1. PROFICIENCY CERTIFICATE IT SECURITY AND ETHICAL HACKING
Course Description
In this certificate program, we’ll cover the foundations of ethical hacking, including reconnaissance, rules of engagement, exploitation and remediation. You’ll discover how to perform fundamental and cloud-based application attacks. You’ll have opportunities to apply your new skills and protect your organization’s valuable information with the latest industry tools, techniques and knowledge in a tailored, virtual environment comprised of real-world systems and software stacks.
Mode of Delivery: Live and Online
Exam Body: Computer Society of Kenya
KCSE Certificate
TUITION FEES: Ksh. 15,000/=
|
Course Outline
MODULE ONE
|
COURSE CODE |
COURSE TITLE |
FEES |
1. |
DSE 1O1 DSE 1O2 DSE 1O3 DSE 1O4 DSE 1O5 |
Introduction to Ethical Hacking Scanning Networks Vulnerability Analysis Understanding Cyber Ethics Information Security
|
Kshs. 7,500 |
MODULE TWO
|
COURSE CODE |
COURSE TITLE |
FEES |
2. |
DSE 2O1 DSE 2O2 DSE 2O3 DSE 2O4 DSE 2O5 |
Understanding Malware Threats IDS, Firewalls, and Honeypots Hacking Web Servers Email, DNS, IP and Spoofing Network management practices |
Kshs. 7,500 |
IT SECURITY AND ETHICAL HACKING
PROFICIENCY DIPLOMA IN IT SECURITY AND ETHICAL HACKING
Course Description
Ethical Hacker training concentrates on revealing security flaws by hacking. Ethical Hackers gain permission to legally infiltrate security systems, in order to determine the efficiency of such security. A Ethical Hacker qualification depicts an individual’s ability to execute effective penetration testing and assess how susceptible organizations are to hacking.
Mode of Delivery: Live and Online
Exam Body: Computer Society of Kenya
Requirements:
Linux/windows basics
Should have done certificate course in cyber security
Have programming skills
TUITION FEES: Ksh. 30,000/= |
Should have networking skills
Course Outline
MODULE ONE
|
COURSE CODE |
COURSE TITLE |
FEES |
1. |
DSE1O2
DSE 1O3 DSE 1O4 DSE 1O5 DSE 1O6 DSE 1O7 |
Introduction to cyber security, cyber space and information security Server security Data and information security Understanding network, types and its security Network protocols and internet security Vulnerability analysis |
Kshs. 10,000 |
MODULE TWO
|
COURSE CODE |
COURSE TITLE |
FEES |
2. |
DSE 2O1 DSE 2O2 DSE 2O3 DSE 2O4 DSE 2O5 DSE 2O6 DSE 2O7 |
Penetration testing Cryptography and Encryption Cyber-attacks Understanding the cyber laws Cyber forensics IDS, Firewalls, and Honeypots Network management practices |
Kshs. 10,000 |
MODULE THREE
|
COURSE CODE |
COURSE TITLE |
FEES |
3. |
DSE 3O1 DSE 3O2 DSE 3O3 DSE 3O5 DSE 3O6 DSE 3O7 DSE3O8 DSE3O9 DSE310 |
Hacking Web Servers Email, DNS, IP and Spoofing Hacking Web Applications Hacking Mobile Devices Spyware Wireless Hacking Buffer Overflow Social Engineering SQL Injection |
Kshs. 10,000 |