Call +233 55 050 3980 Email: info@tertiarycourses.com.gh

Industrial 4.0 Certification Training in Ghana - Upskill and Lifelong Learning

Advanced Cyber Security Course

Step into the world of advanced cybersecurity with our in-depth course, meticulously designed for individuals looking to enhance their defensive toolkit. This program delves deep into sophisticated techniques and tools, including the prowess of Port Scanning using NMap, thereby equipping you with skills to detect and counteract potential cyber threats at their nascent stages.

Further enhancing your cybersecurity arsenal, the course sheds light on both Symmetric and Asymmetric Cryptography, unraveling their intricacies and practical applications. Moreover, with hands-on training on Vulnerabilities Scanning using Nessus, you'll be primed to identify and address digital weak spots efficiently. Our advanced cybersecurity course not only amplifies your skill set but also prepares you to be the linchpin in any organization's defense against cyber threats.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Code: M549

Course Booking

₵2,000.00

Course Date

Course Time

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to info@tertiarycourses.com.gh and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Topic 1: Port Scanning

  • OSI Model
  • TCP/IP and UDP Protocols
  • IPv4 and IPv6
  • Network Ports
  • Ping and Traceroute
  • Port Scanning Using NMap

Topic 2 – Cryptography

  • Overview of Cryptography and Encryption
  • Classic Cryptography
  • Symmetric Key Encryption
  • Asymmetric Key Encryption
  • WiFi Security
  • Secure Key Exchange and Digital Signature
  • Hashing Function Cryptography

Topic 3 – Vulnerability Scanning

  • Overview of Vulnerability Scanning
  • Vulnerability Scanning Tools
  • Install Nessus
  • Perform Vulnerability Scanning Using Nessus
  • Common Types of Vulnerabilities
  • Cross Site Scripting (XSS) Vulnerability

Course Info

Prerequisite:

Nil

Software Requirement:

Job Roles

  • IT Manager
  • Network Administrator
  • Systems Administrator
  • Human Resources Manager
  • Small Business Owner
  • IT Support Specialist
  • Data Protection Officer
  • Risk Management Specialist
  • Compliance Officer
  • Operations Manager
  • Financial Controller
  • Marketing Manager (digital-focused)
  • E-commerce Site Operator
  • Customer Support Manager
  • Software Developer

Trainers

Muhammed Siraj: Muhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well.

Skillset:

  • Degrees in IT, Economics, Psychology. Currently pursuing his PhD in Computer Science (Security in Computing field)
  • Certified CEH, CHFI, Hardware repairs and maintenance.
  • Data mining, Office automation, filemaker, Fraud detection, Blockchain, Hardware repairs, Google Power Searcher, Drupal/Laravel/CakePHP developer.
  • Proficient in Python, Ruby, PHP, Java, Solidity, VBA, Google Apps Script, Javascript, HTML, CSS, SQL.

Dr. Touraj Khodadadi: Dr. Touraj Khodadadi is currently an assistant professor of cyber security. Touraj has more than 10 years of experience in IT industry, Touraj has huge experience in (Cyber Security - Consultation - Risk Management – Security Training - Incident Handling - PCI Implementation -Penetration Tester – Security assessment - Develop security policies- Auditing - Code reviewing – Digital Transformation). In addition, he authored and co-authored 30 international journals and conference papers concerning various aspects of computer, information and network security. His main research interests include authentication systems, network security, cryptography, graphical passwords, authentication systems and cloud computing security. Apart from teaching and research activities at the university, he has served as an editor and reviewer for several international journals and conferences. He is also members of several review panels for master and doctoral research defense.

Customer Reviews (6)

I WAS VERY HAPPY ABOUT COURSE Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
TO MOTIVATE YOUR STUDENT (Posted on 4/3/2023)
I had enjoyed every part of the course, expanded knowledge. Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
So far I am impressed with all parts (Posted on 2/26/2023)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Additional lecturers will be required to enhance the course
Very presentable and I am pleased with the entire program (Posted on 8/11/2022)
wll recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
The Lecturer is knowledgeable about the course and I suggest more of his kind will be marvelous (Posted on 6/13/2022)
Very insightful Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
By extending the training time (Posted on 11/10/2021)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More practicals be given,even though mine was epic (Posted on 9/27/2021)

Write Your Own Review

You're reviewing: Advanced Cyber Security Course

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

You May Be Interested In These Courses