Cyber Security

Course Overview

Fundamentals of Information Systems Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. It opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today.

9 weeks

Online, Virtual, Onsite

Go from Zero to Fluent with Expert Guidance. Learn by getting first-hand help from world-class practitioners who use various Cyber Security principles every day. Our instructors bring the latest techniques from the field straight to the classroom. Our curriculum emphasises real-world relevance and offers plenty of opportunity for practice through work-alongs, labs, and projects that mirror on-the-job applications.

Once you enroll, we equip you with our self-paced preparatory lessons to set you up for success. Dive into essential Cyber Security concepts to gain a common vocabulary and start collaborating with classmates on day one.

Get guidance, feedback, and more from experts who are dedicated to supporting your learning and career goals. Instructors are on hand in class and during office hours to offer real-time support and help you turn ideas into action.

At Ehizua Hub, we are committed to helping people get affordable access to education and futureproof their career. Whether you want to level up or start a new career, we offer a range of flexible payment plans so you can achieve your goals today and pay at your own pace.

  • Installment payment
  • Full payment

We allow you settle with the payment plan of your choice, using different methods that will be made available to you both on our website and at our learning center.

Once you begin the course, your instructor/mentor will ensure that all the key concepts are well understood before you move on to the next modules. This ensures that you develop the

confidence and skills needed to progress through the course. If you need additional support at any point, your instructor will provide 1:1 guidance to bring you up to speed.

What You will Learn

Milestone 1 Milestone 2 Milestone 3 Milestone 4
Fundamentals of Information Systems Security Security Strategies in Windows Platforms and Applications Cyberwarfare & Social Psychology Ethics for the Business Professional
Legal Issues in Cybersecurity Security Strategies in Linux Platforms and Applications Wireless and Mobile Device Security Principles of Microeconomics
Managing Risk in Information Systems Network Security, Firewalls, and VPNs Fundamentals of Python Introduction to Project Management
Security Policies and Implementation Issues Hacker Techniques, Tools, and Incident Handling Communication and Technical Writing Access Control
Auditing IT Infrastructures for Compliance Internet Security: How to Defend Against Online Attackers Introduction to Statistics System Forensics, Investigation, and Response
Milestone Project Milestone Project Milestone Project Milestone Project
Milestone 1 Milestone 2 Milestone 3 Milestone 4
Fundamentals of Information Systems Security Security Strategies in Windows Platforms and Applications Cyberwarfare & Social Psychology Ethics for the Business Professional
Legal Issues in Cybersecurity Security Strategies in Linux Platforms and Applications Wireless and Mobile Device Security Principles of Microeconomics
Managing Risk in Information Systems Network Security, Firewalls, and VPNs Fundamentals of Python Introduction to Project Management
Security Policies and Implementation Issues Hacker Techniques, Tools, and Incident Handling Communication and Technical Writing Access Control
Auditing IT Infrastructures for Compliance Internet Security: How to Defend Against Online Attackers Introduction to Statistics System Forensics, Investigation, and Response
Milestone Project Milestone Project Milestone Project Milestone Project

Career Prospect

Cyber security is a fast-growing field that is in high demand. Our cyber security analysts help to protect an organisation by employing a range of technologies and processes to prevent, detect and manage cyber threats. Some of the areas you can function as a cyber security analyst include:

  • Security Specialist
  • Incident Responder
  • Security Analyst
  • Security Administrator
  • Security Manager
  • Security Auditor
  • Forensic Expert

Gain Vital Skills with Universal Relevance

Application of technical strategies, tools, and techniques to secure data and information for a customer or client. Adherence to a high standard of ethical behavior. Use of research in both established venues and innovative applications to expand the body of knowledge in information assurance. Application of principles of critical thinking to solve the problems and meet the challenges of the ever-changing environments of cybersecurity creatively and systematically. Mastery of the skills necessary to move into leadership roles in companies, agencies, divisions, or departments.

Tap Into a Valuable Professional Network

Let us help you form real connections that can change the course of your career. Meet practitioners and peers who can help you succeed through our global alumni network. Graduate with an industry-recognized certificate from Torrens University Australia and stand a chance to further your study in Australia.

Salary Range

Salaries for a cyber security analyst varies depending on the sector you work in, the type of employer (e.g. public or private sector), your skills and experience, and your location. However, with your technical expertise in the profession, you are exposed to an average salary range of N201,000 (lowest average) to N 500,000 (highest average).

Organizations to Work With

Cyber security professionals are employed by a variety of organisations across both the public and private sector. You may be working on the security of your organisation and/or offering security services or consultancy to other companies.

These are just a few examples of the types of organisations you could work for:

  • Information technology companies and network providers
  • Financial services institutions.
  • Security consultancies.
  • Professional services.
  • Government parastatals.
  • Integrated power utility firms.
  • Transport companies, e.g., airlines
  • Media Outlets.
  • Schools, colleges, and universities.

Cyber security (also known as Information Security Analysis) is a popular and promising career. Cyber security analysts are among those exploring the world today and their space is not limited to the above-listed. With your right combination of skills, you are certain to always find a space in the profession.

Course Fee

  • Onsite (Awoyaya Hub): N150,000 (One Hundred and Fifty Thousand Naira Only).
  • Live Virtual Training: N150,000 (One Hundred and Fifty Thousand Naira Only).
  • Online (Self-Paced Video learning): N70,000 (Seventy Thousand Naira Only).

Learning Objectives

At the end of the course students will be able to do the following.

  • Gain knowledge about securing both clean and corrupted systems, protect personal data, and secure computer networks.
  • Understand key terms and concepts in cyber law, intellectual property and cybercrimes, trademarks, and domain theft.
  • Examine secure software development practices.
  • Understand principles of web security.
  • Incorporate approaches for incident analysis and response.
  • Incorporate approaches for risk management and best practices.
  • Understand of cryptography, how it has evolved, and some key encryption techniques used today.
  • Develop an understanding of security policies (such as confidentiality, integrity, and availability), as well as protocols to implement such policies.
  • Gain familiarity with prevalent network and distributed system attacks, defenses against them, and forensics to investigate the aftermath.
  • Analyze and evaluate the cyber security needs of an organization.
  • Determine and analyze software vulnerabilities and security solutions to reduce the risk of exploitation.
  • Measure the performance and troubleshoot cyber security systems

Our Latest Featured Courses

18 Hours

Online, Virtual, Onsite

18 Hours

Online, Virtual, Onsite

4 Months

Online, Virtual, Onsite

We view the field of creative technology as helping to “disrupt” the way people today interact with computers, and usher in a more integrated, immersive experience.

Subscribe to our Newsletter

Newsletter

Connect with us:

Ehizua Hub Locations

Copyright @2020 Ehizua. All rights reserved