banner
Cyber Security Essentials
This course can be taken as a self-paced e-learning or as a blended e-learning/classroom based training. Cybersecurity Essentials covers foundation knowledge and essentials skills in all security domains in the cyber world - information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense and mitigation techniques use in protecting businesses.
Prerequisites
Introduction to Cyber Security
Qualifications
Cisco certificate of course completion and IMIT attestation of training.
Required number of optional units
0
Units

• Describe the cybersecurity world, criminals and professionals .

• Compare how cybersecurity threats affect individuals, business and organization.

• Explain the structure and efforts committed to expanding the security workforce. 

• Explain the three dimensions of the McCumber Cube.

• Detail the ISO cybersecurity model.

• Explain the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

• Describe tactics, techniques and procedures used by cyber criminals.

• Explain the types of malware, malicious code and social engineering

• Compare different types of cyber attacks.

• Outline technologies, products and procedures used to protect confidentiality.

• Explain encryption techniques and access control techniques.

• Present concepts of obscuring data.

• Explain technologies, products and procedures used to ensure integrity

• Detail the purpose of digital signature and certificates

• Explain the need for database integrity enforcement

• Explain the concepts of high availability.

• Describe technologies, products, and procedures used to provide high availability.

• Represent how incident response plan and disaster recovering planning improves high availability and business continuity.

• Explain system, servers and data protection

• Explain network infrastructure and end device protection

• Explain physical security measures used to protect network equipment

• Discuss cybersecurity domains and controls within the CIA triad.

• Explain ethics and cybersecurity laws.

• Name the cybersecurity tools.

• Explain how to become a cyber security professional.

Plans
Blended E-learning / face-to-face classroom tutor support.
In addition to the e-learning facility open to the students, IMIT tutors give classroom training support to the trainees on an agreed time table.
Duration
10 weeks
Fees
Description Amount
IMIT Registration fee XAF 25,000
Fees covering the e-learning facility and face-to-face classroom tutor support. XAF 200,000
Current Sessions
Title Start date Status
Admissions are throughout. The e-learning resources are made available to the trainee upon payment of the training fee. Face-to-face classroom tutor support starts in the month following the month in which the trainee first had access to the e-learning resources. Opened Apply
Self study by E-learning
Students study at their convenience remotely without instructor classroom face-to face support. They do practical exercises, take assessments also and end-of-chapter assessments online as well.
Duration
At least 30 hours
Fees
Description Amount
Fees for course delivery by self-paced e-learning XAF 50,000
Current Sessions
Title Start date Status
E-learning courses are available on demand (always). Opened Apply
Blended E-learning and Classroom studies
Trainees have access to online course materials, and also have face-to-face classroom training sessions to boost their e-learning
Duration
Fees
Description Amount
IMIT Registration fee XAF 25,000
Fee for blended e-learning couse delivery and classroom training XAF 150,000
Current Sessions
Title Start date Status
Open for admission at all times Opened Apply