Certfied Ekasi Cybersecurity Expert

Certfied Ekasi Cybersecurity Expert
Cybersecurity Intermediate

Certfied Ekasi Cybersecurity Expert

Comprehensive cybersecurity training covering network security, ethical hacking, digital forensics, and risk management. Become a certified cybersecurity professional with our guided training from industry experts

Course Description

Comprehensive cybersecurity training covering network security, ethical hacking, digital forensics, and risk management. Become a certified cybersecurity professional with our guided training from industry experts

Learning Outcomes

Knowledge & Understanding
Explain core cybersecurity principles (CIA triad, threat models, attack surfaces).

Classify common cyber threats (malware, phishing, DDoS, SQLi) and their mitigations.

Summarize compliance standards (GDPR, HIPAA) and risk management frameworks (NIST, ISO 27001).

Technical Skills
Configure and secure networks (firewalls, VPNs, IDS/IPS) using tools like PfSense or Snort.

Implement encryption (AES, RSA) and PKI for data protection.

Conduct vulnerability assessments with Nessus/OpenVAS and prioritize risks.

Perform ethical hacking (penetration testing) using Metasploit, Burp Suite, and Kali Linux.

Analyze logs with SIEM tools (e.g., Splunk) to detect intrusions.

Practical Abilities
Develop a risk assessment report for an organization.

Create an incident response plan for ransomware/breach scenarios.

Demonstrate digital forensics (evidence collection, analysis with FTK/Autopsy).

Career Readiness
Build a portfolio with:

Penetration test reports.

Network hardening documentation.

Mock incident response exercises.

Prepare for industry certifications (CompTIA Security+, CEH) via practice exams.

Target Audience

Primary Audience
Aspiring Cybersecurity Professionals

IT graduates, career changers, or tech enthusiasts with basic computer/networking knowledge.

Goal: Break into entry-level roles (e.g., SOC Analyst, Junior Penetration Tester).

IT Professionals Seeking Upskilling

System admins, network engineers, or helpdesk technicians.

Goal: Transition to cybersecurity roles (e.g., Security Engineer, Threat Analyst).

Students & Self-Learners

College students or self-taught individuals pursuing certifications (CompTIA Security+, CEH).

Goal: Gain hands-on skills to complement academic studies.

Secondary Audience
Small Business Owners/Entrepreneurs

Non-tech professionals needing to secure their digital assets.

Goal: Implement basic cybersecurity measures (e.g., secure networks, phishing awareness).

Compliance & Risk Managers

Professionals in finance, healthcare, or government sectors.

Goal: Understand frameworks (NIST, ISO 27001) to align with regulations.

Audience Prerequisites
Basic IT knowledge (networking, OS fundamentals).

No prior cybersecurity experience required (course starts with fundamentals).

12 Modules
70 Lessons
37h 10m

Core security concepts (Confidentiality, Integrity, Availability), threat landscape overview, types of cybercriminals and their motivations, and career pathways in cybersecurity.
  • 1.1 What is Cybersecurity? The Digital Battlefield (60 min)
  • 1.2 Cyber Threats Deep Dive: Malware and Attack Vectors (65 min)
  • 1.3 Security Controls and Defense-in-Depth Strategy (60 min)
  • 1.4 Cryptography Fundamentals: Encryption, Hashing, and PKI (70 min)
  • 1.5 Risk Management and Assessment (55 min)
  • 1.6 Security Governance, Policies, and Compliance (50 min)
  • 1.7 Security Operations and Incident Response (55 min)

TCP/IP deep dive, DNS, HTTP/S, common ports and protocols, OSI model review, network capture with Wireshark, and understanding attack surfaces in network infrastructure.
  • 2.1 TCP/IP Protocol Suite Deep Dive (70 min)
  • 2.2 Network Infrastructure and Devices (65 min)
  • 2.3 IP Addressing and Subnetting (65 min)
  • 2.4 Network Security Protocols (60 min)
  • 2.5 Wireless Network Security (55 min)
  • 2.6 Network Attacks and Mitigations (60 min)
  • 2.7 Network Monitoring and Packet Analysis (60 min)

Classification of malware (viruses, ransomware, trojans, spyware, rootkits), phishing and social engineering, DDoS, SQL injection, XSS, and MITM attacks.
  • 3.1 Malware Classification and Analysis (75 min)
  • 3.2 Ransomware Deep Dive (70 min)
  • 3.3 Phishing and Social Engineering (70 min)
  • 3.4 Advanced Persistent Threats (APTs) (75 min)
  • 3.5 Web Application Attacks (OWASP Top 10) (75 min)

Symmetric and asymmetric encryption, hashing algorithms, digital signatures, SSL/TLS operation, certificate authorities, and PKI infrastructure management.
  • 4.1 Symmetric Encryption Algorithms (70 min)
  • 4.2 Asymmetric Encryption and RSA (75 min)
  • 4.3 Hash Functions and Digital Signatures (65 min)
  • 4.4 Public Key Infrastructure (PKI) (60 min)

Firewall configuration (stateful inspection, NGFW), IDS/IPS deployment (Snort, Suricata), VPN types and configuration, DMZ design, and network segmentation.
  • 5.1 Firewall Architecture and Types (65 min)
  • 5.2 Intrusion Detection and Prevention Systems (IDS/IPS) (60 min)
  • 5.3 Network Segmentation and Microsegmentation (65 min)
  • 5.4 Web Application Firewall (WAF) (55 min)
  • 5.5 DDoS Protection and Mitigation (55 min)

Vulnerability management lifecycle, using Nessus and OpenVAS for scanning, interpreting CVSS scores, and prioritising and reporting vulnerabilities.
  • 6.1 Vulnerability Management Lifecycle (60 min)
  • 6.2 Vulnerability Scanning Tools and Techniques (60 min)
  • 6.3 Network Vulnerability Scanning with Nmap (60 min)
  • 6.4 Web Application Vulnerability Scanning (60 min)
  • 6.5 Cloud and Container Vulnerability Scanning (65 min)
  • 6.6 Vulnerability Remediation and Patching (55 min)
  • 6.7 Vulnerability Reporting and Metrics (50 min)

Penetration testing methodology (reconnaissance, scanning, exploitation, post-exploitation, reporting), using Metasploit, Burp Suite, and Kali Linux tools.
  • 7.1 Introduction to Ethical Hacking (70 min)
  • 7.2 Reconnaissance and OSINT (75 min)

Setting up a Security Operations Centre (SOC) workflow, log analysis, using Splunk or similar SIEM tools, alert triage, and escalation procedures.
  • 8.1 Security Operations Center (SOC) Fundamentals (50 min)
  • 8.2 SIEM Architecture and Deployment (55 min)
  • 8.3 Log Analysis and Investigation Techniques (55 min)
  • 8.4 Incident Detection and Alerting (50 min)
  • 8.5 Incident Response Process (55 min)
  • 8.6 SOAR and Automation (45 min)
  • 8.7 Cloud Security Monitoring (50 min)

Incident response lifecycle, evidence preservation, forensic imaging, analysis with Autopsy/FTK, and writing an incident report.
  • 9.1 Digital Forensics Fundamentals (50 min)
  • 9.2 Memory Forensics (55 min)
  • 9.3 Disk and File System Forensics (55 min)
  • 9.4 Network Forensics (55 min)
  • 9.5 Log Forensics and Timeline Analysis (50 min)
  • 9.6 Malware Analysis Basics (55 min)
  • 9.7 Forensic Reporting and Expert Testimony (45 min)

Risk management frameworks (NIST CSF, ISO 27001), GDPR, HIPAA, and industry compliance. Writing security policies and conducting security awareness training.
  • 10.1 Information Security Governance Fundamentals (55 min)
  • 10.2 Risk Management Framework (60 min)
  • 10.3 Compliance and Regulatory Requirements (60 min)
  • 10.4 Security Auditing and Assurance (55 min)
  • 10.5 Third-Party Risk Management (55 min)
  • 10.6 Security Awareness and Training (50 min)
  • 10.7 Business Continuity and Disaster Recovery (60 min)

This module equips learners with essential research skills including research design, data collection methods (qualitative and quantitative), data analysis techniques, survey development, interviewing skills, ethical considerations in research, and how to apply research findings to improve workplace practices and decision-making.
  • 1.1 Introduction to Research Methods in Cybersecurity (55 min)
  • 1.2 Literature Review and Information Sources (55 min)
  • 1.3 Research Design and Methodology (60 min)
  • 1.4 Data Collection Methods (55 min)
  • 1.5 Data Analysis Techniques (60 min)
  • 1.6 Interpreting and Presenting Research Findings (50 min)
  • 1.7 Ethical and Responsible Research in Cybersecurity (50 min)

This module develops critical soft skills essential for workplace success: integrated thinking (connecting ideas across disciplines), logical reasoning and problem-solving, effective verbal and written communication, active listening, emotional intelligence, negotiation techniques, mediation skills, conflict resolution strategies, de-escalation techniques, building consensus, handling difficult conversations, and fostering a collaborative workplace culture.
  • Foundations of Integrated Thinking (60 min)
  • Logical Reasoning and Problem-Solving (75 min)
  • Effective Workplace Communication (65 min)
  • Emotional Intelligence and Conflict Resolution (70 min)
  • Building Consensus and Collaborative Culture (60 min)

Certification Exam

Cybersecurty Expect

Passing Score: 70%
Time Limit: 1 minutes
Attempts Allowed: 5
Camera Required: No

To earn your certificate, you must complete all course materials and pass the final exam with a score of 70% or higher.

Enroll in this Course
Certificate included
200 hours content
Downloadable resources
Mobile access
Duration 200 hours
Skill Level Intermediate
Learning Method Self Study
Category Cybersecurity
Modules 12
Total Lessons 70
Last Updated April 2026
Practical skills guarantee