Cyber Security
Cybersecurity training is designed to equip you with the expertise needed to protect digital systems, networks, and data from unauthorized access and cyber threats. It encompasses various types of training, including foundational, specialized, certification programs, and hands-on exercises. Key topics covered include understanding cyber threats, security protocols, incident response, and legal compliance.
Curriculum Breakdown
1
Introduction to Cyber Security
- Definition and Importance of Cyber Security
- History and Evolution of Cyber Threats
- Key Terms and Concepts in Cyber Security
- Overview of Cyber Crimes, Threats, and Attack Vectors
2
Foundations of Computing & Networking
- Operating Systems: Windows, Linux, macOS
- Networking Fundamentals: OSI Model, IP Addressing, etc.
- Common Network Devices and their Functions
3
Information Security Principles
- CIA Triad: Confidentiality, Integrity, Availability
- Authentication, Authorization, and Accounting (AAA).
- Risk Management: Asset, Threats, Vulnerabilities, Exposure, Risk and Exploits.
- Security Policies and Procedures – (Creation of a mock security policy, Role of user training in policy adherence)
4
Offensive and Defensive Cybersecurity
- CIA Triad: Confidentiality, Integrity, Availability
- Red Team Vs Blue Team.
- Cyber Kill Chain.
- System Testing, Vulnerability Assessment and Penetration Testing
5
Cryptography Basics
- History and Basics of Cryptography
- Symmetric vs. Asymmetric Encryption.
- Public Key Infrastructure (PKI).
- Digital Signatures and Certificates – (How SSL/TLS works in securing websites)
6
Threats and Attack Vectors
- Malware: Viruses, Worms, Trojans, Ransomware
- Phishing, Spear Phishing, and Whaling
- Denial of Service (DoS) and Distributed DoS (DDoS) Attacks
- Man-in-the-Middle Attacks, SQL Injection, and Cross-Site Scripting
7
Network Security
- Firewalls: Types and Operations
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
- Security and Information Event Management (SIEM)
- Virtual Private Networks (VPNs)
- Wireless Network Security
8
Endpoint Security
- Antivirus and Antimalware Solutions
- Endpoint Detection and Response (EDR, XDR)
- Patch Management and Software Updates
- Mobile Device Management (MDM)
- Hardening of Operating Systems
9
Web and Application Security
- Web Application Architectures
- OWASP Top 10 Vulnerabilities
- Secure Coding Practices
- Web Application Firewalls (WAFs)
10
Cloud Security
- Basics of Cloud Computing: SaaS, PaaS, IaaS
- Cloud Security Best Practices
- Cloud Security Threats and Challenges
- Cloud Service Provider Security: AWS, Azure, Google Cloud
11
Incident Response and Forensics
- Phases of Incident Response
- Digital Forensics Basics
- Evidence Collection and Preservation
- Forensic Analysis Tools and Techniques
12
Cyber Security Career and certifications
- Different Roles in Cyber Security: Analyst, Penetration Tester, etc.
- Common Cyber Security Certifications: CISSP, CEH, CISM
- Building a Cyber Security Portfolio
- Networking and Community Involvement
Course Benefits
- Internship Placement
- Build an online portfolio wih 6 high-end project
- One on one mentorship and coaching session
- Study group
- Career mapping
- Recommendation/reference letter
- Job interviewpPreparation
- Gain online presence for job prospect visibility
- Coaching and mentoring
Job Opportunities
- Security Analyst/Security operation center(SOC) analyst
- Security Engineer
- Penetration Tester/Ethical Hacker
- Incident Responder
- Security Architect
- Forensic Analyst
- Security Researcher
- Security Consultant
Contact Evolve HQ
Enroll for Cyber Security by Evolve HQ
I embarked on a transformative journey into the world of cyber security through an immersive and enlightening series of classes by EVolve HQ. That provided me with a solid foundation in this dynamic field. The skills and knowledge I acquired have not only broadened my understanding of cyber security but have also equipped me with the tools necessary to navigate the intricate landscape of digital security.

Yvonne otuoniyo
Nigeria
The Cybersecurity training with EvolveHQ so far has been beneficial for a newcomer like me. The content is presented in a way that’s understandable, and the practical exercises have helped reinforce my understanding. I appreciate the balanced approach, making it accessible for beginners like me.

Ridwan Ogunbela
Nigeria
Meet Our Faculty
Meet our world class, competent and ever dedicated tutors who will be guiding you through the journey

Adewale Mustafa
Application Security Engineer, at FCMB
Adewale Mustapha embarked on his cybersecurity journey as a cyber security analyst at CyberSOC Africa, a leading MSSP managed security service provider renowned for its cutting-edge security solutions across Africa. In this role, Adewale honed his skills in threat analysis, real-time alerting, and monitoring using a suite of cybersecurity tools, including SIEMs and firewalls.
Know More about evolve HQ Courses
Lorem ipsum dolor sit amet, consectetur elit. Ut elit tellus, luctus nec adipiscing
Explore Other Courses from Evolve HQ
All programs are designed to prepare you for the future in the tech world

Excel Mastery for Human Resources

Ethical Hacking & Penetration testing

Governance, Risk & Compliance (GRC)

Security Operations Centre (SOC)

Artificial Intelligence Automation
