Cybersecurity Industrial Training

The cybersecurity course provides a comprehensive understanding of essential concepts and practices to protect digital systems and sensitive data from cyber threats. Students will gain practical skills in network security, encryption, incident response, and access control, equipping them to mitigate risks and contribute to maintaining secure environments.

Program Cost​

Form: $2000   $2499

Course length

4 Months (based on learning path)

Bootcamp start date

TBD

Learn with live instructors

With guided mentorships

Project-based learning

Impress employers with hands-on skills

Job assistance provided

Work with a career coach

Cybersecurity Industrial Training

The cybersecurity course provides a comprehensive understanding of essential concepts and practices to protect digital systems and sensitive data from cyber threats. Students will gain practical skills in network security, encryption, incident response, and access control, equipping them to mitigate risks and contribute to maintaining secure environments.

Program Cost​

Form: $2,000   $2499

Course length

4 Months (based on learning path)

Bootcamp start date

TBD

Learn with live instructors

With guided mentorships

Project-based learning

Build an impressive portfolio

Job assitance

Work with a career coach

WHAT YOU’LL
LEARN

01

Security Governance, Network Security, Cyber Attacks, Web Application Security, Malware

02

  • Prepare for Cyber Security interviews by learning common interview questions and how to respond

03

Prepare for in-demand Cyber Security certifications such as CompTIA Security+ and CEH

04

Practical Cyber Security skills through hands on labs

05

Become an effective security technician in a business environment

06

Understand computer security, its functions, and its components

course CURRICULUM

Network Defense Essentials

Network Defense Essentials covers the fundamental concepts of information security and network defense. This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity.

The course gives a holistic overview of the key components of Information Security such as Identification, Authentication and Authorization, Virtualization and Cloud Computing, Wireless Networks, Mobile and IoT Devices, and Data Security. The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in cybersecurity.

NDE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. The purpose of the NDE certification is to recognize the competency and expertise of a professional in network defense and information security skills, thereby adding value to their workplace and employer.

What is Included?

14+ hrs of premium self-paced video training (available with your free CodeRed account)

Official eCourseware from EC-Council (available with your free CodeRed account)

CodeRed's Certificate of Achievement (available with your free CodeRed account)

11 Lab Activities in a simulated lab environment (Available Only with the Labs Package)

Proctored Exam and Official EC-Council Certification (Available Only with the Ultimate Package)

Ethical Hacking Essentials

Self Paced
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more.

This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity.

EHE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.

What is Included?
15+ hrs of premium self-paced video training (available with your free CodeRed account)

Official eCourseware from EC-Council (available with your free CodeRed account)

CodeRed's Certificate of Achievement (available with your free CodeRed account)

11 Lab Activities in a simulated lab environment (Available Only with the Labs Package)

Proctored Exam and Official EC-Council Certification (Available Only with the Ultimate Package)

Digital Forensics Essentials

Self Paced
Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer.

This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so much more! The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in digital forensics.

DFE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.


What is Included?
11+ hrs of premium self-paced video training (available with your free CodeRed account)

Official eCourseware from EC-Council (available with your free CodeRed account)

CodeRed's Certificate of Achievement (available with your free CodeRed account)

11 Lab Activities in a simulated lab environment (Available Only with the Labs Package)

Proctored Exam and Official EC-Council Certification (Available Only with the Ultimate Package)

Linux Fundamentals


Learning Objective: In this module, you will be introduced to various features of Linux. You will learn history, open source licenses, various Linux distributions, and Linux installation

Topics:
Getting Started with Linux
Accessing the Command Line

Managing Files from the Command Line

Matching File Names with Shell Expansions

Creating, Viewing, and Editing Text Files

Managing Local Users and Groups

Controlling Access to Files

Configuring and Securing SSH

Managing Networking

Archiving and Transferring Files

Introduction to Ethical hacking

Introduction to Ethical hacking

Basic Terms

Elements of Security

Phases of Hacking

Types of Hackers

Types of attack

Scope in Ethical hacking

Information Security Controls

Défense-in-Depth

Vulnerability Assessment

Penetration testing concepts and phases

Information security standards

Introduction to Compliance [PCI-DSS, HIPAA, ISO]

Footprinting and Reconnaissance

Introduction to footprinting

Footprinting through search engines

Types of footprinting

Advanced Google hacking techniques

Google Hacking database

Footprinting domain and subdomains

People search.

Passive Network footprinting

Mirroring a website

Monitoring website for tracking changes

Email footprinting

DNS, its types, and footprinting

Footprinting tools

Scanning Networks

Introduction and types of Scanning

Banner Grabbing

Nmap and various types of scanning

▪ ICMP scanning

▪ Ping sweep

▪ ICMP echo scanning

▪ TCP connect / full-open scan

▪ Stealth Scan / half-open scan

▪ Inverse TCP flag scanning

▪ Xmas scan

▪ ACK flag probe scanning

▪ IDLE/IPID header Ssan

▪ UDP scanning

Detecting and Evading Firewalls

Network discovery and mapping

Discovering networks from mobile device

Enumeration

What is enumeration?

Introduction to Ports and services

Common ports and services

Enumerating services

 

SNMP enumeration

▪ NetBIOS enumeration

▪ LDAP enumeration

▪ NTP enumeration

▪ SMTP enumeration

▪ FTP enumeration

▪ DNS enumeration

Vulnerability Analysis

Vulnerability Assessment Concepts

Vulnerability Assessment tools

Common Vulnerability Scoring System [CVSS]

Common Vulnerabilities and Exposures [CVE]

National Vulnerability Database [NVD]

Analysing a Vulnerability Assessment Report

 

System Hacking

Online and offline Password attacks

LM & NTLM

Cracking hashes

Password recovery tools

Keyloggers

Trojans

Rootkits

Steganography

Privilege Escalation

Malware Threats

Introduction to malwares

Introduction to virus and worms

Different types of viruses

Virus making

Create Payload

Network Attacks

Network sniffing

Sniffing tools

MITM attacks

Lawful Interception

DHCP attacks

DNS poisoning

Wireshark

Filters of Wireshark

Detection of Sniffing over a network

MAC flooding

MAC Spoofing

ARP poisoning

Social Engineering

Social Engineering Concepts

What is social engineering?

Phases of a social engineering attack

Social Engineering Techniques

Types of social engineering

Human-based social engineering

Computer-based social engineering

Mobile-based social engineering

Insider Threats

Impersonation on Social Networking Sites

Social engineering through impersonation on social networking sites

Social networking threats to corporate networks

Identity Theft

Social engineering countermeasures

Insider threats countermeasures

Identity theft countermeasures

Detect phishing emails

Anti-phishing toolbar

Denial-of-Service

DoS/DDoS Concepts

What is a Denial-of-Service attack?

What is distributed Denial-of-Service attack?

DoS/DDoS Attack Techniques

Basic categories of DoS/DDoS attack vectors

UDP, ICMP, and SYN flood attack

Ping of death and smurf attack

Fragmentation attack

HTTP GET/POST and slowloris attacks

Peer-to-peer attacks

Permanent Denial-of-Service attack

Distributed reflection Denial-of-Service (DRDoS)

Botnets

Organized cyber crime

Botnet ecosystem

Botnet Trojans

DDoS Case Study

Use of mobile devices as botnets for launching DDoS attacks

DDoS Case Study: Dyn DDoS Attack

Countermeasures

Detection techniques

DoS/DDoS countermeasure strategies

Honeypots

Introduction to honeypots

Installing a honeypot

Configuring honeypot

Analysing logs for attack detection in honeypots

Hacking Web Servers

• Introduction to web server and applications • Web Application threats
•HTTP headers
• Web Applicable hacking methodology

• Web application attacks

▪ Introduction to OWASP Top 10

▪ Encoding

▪ SQL

▪ CSRF

▪ XSS

▪ Directory traversal

▪ Command injection

▪ Logical flaws

▪ Fuzzing

▪ Session stealing

• Web server architecture
• Brute Force attacks
• Server misconfiguration
• Patch management and hotfixes

Hacking Wireless Networks

• Wireless concepts
• Wireless terminology
• Wireless encryption

•WEP vs WPA
•WEP vulnerabilities
• Attacking Access points • Rogue AP attacks
• MAC spoofing
• WPA2 attacks

• Wi-Fi sniffing
• Wireless auditing tools

Hacking Mobile platforms

Mobile platform attack vectors
• Mobile platform vulnerabilities •Introduction to OWASP top 10 mobile risks • SMSH’ing attacks
• Mobile malwares
• Rooting Android devices
• Android hacking tools
• Mobile Device management

IoT hacking

What is IoT?

How does IoT work?

IoT architecture

IoT application areas and devices

IoT technologies and protocols

IoT communication models

Challenges of IoT

Threat vs opportunity

IoT Attacks

IoT security problems

OWASP top 10 IoT vulnerabilities and obstacles

IoT attack surface areas

IoT threats

Hacking IoT devices

How to defend against IoT hacking

General guidelines for IoT device manufacturing companies

OWASP Top 10 IoT vulnerabilities solutions

IoT framework security considerations

IoT security tools

Cloud security

Cloud Computing Concepts

Introduction to cloud computing

Separation of responsibilities in cloud

Cloud deployment models

NIST cloud deployment reference architecture

Cloud computing benefits

Virtualization

Cloud Computing Threats

Cloud Computing Attacks

Cryptography

Cryptography Concepts

Cryptography

Types of cryptography

Government Access to Keys (GAK)

Encryption Algorithms

Ciphers

Data Encryption Standard (DES)

Advanced Encryption Standard (AES)

RC4, RC5, and RC6 algorithms

Twofish

The DSA and related signature schemes

Rivest Shamir Adleman (RSA)

Diffie-Hellman

Message digest (One-Way Hash) functions

Cryptography Tools

MD5 hash calculators

Hash calculators for mobile

Cryptography tools

Cryptography tools for mobile

Public Key Infrastructure (PKI)

Pretty Good Privacy (PGP)

SSL/TLS

Disk encryption

Disk encryption tools

Cryptography attacks

Cryptanalysis tools

Online MD5 decryption tools

CompTIA Security+ Certification Training - SY0-601 Exam Training

CompTIA Security+ (SY0-601) is a widely recognized and globally respected certification that validates the essential knowledge and skills required for a career in cybersecurity. It is an entry-level certification designed for professionals looking to establish a solid foundation in information security.

 

The SY0-601 exam covers a comprehensive range of topics, including network security, threats, vulnerabilities, identity management, access control, cryptography, risk management, and security operations. It equips candidates with the necessary expertise to identify and address security incidents, implement secure network architectures, and apply best practices to protect organizations from emerging threats.

 

By obtaining the CompTIA Security+ certification, individuals demonstrate their competence in key cybersecurity areas and their ability to navigate the constantly evolving landscape of security technologies and practices. The certification is vendor-neutral, meaning it focuses on fundamental security concepts rather than specific products, allowing professionals to apply their knowledge across various environments and technologies.

 

Having the SY0-601 certification not only enhances career prospects but also provides a strong foundation for further advanced certifications in cybersecurity. It is highly regarded by employers in both the public and private sectors, as it validates the skills necessary to secure networks, devices, and data effectively.

 

The SY0-601 exam consists of multiple-choice and performance-based questions, assessing both theoretical knowledge and practical application. It is recommended that candidates have at least two years of experience in IT administration with a focus on security before attempting the exam.

 

Overall, the CompTIA Security+ (SY0-601) certification serves as a significant milestone in a cybersecurity professional's career, showcasing their dedication to maintaining a high level of expertise in securing information and systems, while also providing a solid foundation for ongoing professional growth.

THE IBT ADVANTAGE

Growing Demand for Cybersecurity Professionals

The field of cybersecurity is experiencing rapid growth, driven by the escalating number and complexity of cyber threats. Both public and private sectors are investing heavily in cybersecurity measures to protect sensitive information and secure critical infrastructure. This increased investment has created a substantial demand for cybersecurity professionals, and the job market is teeming with opportunities. By becoming a cybersecurity engineer, you position yourself at the forefront of a booming industry with a multitude of career prospects.

Lucrative Salaries and Career Advancement

Cybersecurity professionals are highly sought after, and as a result, they enjoy attractive salaries and excellent benefits. The specialized skills and expertise required in this field command a premium in the job market. Furthermore, as you gain experience and demonstrate your capabilities, the potential for career advancement becomes significant. Cybersecurity engineers can progress to leadership positions, such as Chief Information Security Officer (CISO), and take on strategic roles in shaping an organization's security posture.

Global Relevance and Job Security

Cybersecurity is a global concern affecting organizations of all sizes and industries worldwide. The need for cybersecurity professionals extends beyond borders, making it a globally relevant field. By becoming a cybersecurity engineer, you equip yourself with skills that are in demand not only locally but also internationally. Job security in the field of cybersecurity is robust, as the increasing threat landscape ensures a constant need for skilled professionals to protect against attacks and mitigate risks.

Variety and Diversity of Work

Cybersecurity is a multifaceted field that offers a diverse range of career options. As a cybersecurity engineer, you may find yourself involved in various activities, including vulnerability assessments, incident response, network monitoring, secure coding, or security architecture design. The field encompasses multiple domains, such as network security, application security, cloud security, and more. This variety allows you to explore different areas of interest, specialize in specific domains, or even transition between roles to keep your work engaging and exciting.

Our Talents Work Here
ti.webp
unicard_ltd_logo.jpeg
onecall.png
ibm.png
Fourth_new-logo-e1678350336847.png

IBT grads have achieved life-changing growth. You can too.

95%

of graduates get matched with companies as interns in 4-8 weeks

8%

of our graduates accept regular offers the first 4-6 weeks after graduating

4%

Find employment before graduating

Our talentstories

We connect learners with peers and experts from around the world, facilitating networking and collaboration opportunities.

"Enrolling in this course proved career-defining, offering invaluable knowledge and a guaranteed internship. It set me on a path to success, delivering everything promised—free certification, ongoing learning, and the ability to pass my sec+ on the first try."

Solomon Awuku Cybersecurity Intern

Upon completing the class, I felt confident and prepared to embark on a career in cybersecurity. The skills and knowledge I acquired have already proven invaluable, as I find myself better equipped to tackle real-world challenges and contribute to the protection of digital assets.

Raymond A. CYBERSECURITY ANALYST BLUE CROSS

The program will provide you with a great opportunity to switch from any work background to the data science industry. The lectures were practical and hands-on, with real-life data to work on

Paul Adeyanju Data Scientist, Fourth

"IBT Learning is an outstanding tech school, with experienced teachers. Graduates gain hands-on experience with management tools such as Git, Maven, Nexus, SonarQube, Ansible, Docker for microservices, Kubernetes for container orchestration, and Terraform for Infras as Code"

Landric N DevOps Engineer, Transportation Insight

FLEXIBLE TUITION
MADE EASY

We offer flexible payment options tailored to your needs. Choose a plan that aligns with your budget, empowering you to focus on honing your skills without financial constraints.

One-time

Pay upfront and save on total cost

Amount

$2,000

Start Date

TBD

Monthly

Break your payment into monthly cycles for a more flexible payment option. No credit score required

Amount

$500

per month / 5 months

$2,500 in total payment

Bootcamp Start Date

TBD

Affirm

Apply for a low-interest loan with Affirm and make small monthly payments. Subject to credit score

Monthly

$125 /month with

$0 down today

$2,000 total

Scholarship Deadline

TBD

Deferred Plan

Apply for deferred payment with our preferred partner Climb Credit and start paying for your program after completion. Subject to credit score.

Monthly

$0

study now, pay later

$2,500 total

Scholarship Deadline

TBD

Women in Tech Scholarship

The Women in Tech Scholarship is available to eligible candidates to gain access to world-class training from IBT Learning

Covers

100%

Of tuition Covered

Student pays $75 application + admin fee only

Scholarship Deadline

26/02/2024

Not sure?Talk to our advisors

Our program advisors will answer any questions you have about the Data Science Training Program and what it’s like to learn with IBT Learning. They’ll also discuss your background, transferable skills, interests, career goals, and more.

    Not sure?Talk to our advisors

    Our program advisors will answer any questions you have about the Data Science Training Program and what it’s like to learn with IBT Learning. They’ll also discuss your background, transferable skills, interests, career goals, and more.

      WHY IBT learning

      We connect learners with peers and experts from around the world, facilitating networking and collaboration opportunities.

      World-Class
      Instructors

      We take pride in the quality of highly sought-after instructors at IBT Learning. Our up-to-date curriculum is designed and taught by the best-in-class IT professionals.

      Global Networking

      We take pride in the quality of highly sought-after instructors at IBT Learning. Our up-to-date curriculum is designed and taught by the best-in-class IT professionals.

      95% Chances Of Getting
      Hired By Top Companies

      Our track record speaks for itself. We have a high placement rate, and our graduates have gone on to work at some of the most prestigious tech companies worldwide. We don't just aim to prepare you for the tech world—we guarantee your success.

      preview class
      recordings

      Linus
      Fundamentals

      HashiCorp
      Terraform

      Linus
      Fundamentals

      YOUR QUESTIONS, ANSWERED

      What are the prerequisites to take this course

      Our courses are crafted and curated to take you from zero to job ready. A background in IT is not required to enroll and take part in this course. However, some basic understanding or experience in technology can help you understand the concepts faster, although not required. What is pertinent is your desire to learn.

      Why should I enroll for this course?

      You will gain the essential skills and knowledge needed to protect digital assets, secure critical systems, and make a meaningful impact in the ever-growing field of cybersecurity.

      What kind of Job assistance does IBT Learning offer

      We match you with one-on-one mentors and coaches that will guide you and get you prepared for the job market.