Cybersecurity Program - 2025
This Cybersecurity course is designed to cater to individuals at all stages of their career, from beginners to experienced professionals aiming to enhance their skill set. The programme provides both foundational knowledge and hands-on experience through practical sessions, projects, and case studies. It covers essential cybersecurity principles, strategies, and real-world applications, ensuring learners are well-equipped to tackle industry challenges.
3 Course instructors
Instructor led course
8 month duration
2 Month Internship
Course Duration
8 Months of Instructor-led classes with an option of 2 Months Internship
Projects
8 Projects

(20% Discount ongoing - Limited slots)
Program fee payment can be in instalments
Course Description
This Cybersecurity Programme is meticulously designed for individuals at all stages of their professional journey, from beginners looking to break into the cybersecurity field to seasoned professionals eager to sharpen their skills. The course offers an immersive, hands-on experience, where students will engage with cutting-edge cybersecurity practices, tools, and technologies.
Through interactive live classes, participants will explore the core concepts of cybersecurity, such as computing foundations, network security, and cloud protection, while also diving into advanced topics like incident response, ethical hacking, and security governance. You'll work on real-world challenges, applying the knowledge gained to develop solutions that tackle modern cyber threats head-on.
A key focus of the programme is building leadership and project management skills, empowering students to manage security operations and lead successful cybersecurity teams. The combination of theory and practical experience ensures you not only understand cybersecurity from a technical standpoint but also from a strategic, business-oriented perspective. By the end of the programme, you’ll be fully equipped to handle cybersecurity issues, mitigate risks, and protect organizations in an increasingly digital world.
Additionally, with a unique blend of portfolio-building projects, virtual internships, and personalized career support, this programme positions you for success in the competitive cybersecurity job market, preparing you for certifications and high-demand roles in the industry.
Course Curriculum
Week 0
Introduction To Cybersecurity
The Introduction To Cybersecurity is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Installation Video
How to install (Oracle)Virtual Box, VMWare
Module 2: Welcome Address
Welcome Address
About Facilitators on the LMS
Overview of course objectives and Stages of learning Cybersecurity
Module 3: Optimize your LinkedIn Profile
Introduction
Creating your LinkedIn Profile
Uploading your Profile Picture and Cover
Crafting your headline
Your About Section
Work Experience
Education
Skills - Endorsements - Recommendations
Always Refer to your LinkedIn Pack
LinkedIn X JobAlytics
UK Visa Sponsorship LinkedIn Extension
Modifying LinkedIn Settings
Week 1
Introduction To Cybersecurity II
The Introduction To Cybersecurity II is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Introduction To Cybersecurity
What is Cybersecurity and its importance
Three Pillars of Cybersecurity
Major Cyber Threats and Incidence in the global landascape
Careers in Cybersecurity and their relevance I
Careers in Cybersecurity and their relevance II
Careers in Cybersecurity and their relevance IIII
Key Cybersecurity Roles & Real-life Impact
Application of Cybersecurity in various Industries
Core Skills of a Cybersecurty Analyst
Core roles of the career paths
Week 2
Basics of Cybersecurity
The Basics of Cybersecurity is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Cybersecurity Basics
The CIA Triad
Introduction to Risk Management and Key Concepts
Identifying and Prioritizing Risks in a security program
Common Cyber Attack Vectors and Real Examples
Threat Actors and their Motivations
Module 2: Introduction to Network Security
Introduction to Network Security
Introduction to Network Security - Firewalls
Introduction to Network Security - VPNs
Introduction to Network Security - IDS/IPS
Key Concepts-Network Segmentation
Types and Exploitation techniques
Network Vulnerabilities & Defense Techniques
Module 3: Basics of Incident Detection and Response
Basics of Incident Detection and Response: Introduction
Basics of Incident Detection and Response: Phases
Basics of Incident Detection and Response: Tools
Basics of Incident Detection and Response: Triaging and Key IOCs
Basics of Incident Detection and Response: Role of Documentation & Reporting
Module 4: Case study and practical on networking I
Key concepts of Network segmentation
Networking Introduction - Cisco Packet tracer
Networking Demo - Cisco Packet tracer
Module 5: Case study and practical on networking II
Networking
Networking Case Study and Practical
Week 3
SOC ANALYSIS
The SOC ANALYSIS is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: SOC ANALYSIS - SOC Roles & Responsibilities
Who is a SOC Analyst
Tiers in a Security Operations Center(SOC)
Tier 1-Security(SOC) Analyst
Tier 2- Incidence Responder
Tier 3- Threat Intelligence Analyst/Threat Hunter
SOC Manager and SOC Architect- Leadership
Incident Monitoring, Triage and Escalation
Reporting, Documentation and Shift Handovers
Cross-functional Team Collaboration- GRC, IRTs...
Metrics for performance evaluation- KPIs, SLAs....
SOC's Role in Compliance
Module 2: Log Analysis
Log and Network Traffic Analysis: Types
Log and Network Traffic Analysis: SIEM
Log and Network Traffic Analysis: Tools and Techniques
Log and Network Traffic Analysis: Network Protocols
Log and Network Traffic Analysis: Log Formats
Log and Network Traffic Analysis: Indicators of Compromise (IOCs)
Module 3: Case Study - SOC
Case Study Create A SOC Home Lab Overview
Case Study Create A SOC Home Lab - Qradar Inst
Case Study Create A SOC Home Lab - Wincollect an
Module 4: Case Study - Log Analysis
SIEM Essentials
Qradar Architecture and Core Components
Week 5
Understanding Phishing
The Understanding Phishing is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Understanding Phishing
What is Phishing
Categories of Phishing
What is Email and How Does Email Communication Operate
Email Header Basics: Unveiling the Different Parts
:Understanding SPF, DKIM and DMARC for Secure Email Communication
What is an Email Gateway and What Function Does It Serve
Analysis of Phishing Email Content
Analyzing the Header of a Phishing Email
Module 2: Case Study
Threat Hunting Case study walkthrough
Threat Hunting
Threat Hunting Case study 2
Week 6
Threat Detection and Response
The Threat Detection and Response is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Threat Detection and Response
Proactive vs Reactive Detection
Cyber Threat Intelligence
Integrating and using TI feeds
ATT&CK TTPs
EDRs, IDS/IPS and UEBA
Suspicious Patterns and Behaviours
Response Playbooks for Common Alerts
Week 8
Incidence Response Lifecycle
The Incidence Response Lifecycle is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Incidence Response Lifecycle
Phases
Incident Prioritization
Containment Types
Patch Management
Root Cause Optimization
Communication and Documentation
Week 9
Threat Intelligence lifecycle
The Threat Intelligence lifecycle is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 10
Open-Source Intelligence (OSINT) Gathering
The Open-Source Intelligence (OSINT) Gathering is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 11
Malware Analysis and Threat Actor Profiling
The Malware Analysis and Threat Actor Profiling is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 12
Threat Intelligence Integration
The Threat Intelligence Integration is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 13
Penetration Testing
The Penetration Testing is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 15
Vulnerability Assessment & Network Reconnaissance
The Vulnerability Assessment & Network Reconnaissance is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 16
Exploitation Techniques (SQLi, XSS)
The Exploitation Techniques (SQLi, XSS) is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 17
Privilege Escalation & Post-Exploitation
The Privilege Escalation & Post-Exploitation is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 18
Governance, Risk and Compliance (GRC)
The Governance, Risk and Compliance (GRC) is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 19
Security Awareness Training & Reporting
The Security Awareness Training & Reporting is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 20
Compliance Audits & Policy Development
The Compliance Audits & Policy Development is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 21
Risk Management & Vulnerability Assessment
The Risk Management & Vulnerability Assessment is for both beginner with no experience or experienced professionals, it covers the following modules:
Meet Your Instructor
Oluwatobi Okafor
Team Lead Cybersecurity
"Oluwatobi is an Information Security Analyst with years of expertise in vulnerability assessment, threat detection, penetration testing, cloud security, and security incident management. As a Cybersecurity Senior Associate at 10Alytics, Oluwatobi has guided over 100 individuals with no prior tech background into cybersecurity. She is an ISC2 Member and has certifications such as the CISCO CCNA, ISO/IEC 27001 among others. With proven experience in web application security and API security, hands-on experience with Operating Systems and programming languages, gained through various projects, She is driven by a passion for continuous learning and personal growth, with a commitment to enhancing security practices and optimizing processes within the cybersecurity field. "
Vivian Nesiama
Senior Data Associate
"As a SOC Analyst with a strong foundation in incident response, digital forensics, and threat intelligence, I take a proactive approach to safeguarding digital assets and strengthening security postures. I specialize in designing and implementing incident response plans, policies, and playbooks in alignment with NIST and ISO standards, leveraging advanced tools and strategies to effectively identify, mitigate, and resolve cybersecurity threats. My experience includes leading incident response efforts and driving Threat Intelligence initiatives. I have successfully implemented critical security measures such as Identity and Access Management (IAM) and Role-Based Access Control (RBAC) to enhance organizational security. Additionally, I excel in phishing investigations, malware analysis, and utilizing Artificial Intelligence and Machine Learning technologies for threat prioritization and detection. I am passionate about bridging the gap between technical and non-technical audiences, I thrive in collaborative environments and have made meaningful contributions to cybersecurity awareness campaigns. My ultimate goal is to apply my expertise to help organizations fortify their cybersecurity defenses and achieve resilience in an ever-evolving threat landscape."
Ekene Ejike
Facilitator
I am a security engineer in the financial sector. I am driven by a constant desire to learn, grow, connect, and share valuable insights with fellow engineers.
Job Opportunities
With our Data Analytics Cerificate, you get to work as any of the following:
Cybersecurity Analyst
SOC Analyst
Information Security Analyst
Network Security Engineer
Incident Response Analyst
Penetration Tester
Security Architect
Cyber Threat Analyst
Vulnerability Analyst
Security Compliance Analyst
Course Reviews
Select your preferred pricing plan
As an edu-tech brand, we specialize in providing the essential skills and knowledge you need to unlock high-paying opportunities in the dynamic world of technology. Our mission is simple: to empower individuals to pursue their dreams and excel in high-demand tech roles through intensive, hands-on training.
8-Month Plan
Learners looking for extended industry exposure and advanced skill-building.
6 months of classroom learning + 2 months of internship.
Payment Plan: $150 per month for 5 months.
What You Get:
- Extended internship for in-depth practical experience.
- Access to all advanced course materials and certifications.
- Mentorship and career guidance throughout your journey.