Cybersecurity Program - 2025
This Cybersecurity course is designed to cater to individuals at all stages of their career, from beginners to experienced professionals aiming to enhance their skill set. The programme provides both foundational knowledge and hands-on experience through practical sessions, projects, and case studies. It covers essential cybersecurity principles, strategies, and real-world applications, ensuring learners are well-equipped to tackle industry challenges.
3 Course instructors
Instructor led course
8 month duration
2 Month Internship
Course Duration
6 Months of Instructor-led classes with an option of 2 Months Internship
Projects
8 Projects

(20% Discount ongoing - Limited slots)
Program fee payment can be in instalments
Course Description
This Cybersecurity Programme is meticulously designed for individuals at all stages of their professional journey, from beginners looking to break into the cybersecurity field to seasoned professionals eager to sharpen their skills. The course offers an immersive, hands-on experience, where students will engage with cutting-edge cybersecurity practices, tools, and technologies.
Through interactive live classes, participants will explore the core concepts of cybersecurity, such as computing foundations, network security, and cloud protection, while also diving into advanced topics like incident response, ethical hacking, and security governance. You'll work on real-world challenges, applying the knowledge gained to develop solutions that tackle modern cyber threats head-on.
A key focus of the programme is building leadership and project management skills, empowering students to manage security operations and lead successful cybersecurity teams. The combination of theory and practical experience ensures you not only understand cybersecurity from a technical standpoint but also from a strategic, business-oriented perspective. By the end of the programme, you’ll be fully equipped to handle cybersecurity issues, mitigate risks, and protect organizations in an increasingly digital world.
Additionally, with a unique blend of portfolio-building projects, virtual internships, and personalized career support, this programme positions you for success in the competitive cybersecurity job market, preparing you for certifications and high-demand roles in the industry.
Course Curriculum
Week 0
Course Introduction and Installations
The Course Introduction and Installations is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Installation Video
How to install (Oracle)Virtual Box, VMWare
Module 2: Welcome Address to Cybersecurity
Welcome Address
About Facilitators on the LMS
Overview of course objectives and Stages of learning Cybersecurity
Module 3: Optimize your LinkedIn Profile
Introduction
Creating your LinkedIn Profile
Uploading your Profile Picture and Cover
Crafting your headline
Your About Section
Work Experience
Education
Skills - Endorsements - Recommendations
Always Refer to your LinkedIn Pack
LinkedIn X JobAlytics
UK Visa Sponsorship LinkedIn Extension
Modifying LinkedIn Settings
Week 1
Introduction To Cybersecurity
The Introduction To Cybersecurity is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Introduction To Cybersecurity
What is Cybersecurity and its importance
Three Pillars of Cybersecurity
Major Cyber Threats and Incidence in the global landascape
Careers in Cybersecurity and their relevance I
Careers in Cybersecurity and their relevance II
Careers in Cybersecurity and their relevance IIII
Key Cybersecurity Roles & Real-life Impact
Application of Cybersecurity in various Industries
Core Skills of a Cybersecurty Analyst
Core roles of the career paths
Week 2
Introduction To Networking
The Introduction To Networking is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Cybersecurity Basics
The CIA Triad
Introduction to Risk Management and Key Concepts
Identifying and Prioritizing Risks in a security program
Common Cyber Attack Vectors and Real Examples
Threat Actors and their Motivations
Module 2: Introduction to Network Security
Introduction to Network Security
Introduction to Network Security - Firewalls
Introduction to Network Security - VPNs
Introduction to Network Security - IDS/IPS
Key Concepts-Network Segmentation
Types and Exploitation techniques
Network Vulnerabilities & Defense Techniques
Module 3: Basics of Incident Detection and Response
Basics of Incident Detection and Response: Introduction
Basics of Incident Detection and Response: Phases
Basics of Incident Detection and Response: Tools
Basics of Incident Detection and Response: Triaging and Key IOCs
Basics of Incident Detection and Response: Role of Documentation & Reporting
Module 4: Case study and practical on networking I
Key concepts of Network segmentation
Networking Introduction - Cisco Packet tracer
Networking Demo - Cisco Packet tracer
Module 5: Case study and practical on networking II
Networking
Networking Case Study and Practical
Week 3
SOC Analysis: Basics
The SOC Analysis: Basics is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: SOC ANALYSIS - SOC Roles & Responsibilities
Who is a SOC Analyst
Tiers in a Security Operations Center(SOC)
Tier 1-Security(SOC) Analyst
Tier 2- Incidence Responder
Tier 3- Threat Intelligence Analyst/Threat Hunter
SOC Manager and SOC Architect- Leadership
Incident Monitoring, Triage and Escalation
Reporting, Documentation and Shift Handovers
Cross-functional Team Collaboration- GRC, IRTs...
Metrics for performance evaluation- KPIs, SLAs....
SOC's Role in Compliance
Module 2: SOC Analysis: Log and Network Traffic analysis
Log and Network Traffic Analysis: Types
Log and Network Traffic Analysis: SIEM
Log and Network Traffic Analysis: Tools and Techniques
Log and Network Traffic Analysis: Network Protocols
Log and Network Traffic Analysis: Log Formats
Log and Network Traffic Analysis: Indicators of Compromise (IOCs)
Module 3: Case Study - SOC ANALYSIS
Case Study Create A SOC Home Lab Overview
Case Study Create A SOC Home Lab - Qradar Inst
Case Study Create A SOC Home Lab - Wincollect an
Module 4: Case Study - SOC Analysis: Log and Network Traffic analysis
SIEM Essentials
Qradar Architecture and Core Components
Week 5
SOC Analysis: Phishing
The SOC Analysis: Phishing is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Understanding Phishing
What is Phishing
Categories of Phishing
What is Email and How Does Email Communication Operate
Email Header Basics: Unveiling the Different Parts
:Understanding SPF, DKIM and DMARC for Secure Email Communication
What is an Email Gateway and What Function Does It Serve
Analysis of Phishing Email Content
Analyzing the Header of a Phishing Email
Module 2: Case Study
Threat Hunting Case study walkthrough
Threat Hunting
Threat Hunting Case study 2
Week 8
SOC Analysis: Threat Detection and Response
The SOC Analysis: Threat Detection and Response is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Threat Detection and Response
Proactive vs Reactive Detection
Cyber Threat Intelligence
Integrating and using TI feeds
ATT&CK TTPs
EDRs, IDS/IPS and UEBA
Suspicious Patterns and Behaviours
Response Playbooks for Common Alerts
Week 8
SOC Analysis : Incidence Response Lifecycle
The SOC Analysis : Incidence Response Lifecycle is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Incidence Response Lifecycle
Phases
Incident Prioritization
Containment Types
Patch Management
Root Cause Optimization
Communication and Documentation
Week 9
Threat Intelligence lifecycle
The Threat Intelligence lifecycle is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Threat Intelligence
Threat Intelligence Lifecycle: Stages Overview
Threat Intelligence Lifecycle: Sources of Threat Intelligence
Threat Intelligence Lifecycle: Actionable Intelligence Analysis using Frameworks
Threat Intelligence Lifecycle: Intelligence Sharing
Case Study on Threat Intelligence Lifecycle
Week 10
Threat Intelligence - Open-Source Intelligence (OSINT) Gathering
The Threat Intelligence - Open-Source Intelligence (OSINT) Gathering is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Open-Source Intelligence (OSINT) Gathering
Open-Source Intelligence (OSINT) Gathering: Introduction and Importance
Open-Source Intelligence (OSINT) Gathering: Public Data Sources
Open-Source Intelligence (OSINT) Gathering: Common OSINT Tools
Open-Source Intelligence (OSINT)Gathering: Collected OSINT Data Assessment
Case study on Open-Source Intelligence (OSINT)Gathering
Week 11
Threat Intelligence - Malware Analysis and Threat Actor Profiling
The Threat Intelligence - Malware Analysis and Threat Actor Profiling is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Malware Analysis and Threat Actor Profiling
Importance to Threat Intelligence
Tools for Analysis & Identification and TTPs
Attack Attribution Techniques & Documentation
Case Study - Malware Analysis
Week 12
Threat Intelligence Integration
The Threat Intelligence Integration is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Threat Intelligence Integration
Threat Intelligence Integration: Role in Enhancing SOC Operations
Automating Threat Intelligence, Enhancing Incidence Response and Detection
Standardized Workflows
Week 14
Penetration Testing
The Penetration Testing is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Introduction to Penetration Testing
Purpose & Objectives
TestingTypes (Black,Gray, White Boxes)TestingTypes (Black,Gray, White Boxes)
OWASP Top 10 & Pen Testing
Pen Testing Methodologies
Pen Testing Phase
Authorization and Safe Testing
Penetration Testing Tools
Penetration Testing Reporting Structure
Week 15
Penetration Testing: Vulnerability Assessment & Network Reconnaissance
The Penetration Testing: Vulnerability Assessment & Network Reconnaissance is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Vulnerability Assessment & Network Reconnaissance
Vulnerability Scanning and Network Reconnaissance
Active vs Passive Reconnaissance
Tools and Techniques for Network Discovery
Open Ports and Services and Identifying Service Versions
Service Banners and OS Information Disclosure
Tools for Web Vulnerabilities(Service Banners and OS Information Disclosure
Week 17
Penetration Testing: Exploitation Techniques (SQLi, XSS)
The Penetration Testing: Exploitation Techniques (SQLi, XSS) is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Exploitation Techniques (SQLi, XSS)
Exploitation Techniques - Introduction
Tools, Techniques and Practical SQL Injection Tactics
Cross-Site Scripting_ Tactics, Techniques and Exploits
Tools for Exploitation_ BurpSuite, OWASP ZAP & Scripts
Addressing Exploited Vulnerabilities
Week 18
Penetration Testing: Privilege Escalation & Post-Exploitation
The Penetration Testing: Privilege Escalation & Post-Exploitation is for both beginner with no experience or experienced professionals, it covers the following modules:
Module 1: Privilege Escalation & Post-Exploitation
Privilege Escalation & Post-Exploitation: Introduction
Exploiting Weak Permissions
Windows Privilege Escalation
Linux Privilege Escalation
Maintaining Access
Lateral Movement and Exfiltration
Hiding Evidence and Housekeeping
Mitigation Measures and Documentation
Week 20
Governance, Risk and Compliance (GRC)
The Governance, Risk and Compliance (GRC) is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 21
Security Awareness Training & Reporting
The Security Awareness Training & Reporting is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 22
Risk Management & Vulnerability Assessment
The Risk Management & Vulnerability Assessment is for both beginner with no experience or experienced professionals, it covers the following modules:
Week 23
Compliance Audits & Policy Development
The Compliance Audits & Policy Development is for both beginner with no experience or experienced professionals, it covers the following modules:
Meet Your Instructor
Oluwatobi Okafor
Team Lead Cybersecurity
"Oluwatobi is an Information Security Analyst with years of expertise in vulnerability assessment, threat detection, penetration testing, cloud security, and security incident management. As a Cybersecurity Senior Associate at 10Alytics, Oluwatobi has guided over 100 individuals with no prior tech background into cybersecurity. She is an ISC2 Member and has certifications such as the CISCO CCNA, ISO/IEC 27001 among others. With proven experience in web application security and API security, hands-on experience with Operating Systems and programming languages, gained through various projects, She is driven by a passion for continuous learning and personal growth, with a commitment to enhancing security practices and optimizing processes within the cybersecurity field. "
Vivian Nesiama
Senior Data Associate
"As a SOC Analyst with a strong foundation in incident response, digital forensics, and threat intelligence, I take a proactive approach to safeguarding digital assets and strengthening security postures. I specialize in designing and implementing incident response plans, policies, and playbooks in alignment with NIST and ISO standards, leveraging advanced tools and strategies to effectively identify, mitigate, and resolve cybersecurity threats. My experience includes leading incident response efforts and driving Threat Intelligence initiatives. I have successfully implemented critical security measures such as Identity and Access Management (IAM) and Role-Based Access Control (RBAC) to enhance organizational security. Additionally, I excel in phishing investigations, malware analysis, and utilizing Artificial Intelligence and Machine Learning technologies for threat prioritization and detection. I am passionate about bridging the gap between technical and non-technical audiences, I thrive in collaborative environments and have made meaningful contributions to cybersecurity awareness campaigns. My ultimate goal is to apply my expertise to help organizations fortify their cybersecurity defenses and achieve resilience in an ever-evolving threat landscape."
Ekene Ejike
Facilitator
I am a security engineer in the financial sector. I am driven by a constant desire to learn, grow, connect, and share valuable insights with fellow engineers.
Job Opportunities
With our Data Analytics Cerificate, you get to work as any of the following:
Cybersecurity Analyst
SOC Analyst
Information Security Analyst
Network Security Engineer
Incident Response Analyst
Penetration Tester
Security Architect
Cyber Threat Analyst
Vulnerability Analyst
Security Compliance Analyst
Course Reviews
Select your preferred pricing plan
As an edu-tech brand, we specialize in providing the essential skills and knowledge you need to unlock high-paying opportunities in the dynamic world of technology. Our mission is simple: to empower individuals to pursue their dreams and excel in high-demand tech roles through intensive, hands-on training.
8-Month Plan
Learners looking for extended industry exposure and advanced skill-building.
6 months of classroom learning + 2 months of internship.
Payment Plan: $150 per month for 5 months.
What You Get:
- Extended internship for in-depth practical experience.
- Access to all advanced course materials and certifications.
- Mentorship and career guidance throughout your journey.