Certfied Ekasi Cybersecurity Expert
Certfied Ekasi Cybersecurity Expert
Comprehensive cybersecurity training covering network security, ethical hacking, digital forensics, and risk management. Become a certified cybersecurity professional with our guided training from industry experts
Course Description
Comprehensive cybersecurity training covering network security, ethical hacking, digital forensics, and risk management. Become a certified cybersecurity professional with our guided training from industry experts
Learning Outcomes
Explain core cybersecurity principles (CIA triad, threat models, attack surfaces).
Classify common cyber threats (malware, phishing, DDoS, SQLi) and their mitigations.
Summarize compliance standards (GDPR, HIPAA) and risk management frameworks (NIST, ISO 27001).
Technical Skills
Configure and secure networks (firewalls, VPNs, IDS/IPS) using tools like PfSense or Snort.
Implement encryption (AES, RSA) and PKI for data protection.
Conduct vulnerability assessments with Nessus/OpenVAS and prioritize risks.
Perform ethical hacking (penetration testing) using Metasploit, Burp Suite, and Kali Linux.
Analyze logs with SIEM tools (e.g., Splunk) to detect intrusions.
Practical Abilities
Develop a risk assessment report for an organization.
Create an incident response plan for ransomware/breach scenarios.
Demonstrate digital forensics (evidence collection, analysis with FTK/Autopsy).
Career Readiness
Build a portfolio with:
Penetration test reports.
Network hardening documentation.
Mock incident response exercises.
Prepare for industry certifications (CompTIA Security+, CEH) via practice exams.
Target Audience
Primary Audience
Aspiring Cybersecurity Professionals
IT graduates, career changers, or tech enthusiasts with basic computer/networking knowledge.
Goal: Break into entry-level roles (e.g., SOC Analyst, Junior Penetration Tester).
IT Professionals Seeking Upskilling
System admins, network engineers, or helpdesk technicians.
Goal: Transition to cybersecurity roles (e.g., Security Engineer, Threat Analyst).
Students & Self-Learners
College students or self-taught individuals pursuing certifications (CompTIA Security+, CEH).
Goal: Gain hands-on skills to complement academic studies.
Secondary Audience
Small Business Owners/Entrepreneurs
Non-tech professionals needing to secure their digital assets.
Goal: Implement basic cybersecurity measures (e.g., secure networks, phishing awareness).
Compliance & Risk Managers
Professionals in finance, healthcare, or government sectors.
Goal: Understand frameworks (NIST, ISO 27001) to align with regulations.
Audience Prerequisites
Basic IT knowledge (networking, OS fundamentals).
No prior cybersecurity experience required (course starts with fundamentals).
-
1.1 What is Cybersecurity? The Digital Battlefield (60 min)
-
1.2 Cyber Threats Deep Dive: Malware and Attack Vectors (65 min)
-
1.3 Security Controls and Defense-in-Depth Strategy (60 min)
-
1.4 Cryptography Fundamentals: Encryption, Hashing, and PKI (70 min)
-
1.5 Risk Management and Assessment (55 min)
-
1.6 Security Governance, Policies, and Compliance (50 min)
-
1.7 Security Operations and Incident Response (55 min)
-
2.1 TCP/IP Protocol Suite Deep Dive (70 min)
-
2.2 Network Infrastructure and Devices (65 min)
-
2.3 IP Addressing and Subnetting (65 min)
-
2.4 Network Security Protocols (60 min)
-
2.5 Wireless Network Security (55 min)
-
2.6 Network Attacks and Mitigations (60 min)
-
2.7 Network Monitoring and Packet Analysis (60 min)
-
3.1 Malware Classification and Analysis (75 min)
-
3.2 Ransomware Deep Dive (70 min)
-
3.3 Phishing and Social Engineering (70 min)
-
3.4 Advanced Persistent Threats (APTs) (75 min)
-
3.5 Web Application Attacks (OWASP Top 10) (75 min)
-
4.1 Symmetric Encryption Algorithms (70 min)
-
4.2 Asymmetric Encryption and RSA (75 min)
-
4.3 Hash Functions and Digital Signatures (65 min)
-
4.4 Public Key Infrastructure (PKI) (60 min)
-
5.1 Firewall Architecture and Types (65 min)
-
5.2 Intrusion Detection and Prevention Systems (IDS/IPS) (60 min)
-
5.3 Network Segmentation and Microsegmentation (65 min)
-
5.4 Web Application Firewall (WAF) (55 min)
-
5.5 DDoS Protection and Mitigation (55 min)
-
6.1 Vulnerability Management Lifecycle (60 min)
-
6.2 Vulnerability Scanning Tools and Techniques (60 min)
-
6.3 Network Vulnerability Scanning with Nmap (60 min)
-
6.4 Web Application Vulnerability Scanning (60 min)
-
6.5 Cloud and Container Vulnerability Scanning (65 min)
-
6.6 Vulnerability Remediation and Patching (55 min)
-
6.7 Vulnerability Reporting and Metrics (50 min)
-
7.1 Introduction to Ethical Hacking (70 min)
-
7.2 Reconnaissance and OSINT (75 min)
-
8.1 Security Operations Center (SOC) Fundamentals (50 min)
-
8.2 SIEM Architecture and Deployment (55 min)
-
8.3 Log Analysis and Investigation Techniques (55 min)
-
8.4 Incident Detection and Alerting (50 min)
-
8.5 Incident Response Process (55 min)
-
8.6 SOAR and Automation (45 min)
-
8.7 Cloud Security Monitoring (50 min)
-
9.1 Digital Forensics Fundamentals (50 min)
-
9.2 Memory Forensics (55 min)
-
9.3 Disk and File System Forensics (55 min)
-
9.4 Network Forensics (55 min)
-
9.5 Log Forensics and Timeline Analysis (50 min)
-
9.6 Malware Analysis Basics (55 min)
-
9.7 Forensic Reporting and Expert Testimony (45 min)
-
10.1 Information Security Governance Fundamentals (55 min)
-
10.2 Risk Management Framework (60 min)
-
10.3 Compliance and Regulatory Requirements (60 min)
-
10.4 Security Auditing and Assurance (55 min)
-
10.5 Third-Party Risk Management (55 min)
-
10.6 Security Awareness and Training (50 min)
-
10.7 Business Continuity and Disaster Recovery (60 min)
-
1.1 Introduction to Research Methods in Cybersecurity (55 min)
-
1.2 Literature Review and Information Sources (55 min)
-
1.3 Research Design and Methodology (60 min)
-
1.4 Data Collection Methods (55 min)
-
1.5 Data Analysis Techniques (60 min)
-
1.6 Interpreting and Presenting Research Findings (50 min)
-
1.7 Ethical and Responsible Research in Cybersecurity (50 min)
-
Foundations of Integrated Thinking (60 min)
-
Logical Reasoning and Problem-Solving (75 min)
-
Effective Workplace Communication (65 min)
-
Emotional Intelligence and Conflict Resolution (70 min)
-
Building Consensus and Collaborative Culture (60 min)
Certification Exam
Cybersecurty Expect
To earn your certificate, you must complete all course materials and pass the final exam with a score of 70% or higher.