Course Objectives
• Understand the principles of computer security and its importance in today’s digital world.
• Identify and analyze various types of vulnerabilities in computer systems and networks.
• Develop skills to implement effective control measures to mitigate security risks.
• Gain hands-on experience with security tools and techniques used in vulnerability assessment.
• Prepare for advanced studies and careers in cybersecurity.
Introduction to Computer Security
• Importance of Computer Security
• Basic Security Concepts
• Security Goals: Confidentiality, Integrity, Availability
Threats and Attacks
• Types of Threats: Malware, Phishing, Social Engineering
• Attack Vectors: Network-Based, Host-Based, Application-Based
• Case Studies of Significant Security Breaches
Vulnerability Assessment and Analysis
• Vulnerability Types: Software, Hardware, Network, Human Factors
• Vulnerability Discovery Methods: Automated Tools, Manual Testing
• Vulnerability Databases: CVE, NVD
Security Controls and Countermeasures
• Preventive Controls: Firewalls, Antivirus, Encryption
• Detective Controls: Intrusion Detection Systems, Logs, Audits
• Corrective Controls: Patching, Incident Response
Secure Software Development
• Secure Coding Practices
• Software Development Life Cycle (SDLC) and Security
• Code Review and Static Analysis Tools
Network Security
• Network Security Fundamentals
• Secure Network Design and Architecture
• VPNs and Secure Communication Protocols
Web Application Security
• Common Web Vulnerabilities: SQL Injection, XSS, CSRF
• OWASP Top Ten
• Web Application Security Testing
System and Data Security
• Operating System Security
• Data Protection and Encryption
• Access Control Mechanisms
Incident Response and Management
• Incident Response Planning
• Steps in Incident Handling
• Post-Incident Analysis and Reporting
Legal and Ethical Issues in Cybersecurity
• Cybersecurity Laws and Regulations
• Ethical Hacking and Responsible Disclosure
• Privacy Concerns and Data Protection
Emerging Trends and Future Directions
• Trends in Cybersecurity: AI, Machine Learning, Quantum Computing
• Future Challenges and Opportunities
• Continuous Learning and Professional Development
Hands-On Labs and Practical Exercises
• Vulnerability Scanning with Tools like Nmap and Nessus
• Penetration Testing Exercises
• Setting Up and Configuring Security Controls
Capstone Project
• Real-World Security Problem Solving
• Presentation and Defense of Findings
• Collaboration and Teamwork in Security Projects
Methodology
The training methodology integrates lectures, interactive discussions, collaborative group exercises, and illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical experience, emphasizing the application of learned techniques. This approach ensures that attendees return to their professional environments equipped with both the competence and self-assurance to effectively implement the acquired skills in their responsibilities
.
DATE:
1ST BATCH: 25th – 28th Feb, 2025
2ND BATCH: 12th – 15th Aug, 2025
25, Queen street, Alagomeji Bus Stop, Yaba, Lagos