2 YR ORDINARY DIPLOMA IN CYBERSECURITY AND ETHICAL HACKING
Course Duration: 2 Years (4 semesters, including holidays and attachment)
Course Fee: 30,000 Kenyan Shillings per semester (each semester takes 3 months)
weekly commitment : minimum of 2 hours per week
Course Overview:
This course focuses on cybersecurity principles, techniques, and ethical hacking skills, preparing students to protect and secure digital assets against cyber threats.
Year 1
Semester 1: Introduction to Cybersecurity
- Week 1-2: Introduction to Cybersecurity
-
- Overview of Cybersecurity Concepts
- Importance of Cybersecurity in Modern Computing
- Cyber Threat Landscape
- Setting Up a Secure Environment
- Week 3-6: Network Security Fundamentals
-
- Network Security Principles
- Common Network Attacks and Defenses
- Firewalls and Intrusion Detection Systems (IDS)
- Practical Exercises
- Week 7-10: Cryptography
-
- Basics of Cryptography
- Encryption and Decryption Techniques
- Public Key Infrastructure (PKI)
- Mini Project
- Week 11-14: Ethical Hacking Basics
-
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Practical Exercises
- Week 15-16: Semester Review and Assessment
-
- Review of Key Concepts
- Practice Problems
- Mid-Semester Exam
Semester 2: Advanced Cybersecurity Techniques
- Week 1-4: Web Application Security
-
- Web Application Vulnerabilities
- Secure Coding Practices
- Web Application Penetration Testing
- Practical Exercises
- Week 5-8: Cybersecurity Operations
-
- Incident Response and Management
- Security Information and Event Management (SIEM)
- Threat Intelligence and Analysis
- Mini Project
- Week 9-12: Wireless and Mobile Security
-
- Security Issues in Wireless Networks
- Mobile Device Security
- Mobile Application Security
- Practical Exercises
- Week 13-14: Cloud Security
-
- Cloud Computing Security Challenges
- Securing Cloud Infrastructure and Services
- Identity and Access Management (IAM)
- Practical Exercises
- Week 15-16: Semester Review and Assessment
-
- Review of Key Concepts
- Practice Problems
- End-of-Semester Exam
Year 2
Semester 3: Advanced Cybersecurity and Ethical Hacking
- Week 1-4: Advanced Ethical Hacking
-
- Advanced Penetration Testing Techniques
- Exploit Development
- Wireless Network Penetration Testing
- Practical Exercises
- Week 5-8: Digital Forensics
-
- Introduction to Digital Forensics
- Forensic Investigation Process
- Evidence Handling and Analysis
- Mini Project
- Week 9-12: Cybersecurity Governance and Compliance
-
- Cybersecurity Governance Frameworks
- Legal and Regulatory Compliance
- Risk Management in Cybersecurity
- Practical Exercises
- Week 13-14: Emerging Trends in Cybersecurity
-
- AI and Machine Learning in Cybersecurity
- Blockchain Technology and Security
- Future Trends in Cybersecurity
- Practical Exercises
- Week 15-16: Semester Review and Assessment
-
- Review of Key Concepts
- Practice Problems
- Mid-Semester Exam
Semester 4: Capstone Project and Management
- Week 1-4: Capstone Project
-
- Project Planning and Design
- Implementation of Cybersecurity Solutions
- Testing and Evaluation
- Final Presentation and Evaluation
- Week 5-8: Professional Development in Cybersecurity
-
- Career Pathways in Cybersecurity
- Professional Ethics in Cybersecurity
- Building a Cybersecurity Portfolio
- Practical Exercises
- Week 9-12: Industry Attachment
-
- Attachment in Cybersecurity Roles
- Applying Skills in Real-World Scenarios
- Industry Best Practices
- Practical Experience
- Week 13-16: Course Review and Final Exam
-
- Comprehensive Course Review
- Practice Problems
- Final Exam
Attachment
Students will undergo an industry attachment to gain practical experience in cybersecurity practices and ethical hacking techniques. This attachment period allows students to apply their knowledge in real-world cybersecurity environments, preparing them for professional roles in the field.
Certification
Upon successful completion of the course, students will receive an "Ordinary Diploma in Cybersecurity and Ethical Hacking" certificate, recognizing their expertise and skills in cybersecurity and ethical hacking.