● June 14th, 2025
The average income of a cyber-security analysts in Nigeria is N600,000, In the US in it was $102,600 (in 2020) according to the US Bureau of Labor Statistics (BLS).
A cybersecurity analyst is a trained cyber professional who specializes in network and IT infrastructure security.
The cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of cybercriminals, and actively seeks to anticipate and prevent these attacks.
The need for cyber security professionals is expected to have a 28% growth by 2026, this info is according to the Bureau of Labour Statistics.
The shocking thing is that this percentage is way higher than the national average, which means that the field will expand over the years.
Cyber attacks are a by-product of the digital revolution. Keeping this situation in mind, since the invention of the internet, it’s an obvious conclusion that Cybersecurity as a viable career option is here to stay and is booming really big.
It will therefore be a wise move to position yourself rightly by getting skilled in the cyber security career.
You won’t find so much cyber security professionals and that’s why it’s a highly rewarding career.
The next cohort of Our cyber security program is starting very soon and admission is currently open. It won’t take so long before we shut the door.
- Live Intructor-led classes
- 3 months of hand-on session
- Free extra 3 months of mentorship on completion
- Certificate on completion
- Replay available after each class
- Mini tasks after each class
- Group projects
Capstone projects - Interview preparation
- Career roadmap
- The tools and skills you need to develop diverse techniques, Tactics and Procedures to build strong security infrastructures for companies locally and internationally. (full syllabus below this page)
- How to explore Domains in Cybersecurity (Security Engineers, Governance and Compliance, Security operations, Risk management and Threat intelligence)
- Understand how to encode and decode, authorize, authenticate company's information and more
- People who want to transition into Cyber Security Tech Career and succeed at it no matter the country you are.
- People who have had interest in starting a career in I.T INFRASTRUCTURE and who want to learn the process on how to build and configure security set-ups for companies
- Junior security operations center analysts who want to build a solid career in Cyber security

24
Live Sessions

2k+
Students
Program details:
- Suitable for starters in Tech
- Class times :
- Saturdays: 3pm – 6pm (Nigerian time)
- Sundays: 3pm – 6pm
- Duration: 3 Months
- Replays available after each class
- Scroll down to see the tuition
- Free mentorship after the training
- Classes are done remotely. You don’t have to leave your location.
- What is Cybersecurity (Definition, terminologies, importance, and setbacks)
- The CIA Triad.
- Domains in Cybersecurity (Security Engineers, Governance and Compliance, Security operations, Risk
management and Threat intelligence) - A quiz on Cybersecurity.
- Cybersecurity History and Standards (Standards, regulations, and framework)
- MITRE ATT&CK and CYBERKILL CHAIN
- Techniques, Tactics and Procedures
- People, Process and Technologies
- Introduction to Cyber Threat
- Malware (Adware, Virus, Worms, Spyware, Trojan horse, Rootkits, Ransomware and fileless
malware) - Malware analysis on Anyrun and other platforms (Practical)
- Phishing
- SQL injection
- Cross-site scripting
- Zero days and DDOS
- Take home assignment on topic of discussion.
- Revision and discussion on lessons learnt in previous class
- Introduction to Cryptography (Encryption, Hashing, Decryption)
- A short quiz on how to encrypt and decrypt using different online encryptor.
- The use of Cyberchef for encoding and decoding information (Practical)
- Authentication and Authorization
- User Access and Privilege Access Manager
- Rules around access control
- Take home assignment on topic of discuss
- Introduction to personal security (Account safety and password management, MFA, Use of VPN, Message
and browser security, Software update and the impact of social engineering) - Endpoint/personal hardening (Windows Hardening, Linux hardening)
- Take home assignment
- Introduction to Open Source Intelligence (OSINT)
- Mini-project assessment
- Group presentations
- Live simulations of mini project using packet tracer (Practical)
- Discussion on challenges encountered and how to do it better
- Revision and discussion on lessons learnt in previous class
- Cybersecurity History and Standards (Standards, regulations, and framework)
- MITRE ATT&CK and CYBERKILL CHAIN
- Techniques, Tactics and Procedure
- People, Process and Technologies
- Setting up VirtualBox and Kali environment (Practical)
- Importation of Windows 10/11 into Virtual box
- Installation of packet tracer
- Installation of Wireshark for packet analysis
- Installation of hex editor
- Revision and discussion on lessons learnt in previous class
- Network basics (types, OSI model, TCP/IP model, Network protocols)
- Short quiz
- Setting up a device-internet connection using packet tracer (Practical)
- Configuration of switches, routers, and endpoints in a network (Practical)
- Creating a LAN, WAN and MAN network (Practical)
- Network Security
- Introduction to Network security (Firewalls, Wireless network security, packet analysis)
- Use of Wireshark for packet analysis (Practical)
- Hands on experience with Hex Editor (Practical)
- Mini-Project (Creation of packet filtering firewall rules)
- What is Darkweb
- Similarities and differences between the Darkweb, Deepweb and surface web
- How to access the Darkweb (Practical)
- Forums on the dark web
- REvil team and the Lazarus team activities on the Darkweb
- Take home assignment on the different Forums on the Darkweb
- Security effect arising from the use of unpaid/cracked software
- Disadvantages of free VPN
- Man-in-the-middle (MITM) attack
- Free/Public Wi-Fi connection and its bad sides
- Cross connection between LAN-WAN, WAN-WAN, etc. (Practical)
Network Intrusion and Detection Systems
- Data Loss Prevention System
- File Integrity System
- Cookies and their uses
- Data Privacy and why it should be enforced on data collection websites
- Take home assignment
- Risk Management and documentation
- Communication with stakeholders (users, IT Team, Security team, top management)
- Security Incidents, events, log management and monitoring (Practical)
- Incident response Playbook and reports (Practical)
- Follow up and Escalation of security incidents and its remediation
- Definition, types and listing of the OWASP Top 10 Vulnerabilities
- The use of OWASP ZAP for Vulnerability testing (Practical)
- Analysis of the vulnerabilities detected.
- How to remediate these vulnerabilities
- A short quiz on OWASP top 10
Sunday: - What is Metasploit, uses and how it can be used to exploit vulnerabilities
- Exploit DB: A platform to exploit any vulnerability except zero days
- Download and Installation of Metasploit (Practical)
- The use of ExploitDB for payload injection (Practical)
- Mini-project: Infection or delivery of malicious payloads to an endpoint.
- • Definition, Importance and Differences
- How to develop an BCDR
- BCDR testing and implementation
- Stakeholders that determine what should be in the BCDR plan.
- Importance of availability zones.
Sunday: Case studies and looking ahead - Cyber Breach and lessons learnt (Uber, Target and SolarWinds)
- Cybersecurity and the 2023 general election
- Digital Forensic and Incident response
- Trending topics in Cybersecurity (IoT, Cloud, AI, 5G)
- Interview Preparation
- Professional Exam Guide
- LinkedIn Optimization
- CV Review