP/IP)
- Internetwork Layer (TCP/IP)
- Transport Layer (TCP/IP)
- Application Layer (TCP/IP)
Module 7: OSI Model
-
- Metasploit Framework
- Implementation
- Pro Components
- Basic Concepts
- Pro Workflow
Module 1: Introduction to Metasploit Framework
- Supported Browsers
- Navigational Menus and Features
- Touring the Projects Page
Module 2: Using Metasploit Web Interface
- Creating a Project
- Getting Target Data
- View and Manage Host Data
- Exploiting Known Vulnerabilities
- Post-Exploitation and Collecting Evidence
- Cleaning Up Sessions
- Generating a Report
Module 3: Getting Started with Metasploit Framework
- Downloading and Setting Up Metasploitable
- Services
- Weak Passwords
- Vulnerable Web Services
Module 4: Setting Up a Vulnerable Target
- Export Project Data
- Adding Users to Project
- Removing Users from a Project
- Assigning Project to User
- Host Comments
Module 5: Managing Projects
- Managing User Accounts
- Managing License Keys
- Verifying Downloads with SHA-1 Hashes
- Accessing Logs
- Backing Up and Restoring Metasploit Data
- Notification Center
- Updating Metasploit
- Restarting Metasploit Services
Module 6: Managing and Updating Metasploit
- Host Management Interfaces
- Adding and Deleting Hosts
- Viewing and Editing Host Metadata
- Add, Edit, and Delete Service
- Add, Edit, and Delete Vulnerabilities
Module 7: Managing Hosts
- Discovery Scan
- Vulnerability Scanning with Nexpose
- Importing Data
- Validating a Vulnerability
- Working with the Vulnerability Validation Wizard
- Validating Vulnerabilities Discovered by Nexpose
- Sharing Validation Results with Nexpose
Module 8: Exploring Vulnerabilities
- Single and Staged Payloads
- Viewing Payloads
- Manually Selecting a Payload
- Auto-selecting a Payload
- Payload Generator
Module 9: Working with Payloads
- Understanding Credentials
- Managing
- Reusing
- Searching
- Brute-force Attacks
Module 10: Introduction to Credentials
- Credentials Domino MetaModule
- Single Credential Testing MetaModule
- SSH Key Testing MetaModule
- Known Credentials Intrusion MetaModule
- Segmentation and Firewall Testing MetaModule
Module 11: Overview of Metamodules
- Introduction to Social Engineering
- Managing Campaigns
Module 12: Social Engineering
- Working with Task Chains
- Adding a Task to a Task Chain
- Manage and Edit Task Chains
- Scheduling Task Chains
Module 13: Automating Tasks
- Audit Reports
- Credentials Report
- FISMA and PCI Compliance Report
- Social Engineering Campaign Details Report
- Custom Templates
- MetaModule Reports
Module 14: Introduction to Reporting
- Accessing MSFconsole
- Managing Database and Workspaces
- Modules
- Run Metasploit Remotely
- Tag Hosts in MFSconsole
Module 15: Metasploit Framework
- About Pro Console
- Auto-Exploitation
- Manage Credentials
- Managing Notes, Tasks, and Vulnerabilities
- Scanning and Managing Hosts
- Pro Console Reports
Module 16: Working with Pro Console
-
- Introduction to Nmap
- Why to use Nmap
- Scanning types and Features
- Installing Nmap
- Nmap basic Commands
Module 1:
- Three-Way Handshake
- TCP & ICMP Sweep
- Broadcast, Non-Echo & UDP
Module 2:
- Port States in Nmap
- TCP SYN and CONNECT Scan
- TCP Xmas, NULL and FIN Scans
- FTP Bounce, ACK and Idle Scan
- Scanning and Port Specification on Nmap
Module 3:
- OS and Version Detection
Module 4:
- How to spoof Firewall, IPS, IDS
- Firewall spoofing Practical
Module 5:
- NSE Introduction and Categories Types
- Nmap Script Engine Types
- NSE Practical on Kali or Parrot OS
Module 6:
- ZenMap Introduction
- ZenMap Practical
Module 7:
-
Wireshark
- Introduction to Wireshark and it's uses
- Control and Select the correct Network interface to capture packets
- Interface Tour Part1 - Let us understand the overwhelming interface of Wireshark
- What is the filter & Types of filters in Wireshark
- Learn to write and apply the basic filters
- Optimizing filtering techniques with Logical operators
- Filter traffic by ip address / addresses
- Filter packets by port numbers
- Filter traffic by Mac address
- Optimizing Filtering Techniques with in Operator : Write Compact Filters
- Special Operators : Contains and Matches
- Capture Filters : Learn to write & apply basic capture filters
- Capture Filters : Capture & Control the Application Layer Traffic
- Capture Filters : Capture traffic by IP address with Host filter
- Capture Filter : Capture Traffic/Frames by Mac Address
-
- The Purpose of a Graphical Frontend for Nmap
Introduction to Zenmap
- Profiles
- Scan Aggregation
Scanning
- Scan Results Tabs
- The “Nmap Output” tab
- The “Ports / Hosts” tab
- The “Topology” tab
- The “Host Details” tab
- The “Scans” tab
- Sorting by Host
- Sorting by Service
Interpreting Scan Results
- The Recent Scans Database
Saving and Loading Scan Results
- An Overview of the “Topology” Tab
- Legend
- Controls
- Action controls
- Interpolation controls
- Layout controls
- View controls
- Fisheye controls
- Keyboard Shortcuts
- The Hosts Viewer
Surfing the Network Topology
- Editing a Command
- Script selection
- Creating a New Profile
- Editing or Deleting a Profile
The Profile Editor
Host Filtering
Searching Saved Results
-
- Introduction & Setup
- Why vulnerability assessment is important
- Downloading and installing Nessus Essentials
- Setting up a practice lab
- The theory behind vulnerability analysis
- Passive and active information gathering
- Manual vulnerability assessment
- Overview of the Nessus interface and tabs
- Using folders and scan policies
- Running basic network, host discovery, and OS identification scans
- Interpreting scan results to prioritize vulnerabilities
- Exporting scan results in various formats (PDF, CSV, HTML)
- Why a Proxy Service? | 5m 57s
- Launching Burp Suite Against Your Target
- Configuring Burp Proxy
- Demo: Configuring Burp Proxy
- Trusting Portswigger in Your Browser
- Setting up Your Configuration File
- Why Spider?
- Spidering Options
- Spidering Web Forms
- Identifying Your Target
- Spidering Against Your Target
- Examining Your Results
- Crawling Target Websites Using Burp
- Why Scan?
- What Are the Scanner Functions?
- Let's Passively Scan Together
- Let's Customize Active Scanner
- Auditing Target Websites with Burp
- Crawl and Audit Scanning with Burp
- Analyzing Scan Results
- Repeater to Your Rescue
- Intruder for the Win
- Intruder for the Win Demo
- Sequencer for Your Tokens
- Decoder Is Delightful
- Introduction to Armitage
- Cyberattacks
- Cyberattack Cycle
- Remote Exploit
- Use credentials/Pass the hash
- Armitage Interface
- Example Target: Metasploitable
- Armitage Scanning
- Armitage Exploitation
- Armitage Post Exploitation
- Example Post Exploitation
- Maintaining Access
- Meterpreter commands!!!
- Screen Capture!!!
- Reports
- Demo Setup
- Steps
- References
- Introduction to and Overview of OWASP ZAP
- OWASP ZAP Layout and First Scan
- Analyzing the OWASP ZAP Scan Results and Generating a Report
- Setting up FoxyProxy in Firefox to use OWASP ZAP as a Proxy
- Finding Files and Folders Using a Dictionary List within OWASP ZAP
- Use OWASP ZAP to Spider Crawl a website to find URLs and Links
- Use OWASP to View and Alter Requests
- How to Setup a Lab Environment
- Penetration Testing
- Penetration Testing Methodology
- OpenVAS Installation
- OpenVAS Setup
- OpenVAS Overview
- OpenVAS Vulnerability Scanning
- OpenVAS Exploitation
- OpenVAS Reporting
- Exploiting Metasploitable 2
- Introduction to Hashcat
- Hash Type
- Common Options used in Hashcat
- Introduction to Attack Types
- Dictionary Files
- Wordlist Mixed with Rules
- Creating a Custom Wordlist
- Combination Attack
- Straight & Combinator Attack Cheat Sheet
- Charset Types
- Mask Attack Demo
- Brute-Force Attack
- Mask Attack Cheat Sheet
- Introduction to SQL Injection
- Web Application Architecture Basics
- Databases Overview (MySQL, PostgreSQL, MSSQL, Oracle)
- Types of SQL Injection Attacks
- Manual vs Automated SQL Injection
- Introduction to SQLMap
- Installing SQLMap (Linux / Kali / Windows)
- SQLMap Basic Usage & Syntax
- Identifying Vulnerable Parameters
- Database Fingerprinting with SQLMap
- Enumerating Databases
- Enumerating Tables and Columns
- Dumping Database Data
- SQLMap Risk & Level Options
- Using SQLMap with https Requests
- SQLMap and Cookies Handling
- SQLMap with POST Requests
- Bypassing WAFs & Filters
- SQLMap Tamper Scripts
- Authentication Bypass Techniques
- SQLMap OS Shell & File System Access
- Introduction to Wireless Security
- Basics of Wi-Fi (802.11 Standards)
- Wireless Networking Components
- Understanding Encryption & Authentication
- Wireless Attacks Overview
- Introduction to Aircrack-ng Suite
- Installing Aircrack-ng (Linux/Kali)
- Wireless Adapter & Driver Requirements
- Enabling Monitor Mode
- Packet Capture with Airodump-ng
- Deauthentication Attacks (Aireplay-ng)
- Capturing WPA/WPA2 Handshakes
- Cracking WEP Encryption
- Cracking WPA/WPA2-PSK
- Wordlists and Dictionary Attacks
- Creating & Using Custom Wordlists
- Using Rules with Aircrack-ng
- WPS Attacks (Reaver & Bully)
- Evil Twin Attacks Overview
- Wireless Attack Detection & Prevention
- Legal & Ethical Considerations
- Wireless Security Best Practices
- Phishing
- Spear Phishing
- SMShing
- Vishing
- Web Scraping
- Email Harvesting Techniques
- Spamming
- Baiting
- Pretexting
- Scareware
- Website Cloning
- HTML5 Form and CSS3
- PHP Form Processing
- Doxing
- Viruses
- Worms
- Trojans
- Spyware
- Ransomware
- Tor Browser
- MPack
- XSS Attacks
- Virtual Machines
- Kali Linux
Learn ethical hacking and how to conduct web application security from seasoned, proven and tested professionals in the field.
Cybersecurity or computer security, or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
The field is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
Learn Ethical Hacking from the Cybersecurity Experts at FlamyTech Computer School how these malicious attacks occur and ultimately how to protect computer systems and networks.
Who Cybersecurity Course Is For:
Our Diploma in Cybersecurity is for those who are interested in computer and network security and how to protect systems against malicious attacks from hackers and other intruders.Prerequisites:
- Basic computer knowledge is required as a prerequisite. Our Cybersecurity/Ethical Hacking course assumes the aspiring student already has a basic knowledge of computer usage, but no prior programming skill is required.
- Your willingness to learn Cybersecurity/Ethical Hacking
- Your own laptop! FlamyTech strongly requires that each programming student comes with his/her own laptop, to enable the learner practice at home. In programming, everyone agrees that practice makes perfect!
Why You Should Learn Cybersecurity:
In today’s society everything is online and information security has never been more important. Any individual or organisation can be at risk of data breaches and hacks, so specialising in cyber security will put you in an excellent position for securing future employment. A cyber security degree teaches you how to protect computer operating systems, networks, and data from cyber attacks. You’ll learn how to monitor systems and mitigate threats when they happen.Below are some of the reasons why you should learn Cybersecurity:
- Growing Job Opportunities
Cyber security is relatively new as a specialisation in its own right, with companies recognising more and more that they need in-house experts to protect them from cybercrime. There is also a global shortage of cyber security professionals, which is estimated to reach 3.5 million by 2021 (source: AECC Global). Good news if you want to start a career in cyber security! - Variety of Specialisms
Cyber security professionals can further specialise in areas such as the dark web, digital forensics and cyberwarfare. Depending on your technical background you might be working on the security for networks, apps or data in an operational setting. You could even be an ethical hacker. - Solve Complex Technical Puzzles
Studying cyber security gives you the opportunity to use your analytical skills to solve complex problems and analyse data patterns. In your professional life, if a security issue occurs then you’ll need to be able to think quickly to research the problem and troubleshoot to find the cause. - Make an Impact
Recovering from a data security breach as an organisation is highly challenging and costly, so having the right people in charge of protecting against this is vital. By working in cyber security you have the chance to make a real impact, and it can be rewarding if you manage to track down an attacker or stop a serious threat. - Fast-moving industry
With digital threats and technologies evolving and our digital networks expanding, cyber security professionals need to be on top of industry trends and ahead of cybercriminals. This constantly changing industry makes for an exciting career choice with plenty of opportunities to learn new skills.
Cybersecurity Job Opportunities:
With Cybersecurity on your resume, you stand a good chance of getting a very lucrative IT job in a big corporation.And the Cybersecurity Job Opportunities include, but not limited to:
- Application Analyst
- Security Analyst
- Security Engineer
- Security Architect
A Diploma Will Be Given Upon Course Completion
After successfully completing your Cybersecurity training at FlamyTech Computer School, the Management will award you a Diploma in Cybersecurity. Please, note that FlamyTech is duly-registered in Nigeria with RC: 1195702. So, never worry, because the diploma we award is recognized.Related Courses:
Diploma in Software Engineering
Diploma in Data Analytics
Diploma in Python Programming
Diploma in Python Web Development
Diploma in Java Programming
Diploma in Cross-platform Mobile App Development
Diploma in Android App Development
Diploma in Oracle Database
Diploma in Web Development
Diploma in Full Stack Web Development
Diploma in Front-end Web Development
Diploma in C Programming
Diploma in C++ Programming
Or are your confused about which course would better serve your specific needs? Don't worry; FlamyTech is right here to help you! Just get in touch with us now through the "Contact Us Now" button below, to get recommendation:
