Course Details
  • Duration

    3 Months

  • Format

    In Person

  • Location

    African Christian University

  • Fees

    Application Fee | K100

    Course Fee K3,000 | Flexible Payments

  • For more information, please contact the registrar at registrar@acu-zambia.com

  • Apply Now

Cyber Security

In today’s digital age, cybersecurity has become a critical necessity for protecting sensitive data, networks, and systems from an ever-evolving range of threats. As technology continues to shape the way we live and work, understanding how to identify risks, prevent breaches, and respond to incidents is essential for individuals and organizations alike. This course provides a comprehensive foundation in cybersecurity principles, including threat analysis, risk management, and defense strategies. Through practical applications and real-world scenarios, learners will develop the skills and confidence needed to safeguard digital environments. By the end of the course, participants will be well-equipped to address cybersecurity challenges in both personal and professional contexts.

Outline

This course will be covered in twelve weeks.

  1. Level: Beginner to Intermediate
  2. Month 1: Foundations of Cybersecurity

    Week 1: Introduction to Cybersecurity

    • Definition and importance of cybersecurity
    • Types of cyber threats: Malware, phishing, ransomware, and social engineering
    • Overview of cybersecurity domains: Network security, application security, data security

  3. Week 2: Cybersecurity Fundamentals
    • Key concepts: CIA Triad (Confidentiality, Integrity, Availability)
    • Cybersecurity terms and acronyms (e.g., VPN, IDS, IPS, SSL/TLS)
    • Cybersecurity frameworks and standards (e.g., NIST, ISO 27001)

  4. Week 3: Basics of Networking and System Security
    • Understanding networks: Protocols, firewalls, and VPNs
    • Operating system security: Linux vs. Windows
    • Common vulnerabilities and exploitation techniques

  5. Week 4: Risk Management and Security Policies
    • Identifying and assessing risks
    • Basics of security policies and incident response plans
    • Assignment: Develop a simple security policy for an organization

    Month 2: Practical Cybersecurity Skills

  6. Week 5: Secure Coding and Application Security
    • Principles of secure software development
    • Common vulnerabilities: SQL injection, cross-site scripting (XSS), and CSRF
    • Tools for application security: OWASP ZAP and Burp Suite

  7. Week 6: Network Security and Monitoring
    • Network defense mechanisms: Firewalls, intrusion detection/prevention systems
    • Traffic monitoring and packet analysis with Wireshark
    • Hands-on: Analyze network traffic for suspicious activity

  8. Week 7: Ethical Hacking and Penetration Testing
    • Introduction to ethical hacking and penetration testing methodologies
    • Reconnaissance, scanning, and exploitation techniques
    • Hands-on: Simulate an ethical hacking scenario in a lab environment

  9. Week 8: Cryptography Basics
    • Introduction to encryption: Symmetric vs. asymmetric encryption
    • Hashing and digital signatures
    • Hands-on: Encrypt and decrypt files using basic tools (e.g., OpenSSL)

    Month 3: Advanced Concepts, Ethics, and Capstone Project

  10. Week 9: Cloud Security
    • Overview of cloud platforms and shared responsibility models
    • Security concerns in cloud environments (AWS, Azure, Google Cloud)
    • Hands-on: Set up secure cloud storage and apply access controls

  11. Week 10: Cybersecurity Ethics and Legal Frameworks
    • Ethical hacking principles and professional conduct
    • Legal considerations: GDPR, CCPA, and cybersecurity laws
    • Case studies of notable breaches and their impact

  12. Week 11: Capstone Project Development
    • Choose a cybersecurity challenge (e.g., network defense, malware analysis)
    • Design and implement a security solution using tools learned
    • Prepare a project presentation

  13. Week 12: Capstone Project Presentation and Career Guidance
    • Present final projects and receive peer and instructor feedback
    • Emerging trends in cybersecurity: AI in security, zero trust, and quantum cryptography
    • Career opportunities and certifications (e.g., CompTIA Security+, CISSP, CEH)

    Key Deliverables:

    1. A strong understanding of cybersecurity fundamentals and practical skills
    2. Hands-on experience with tools like Wireshark, OpenSSL, and ethical hacking frameworks
    3. A completed capstone project demonstrating cybersecurity knowledge
    4. Awareness of ethical practices, legal considerations, and career pathways in cybersecurity

Font Awesome 5 Icons Font Awesome Icons