Call +233 55 050 3980 Email: info@tertiarycourses.com.gh

Industrial 4.0 Professional Training - Best Cyber Security Training in Ghana

Advanced Cyber Security Course

Step into the world of advanced cybersecurity with our in-depth course, meticulously designed for individuals looking to enhance their defensive toolkit. This program delves deep into sophisticated techniques and tools, including the prowess of Port Scanning using NMap, thereby equipping you with skills to detect and counteract potential cyber threats at their nascent stages.

Further enhancing your cybersecurity arsenal, the course sheds light on both Symmetric and Asymmetric Cryptography, unraveling their intricacies and practical applications. Moreover, with hands-on training on Vulnerabilities Scanning using Nessus, you'll be primed to identify and address digital weak spots efficiently. Our advanced cybersecurity course not only amplifies your skill set but also prepares you to be the linchpin in any organization's defense against cyber threats.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Code: M549

Fee

₵2,000.00

Course Date

Course Time

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to info@tertiarycourses.com.gh and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.

Course Details

Topic 1: Port Scanning

  • OSI Model
  • TCP/IP and UDP Protocols
  • IPv4 and IPv6
  • Network Ports
  • Ping and Traceroute
  • Port Scanning Using NMap

Topic 2 – Cryptography

  • Overview of Cryptography and Encryption
  • Classic Cryptography
  • Symmetric Key Encryption
  • Asymmetric Key Encryption
  • WiFi Security
  • Secure Key Exchange and Digital Signature
  • Hashing Function Cryptography

Topic 3 – Vulnerability Scanning

  • Overview of Vulnerability Scanning
  • Vulnerability Scanning Tools
  • Install Nessus
  • Perform Vulnerability Scanning Using Nessus
  • Common Types of Vulnerabilities
  • Cross Site Scripting (XSS) Vulnerability

Course Info

Prerequisite:

Nil

Software Requirement:

Job Roles

  • IT Manager
  • Network Administrator
  • Systems Administrator
  • Human Resources Manager
  • Small Business Owner
  • IT Support Specialist
  • Data Protection Officer
  • Risk Management Specialist
  • Compliance Officer
  • Operations Manager
  • Financial Controller
  • Marketing Manager (digital-focused)
  • E-commerce Site Operator
  • Customer Support Manager
  • Software Developer

Trainers

Dr. Muhammed Siraj is a seasoned IT and cyber security professional with over 20 years of experience in higher education, ICT leadership, and digital transformation. As the Acting Director of ICT at Wisconsin International University College, Ghana, he oversees the university’s information security program, implementing robust security controls, monitoring incidents, and ensuring compliance with regulatory requirements. His expertise is reinforced by globally recognized certifications, including Certified Ethical Hacker (CEH) and Certified Hacking and Forensic Investigator (CHFI), alongside extensive hands-on experience in cyber security operations, fraud detection, and digital forensics

In addition to his leadership roles, Dr. Siraj is a cyber security and forensics instructor who has trained diverse groups ranging from law enforcement officers and customs officials to bankers and IT professionals. He has developed and delivered specialized courses in cyber security, fraud investigation, and digital forensics, while also mentoring students and IT teams in secure system administration, penetration testing, and blockchain security. With a research background in blockchain security and consensus mechanisms, he combines academic rigor with practical expertise, making him a trusted authority in safeguarding digital infrastructures and preparing the next generation of cyber security professionals

Dr. Touraj Khodadadi: Dr. Touraj Khodadadi is currently an assistant professor of cyber security. Touraj has more than 10 years of experience in IT industry, Touraj has huge experience in (Cyber Security - Consultation - Risk Management – Security Training - Incident Handling - PCI Implementation -Penetration Tester – Security assessment - Develop security policies- Auditing - Code reviewing – Digital Transformation). In addition, he authored and co-authored 30 international journals and conference papers concerning various aspects of computer, information and network security. His main research interests include authentication systems, network security, cryptography, graphical passwords, authentication systems and cloud computing security. Apart from teaching and research activities at the university, he has served as an editor and reviewer for several international journals and conferences. He is also members of several review panels for master and doctoral research defense.

Customer Reviews (19)

will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
, (Posted on 3/9/2025)
will reocommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 3/9/2025)
The course was enlightening Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
The course was enlightening and I have been able to garner knowledge about the cyberspace as well as the reason for the need for cybersecurity specialists that can help mitigate the vulnerabilities abd challenges currently faced in the digital space.

The trainee, Dr. Siraj, has been able to fully demonstrate and articulate the concepts clearly. (Posted on 2/25/2025)
Training well done. Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Training well done. (Posted on 2/25/2025)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 2/24/2025)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 2/24/2025)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 2/24/2025)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Dr Siraj highlighted on the more difficult aspects of cybersecurity at a very understandable rate and made multiple references further painting the scene for us and reignited a passion for engaging in the world of cybersecurity (Posted on 2/24/2025)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 2/24/2025)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 2/24/2025)
This was a good course and I enjoyed it Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
This was a good course and I enjoyed it (Posted on 2/24/2025)
It was a nice interactive session Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
It was a nice interactive session (Posted on 2/24/2025)
This was an amazing experience Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
This was an amazing experience (Posted on 2/24/2025)
I WAS VERY HAPPY ABOUT COURSE Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
TO MOTIVATE YOUR STUDENT (Posted on 4/3/2023)
I had enjoyed every part of the course, expanded knowledge. Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
So far I am impressed with all parts (Posted on 2/26/2023)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Additional lecturers will be required to enhance the course
Very presentable and I am pleased with the entire program (Posted on 8/11/2022)
wll recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
The Lecturer is knowledgeable about the course and I suggest more of his kind will be marvelous (Posted on 6/12/2022)
Very insightful Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
By extending the training time (Posted on 11/9/2021)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More practicals be given,even though mine was epic (Posted on 9/27/2021)

Write Your Own Review

You're reviewing: Advanced Cyber Security Course

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha

You May Be Interested In These Courses