fbpx
NEXT CLASS STARTS

● June 15, 2024

Days
Hours
Minutes
Seconds
Are you INTERESTED IN JUMPING ONE OF THE MOST DEMANDED JOBS OF THE 21ST CENTURY ?

The average income of a cyber-security analysts in Nigeria is N600,000, In the US in it was $102,600 (in 2020) according to the US Bureau of Labor Statistics (BLS).

A cybersecurity analyst is a trained cyber professional who specializes in network and IT infrastructure security.

The cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of cybercriminals, and actively seeks to anticipate and prevent these attacks.

The need for cyber security professionals is expected to have a 28% growth by 2026, this info is according to the Bureau of Labour Statistics.

The shocking thing is that this percentage is way higher than the national average, which means that the field will expand over the years.

Cyber attacks are a by-product of the digital revolution. Keeping this situation in mind, since the invention of the internet, it’s an obvious conclusion that Cybersecurity as a viable career option is here to stay and is booming really big.

It will therefore be a wise move to position yourself rightly by getting skilled in the cyber security career.

You won’t find so much cyber security professionals and that’s why it’s a highly rewarding career.

The next cohort of Our cyber security program is starting very soon and admission is currently open. It won’t take so long before we shut the door.

Student Reviews

What Our Students Say

The program exceeded my expectations in terms of its educational value and practical usefulness. The curriculum was thoughtfully designed, providing a comprehensive understanding of the subject matter. The knowledge and skills I gained through the program have proven to be incredibly helpful in my academic and professional pursuits. I am grateful for the opportunity to have been a part of such a rewarding educational experience.

Olalekan felix Oluwafemi

  • Ratings

At first, I thought it wouldn’t be easy to get along with the program. but the program was straight forward and I gained knowledge on cyber security and am willing to gain more. The detailed class and materials helped. Shout out to Trevotech for this opportunity.

TONADE OLAYIPO AFOLABI

  • Ratings

The Cyber Security program were actually very interesting as I learnt a lot about how to secure Data in Network using different kinds Tools. The part that interest me most was the practical carried out on each course. The Instructor was absolutely fantastic with his approach both on his attitude and execution.

Emmanuel Offiong Esara

  • Ratings

I’m so lucky to be one of the student for this program. The tutor teaches excellently and I gained beginner experience in cyber security.

Agunbiade Abiodun David

  • Ratings

After completing the fundamentals of the cybersecurity program, I found the experience to be incredibly informative and engaging. The content covered all the essential basics comprehensively, providing a solid foundation in cybersecurity principles and practices.

While the fundamentals were excellent, I am eager to continue learning and exploring the more advanced aspects of cybersecurity to further enhance my knowledge and skills in this field.

Thank you Trevotech Academy.

JOMBO QUINCY IGHIWIYISI

  • Ratings
  • Live Intructor-led classes
  • 3 months of hand-on session
  • Free extra 3 months of mentorship on completion
  • Certificate on completion
  • Replay available after each class
  • Mini tasks after each class
  • Group projects
    Capstone projects
  • Interview preparation
  • Career roadmap
WHAT YOU WILL GAIN
WHO THIS PROGRAM IS FOR
image

24

24

24

Live Sessions

image

2k+

2k+

2k+

Students

THE CURRICULUM IS FOUND BELOW:

WEEK 1
UNDERSTANDING THE CONCEPT OF CYBER SECURITY
  • What is Cybersecurity (Definition, terminologies, importance, and setbacks)
  •  The CIA Triad.
  • Domains in Cybersecurity (Security Engineers, Governance and Compliance, Security operations, Risk
    management and Threat intelligence)
  • A quiz on Cybersecurity.
  • Cybersecurity History and Standards (Standards, regulations, and framework)
  • MITRE ATT&CK and CYBERKILL CHAIN
  • Techniques, Tactics and Procedures
  • People, Process and Technologies
WEEK 2
COMMON THREATS, Sophisticated attacks on devices and networks
  • Introduction to Cyber Threat
  •  Malware (Adware, Virus, Worms, Spyware, Trojan horse, Rootkits, Ransomware and fileless
    malware)
  • Malware analysis on Anyrun and other platforms (Practical)
  • Phishing
  • SQL injection
  • Cross-site scripting
  • Zero days and DDOS
  • Take home assignment on topic of discussion.
WEEK 3
Cryptography, Authorization and Authentication
  • Revision and discussion on lessons learnt in previous class
  • Introduction to Cryptography (Encryption, Hashing, Decryption)
  • A short quiz on how to encrypt and decrypt using different online encryptor.
  • The use of Cyberchef for encoding and decoding information (Practical)
  • Authentication and Authorization
  • User Access and Privilege Access Manager
  •  Rules around access control
  • Take home assignment on topic of discuss
WEEK 4
Endpoint and personal security
  • Introduction to personal security (Account safety and password management, MFA, Use of VPN, Message
    and browser security, Software update and the impact of social engineering)
  • Endpoint/personal hardening (Windows Hardening, Linux hardening)
  • Take home assignment
  • Introduction to Open Source Intelligence (OSINT)
  • Mini-project assessment
  • Group presentations
  •  Live simulations of mini project using packet tracer (Practical)
  • Discussion on challenges encountered and how to do it better
WEEK 5
SETTING-UP THE VIRTUAL SPACE & ENVIRONMENT
  • Revision and discussion on lessons learnt in previous class
  • Cybersecurity History and Standards (Standards, regulations, and framework)
  • MITRE ATT&CK and CYBERKILL CHAIN
  • Techniques, Tactics and Procedure
  •  People, Process and Technologies
  • Setting up VirtualBox and Kali environment (Practical)
  • Importation of Windows 10/11 into Virtual box
  •  Installation of packet tracer
  •  Installation of Wireshark for packet analysis
  • Installation of hex editor
WEEK 6
NETWORK BASICS, NEXTWORK SECURITY
  • Revision and discussion on lessons learnt in previous class
  •  Network basics (types, OSI model, TCP/IP model, Network protocols)
  • Short quiz
  • Setting up a device-internet connection using packet tracer (Practical)
  • Configuration of switches, routers, and endpoints in a network (Practical)
  • Creating a LAN, WAN and MAN network (Practical)
  •  Network Security
  • Introduction to Network security (Firewalls, Wireless network security, packet analysis)
  • Use of Wireshark for packet analysis (Practical)
  • Hands on experience with Hex Editor (Practical)
  • Mini-Project (Creation of packet filtering firewall rules)
WEEK 7
DARK WEB, Unsecure use of application and devices
  • What is Darkweb
  • Similarities and differences between the Darkweb, Deepweb and surface web
  • How to access the Darkweb (Practical)
  • Forums on the dark web
  • REvil team and the Lazarus team activities on the Darkweb
  • Take home assignment on the different Forums on the Darkweb
  • Security effect arising from the use of unpaid/cracked software
  • Disadvantages of free VPN
  • Man-in-the-middle (MITM) attack
  • Free/Public Wi-Fi connection and its bad sides
  • Cross connection between LAN-WAN, WAN-WAN, etc. (Practical)
WEEK 8
Technologies used in Cybersecurity & DOCUMENTATION

 Network Intrusion and Detection Systems

  • Data Loss Prevention System
  • File Integrity System
  •  Cookies and their uses
  • Data Privacy and why it should be enforced on data collection websites
  • Take home assignment
  • Risk Management and documentation
  • Communication with stakeholders (users, IT Team, Security team, top management)
  • Security Incidents, events, log management and monitoring (Practical)
  • Incident response Playbook and reports (Practical)
  • Follow up and Escalation of security incidents and its remediation
WEEK 9
OWASP TOP 10, Familiarities with Metasploit and Exploit DB
  • Definition, types and listing of the OWASP Top 10 Vulnerabilities
  • The use of OWASP ZAP for Vulnerability testing (Practical)
  • Analysis of the vulnerabilities detected.
  • How to remediate these vulnerabilities
  •  A short quiz on OWASP top 10
    Sunday:
  • What is Metasploit, uses and how it can be used to exploit vulnerabilities
  • Exploit DB: A platform to exploit any vulnerability except zero days
  • Download and Installation of Metasploit (Practical)
  • The use of ExploitDB for payload injection (Practical)
  • Mini-project: Infection or delivery of malicious payloads to an endpoint.
WEEK 10
Business Continuity and Disaster Recovery Plan (BCDR), CASE STUDIES
  • • Definition, Importance and Differences
  • How to develop an BCDR
  • BCDR testing and implementation
  • Stakeholders that determine what should be in the BCDR plan.
  • Importance of availability zones.
    Sunday: Case studies and looking ahead
  • Cyber Breach and lessons learnt (Uber, Target and SolarWinds)
  • Cybersecurity and the 2023 general election
  • Digital Forensic and Incident response
  • Trending topics in Cybersecurity (IoT, Cloud, AI, 5G)
WEEK 11&12
Rubbing minds and Capstone project
PLUS 3 MONTHS FREE MENTORSHIP PLAN
image

20

20

20

Live Sessions

image

2k+

2k+

2k+

Students

image

90%

90%

90%

Certified

Student Reviews

What Our Students Say

The program exceeded my expectations in terms of its educational value and practical usefulness. The curriculum was thoughtfully designed, providing a comprehensive understanding of the subject matter. The knowledge and skills I gained through the program have proven to be incredibly helpful in my academic and professional pursuits. I am grateful for the opportunity to have been a part of such a rewarding educational experience.

Olalekan felix Oluwafemi

  • Ratings

At first, I thought it wouldn’t be easy to get along with the program. but the program was straight forward and I gained knowledge on cyber security and am willing to gain more. The detailed class and materials helped. Shout out to Trevotech for this opportunity.

TONADE OLAYIPO AFOLABI

  • Ratings

The Cyber Security program were actually very interesting as I learnt a lot about how to secure Data in Network using different kinds Tools. The part that interest me most was the practical carried out on each course. The Instructor was absolutely fantastic with his approach both on his attitude and execution.

Emmanuel Offiong Esara

  • Ratings

I’m so lucky to be one of the student for this program. The tutor teaches excellently and I gained beginner experience in cyber security.

Agunbiade Abiodun David

  • Ratings

After completing the fundamentals of the cybersecurity program, I found the experience to be incredibly informative and engaging. The content covered all the essential basics comprehensively, providing a solid foundation in cybersecurity principles and practices.

While the fundamentals were excellent, I am eager to continue learning and exploring the more advanced aspects of cybersecurity to further enhance my knowledge and skills in this field.

Thank you Trevotech Academy.

JOMBO QUINCY IGHIWIYISI

  • Ratings