Certfied Ekasi Cybersecurity Expect

Certfied Ekasi Cybersecurity Expect
Cybersecurity Intermediate

Certfied Ekasi Cybersecurity Expect

Comprehensive cybersecurity training covering network security, ethical hacking, digital forensics, and risk management. Become a certified cybersecurity professional with our guided training from industry experts

Course Description

Comprehensive cybersecurity training covering network security, ethical hacking, digital forensics, and risk management. Become a certified cybersecurity professional with our guided training from industry experts

Learning Outcomes

Knowledge & Understanding
Explain core cybersecurity principles (CIA triad, threat models, attack surfaces).

Classify common cyber threats (malware, phishing, DDoS, SQLi) and their mitigations.

Summarize compliance standards (GDPR, HIPAA) and risk management frameworks (NIST, ISO 27001).

Technical Skills
Configure and secure networks (firewalls, VPNs, IDS/IPS) using tools like PfSense or Snort.

Implement encryption (AES, RSA) and PKI for data protection.

Conduct vulnerability assessments with Nessus/OpenVAS and prioritize risks.

Perform ethical hacking (penetration testing) using Metasploit, Burp Suite, and Kali Linux.

Analyze logs with SIEM tools (e.g., Splunk) to detect intrusions.

Practical Abilities
Develop a risk assessment report for an organization.

Create an incident response plan for ransomware/breach scenarios.

Demonstrate digital forensics (evidence collection, analysis with FTK/Autopsy).

Career Readiness
Build a portfolio with:

Penetration test reports.

Network hardening documentation.

Mock incident response exercises.

Prepare for industry certifications (CompTIA Security+, CEH) via practice exams.

Target Audience

Primary Audience
Aspiring Cybersecurity Professionals

IT graduates, career changers, or tech enthusiasts with basic computer/networking knowledge.

Goal: Break into entry-level roles (e.g., SOC Analyst, Junior Penetration Tester).

IT Professionals Seeking Upskilling

System admins, network engineers, or helpdesk technicians.

Goal: Transition to cybersecurity roles (e.g., Security Engineer, Threat Analyst).

Students & Self-Learners

College students or self-taught individuals pursuing certifications (CompTIA Security+, CEH).

Goal: Gain hands-on skills to complement academic studies.

Secondary Audience
Small Business Owners/Entrepreneurs

Non-tech professionals needing to secure their digital assets.

Goal: Implement basic cybersecurity measures (e.g., secure networks, phishing awareness).

Compliance & Risk Managers

Professionals in finance, healthcare, or government sectors.

Goal: Understand frameworks (NIST, ISO 27001) to align with regulations.

Audience Prerequisites
Basic IT knowledge (networking, OS fundamentals).

No prior cybersecurity experience required (course starts with fundamentals).

10 Modules
0 Lessons
32h 40m

Core security concepts (Confidentiality, Integrity, Availability), threat landscape overview, types of cybercriminals and their motivations, and career pathways in cybersecurity.

No lessons in this module yet.

TCP/IP deep dive, DNS, HTTP/S, common ports and protocols, OSI model review, network capture with Wireshark, and understanding attack surfaces in network infrastructure.

No lessons in this module yet.

Classification of malware (viruses, ransomware, trojans, spyware, rootkits), phishing and social engineering, DDoS, SQL injection, XSS, and MITM attacks.

No lessons in this module yet.

Symmetric and asymmetric encryption, hashing algorithms, digital signatures, SSL/TLS operation, certificate authorities, and PKI infrastructure management.

No lessons in this module yet.

Firewall configuration (stateful inspection, NGFW), IDS/IPS deployment (Snort, Suricata), VPN types and configuration, DMZ design, and network segmentation.

No lessons in this module yet.

Vulnerability management lifecycle, using Nessus and OpenVAS for scanning, interpreting CVSS scores, and prioritising and reporting vulnerabilities.

No lessons in this module yet.

Penetration testing methodology (reconnaissance, scanning, exploitation, post-exploitation, reporting), using Metasploit, Burp Suite, and Kali Linux tools.

No lessons in this module yet.

Setting up a Security Operations Centre (SOC) workflow, log analysis, using Splunk or similar SIEM tools, alert triage, and escalation procedures.

No lessons in this module yet.

Incident response lifecycle, evidence preservation, forensic imaging, analysis with Autopsy/FTK, and writing an incident report.

No lessons in this module yet.

Risk management frameworks (NIST CSF, ISO 27001), GDPR, HIPAA, and industry compliance. Writing security policies and conducting security awareness training.

No lessons in this module yet.

Certification Exam

Cybersecurty Expect

Passing Score: 70%
Time Limit: 1 minutes
Attempts Allowed: 5
Camera Required: No

To earn your certificate, you must complete all course materials and pass the final exam with a score of 70% or higher.

Sign in to access recommendation letter generation after course completion.
Vocational Training Course
Certificate included
200 hours content
Downloadable resources
Mobile access
Practical skills guarantee

Course Details

Duration 200 hours
Skill Level Intermediate
Learning Method Self Study
Category Cybersecurity
Modules 10
Total Lessons 0
Last Updated August 2025
Ekasi Assistant
Online
Hi there! 👋 I'm the Ekasi Courses assistant. How can I help you with our courses today?