PHYSICAL AND ONLINE Cyber Security BOOTCAMP

Cyber Security Training In Lagos Nigeria

Tech365 Cyber Security training is beginner-friendly, practical and project-based. It is designed to help participants become job-ready.

* CEH

* Linux

* Networking

* Web Security

* Cryptography

* Operating System

* Wireless Security

* Penetration Testing

* CEH

* Linux

* Networking

* Web Security

* Cryptography

* Operating System

* Wireless Security

* Penetration Testing

10 Weeks

Duration

Physical/Online

Classes

Weekday/Weekend

Tue, Thurs & Sat

10am - 1pm (WAT)

Time

Our Training is Designed to make you job-ready

Data Analytics Projects We Will Build

In addition to the Data Analytics projects below, you will also be given resources to build others on your own.

Analysis of store sales data with Excel

Learn how to help business to extract valuable insights from their data to aid decision making using Microsoft Excel.

Uber data analytics using Python

Create a time series to understand how business is performing overtime and draw a meaningful conclusion.

A top-notch dashboard design with PowerBI

Tell a story through visual that communicate key performance indicator (KPI) to difference audiences.

Solve business problem with SQL

Learn how to use SQL to help businesses find key information in their database

Hotel data analysis with Python

Identify key customers and what drives business growth and revenue with python

Data manipulation with Excel

Use various Excel functions to clean and transform data for analysis

** The projects can be changed anytime

WHY TECH365

Training Benefits

Here are some of the benefits of learning at Tech365

  • Beginner-friendly
  • Project-based training
  • Excellent support
  • Job alerts
  • Career guidance
  • Certificate of completion
  • Flexible payment plan
  • Conducive learning environment
  • Unlimited internet access
  • Remote non-paid Internship
cyber security training lagos nigeria
Curriculum

Cyber Security Course Outline

Fundamentals

Introduction to Cybersecurity

By the end of the course, students should have a solid understanding of fundamental cybersecurity principles, networking concepts, and practical skills to address security challenges in real-world scenarios. They should be able to apply this knowledge to assess and mitigate cybersecurity risks effectively.

Module 1 & 2: Basics of Networking

  • OSI and TCP/IP models
    IP addressing and subnetting
  • Network protocols (DNS, DHCP, HTTP/S, FTP, etc.)
  • Basic troubleshooting tools (ping, tracert, netstat)
  • Introduction to network topologies and devices

Qualified Job Roles After Completion:
Network Support Technician
IT Support Specialist
Help Desk Technician

 

Module 3: Introduction to Cybersecurity

  • Principles: Confidentiality, Integrity, Availability (CIA)
  • Threats and vulnerabilities (malware, phishing, ransomware)
  • Risk management and mitigation techniques
  • Cryptography basics (symmetric vs. asymmetric encryption, hashing)

Qualified Job Roles After Completion:
Cybersecurity Analyst (Entry Level)
IT Security Support Specialist
Risk Analyst

Module 4: Security Operations

  • Authentication, Authorization, and Accounting (AAA)
  • Access control models (DAC, MAC, RBAC)
  • Security monitoring tools: SIEM, IDS/IPS
  • Implementing organizational security policies

Qualified Job Roles After Completion:
SOC Analyst (Level 1)
Information Security Analyst
Compliance Analyst

Module 5: Network and Application Security

  • Securing network devices and endpoints
  • Cloud security fundamentals
  • Web application vulnerabilities (OWASP Top 10)
    Incident response basics

Qualified Job Roles After Completion:
Network Security Administrator
Cloud Security Associate
Application Security Analyst

Module 6: Penetration Testing Fundamentals

  • Overview of the penetration testing lifecycle
  • Legal and ethical considerations
  • Lab setup: Kali Linux and key tools
  • Reconnaissance: OSINT tools and techniques

Qualified Job Roles After Completion:
Penetration Tester (Junior Level)
Vulnerability Analyst
Cybersecurity Technician

Module 7: Scanning and Vulnerability Analysis

  • Network scanning tools (Nmap, Nessus)
  • Identifying and analyzing vulnerabilities
  • Common services and their weaknesses (SSH, FTP, SMB)

Qualified Job Roles After Completion:
Vulnerability Management Analyst
Security Consultant (Entry Level)
SOC Analyst (Level 2)

Module 8: Exploitation and Gaining Access

  • Introduction to Metasploit Framework
  • Exploiting system vulnerabilities
  • Cracking passwords and bypassing authentication
  • Exploiting web applications with Burp Suite

Qualified Job Roles After Completion:
Red Team Operator (Junior)
Application Security Tester
Exploit Developer (Entry Level)

Module 9: Post-Exploitation Tactics

  • Privilege escalation techniques
  • Lateral movement within networks
  • Data exfiltration methods
    Maintaining access

Qualified Job Roles After Completion:
Penetration Tester (Intermediate Level)
Red Team Operator
Ethical Hacker

Module 10: Finalizing the Penetration Test

  • Covering tracks and avoiding detection
  • Writing professional penetration testing reports
  • Capstone project: Conducting a full penetration test on a simulated environment
    Presentation of findings and remediation strategies

Qualified Job Roles After Completion:
Senior Penetration Tester
Cybersecurity Consultant
Offensive Security Specialist

 

CAREER COACHING

LinkedIn Optimization

  • Improving your profile to attract job opportunities
  • CV review
  • Career tips
  • Job Alert

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

WORK EXPERIENCE

Internship

Apply for cybersecurity non-paid remote internship with Mastercard, Telstra, PwC, Datacom, JP Morgan chase, common wealth bank etc to boost your CV and experience

Google Review from over 80 students

Student Feedback

I attended Tech365. One of the key strengths of the training was its structured approach to covering complex concepts. The content was well-organized, starting from foundational knowledge and gradually delving into more advanced topics. This approach ensured that participants with varying levels of expertise could benefit from the training, making it accessible and engaging for everyone involved.

Dongo Cornelius

Tech365 is an ideal place for learning new skills in Information Technology. The teaching environment is great. The lecturers are very knowledgeable and are so willing to impart knowledge with patience and humour. My experience was so pleasant that I would love to go back and get an additional skill of interest.
I recommend Tech365 to anyone thinking of acquiring IT skills in an excellent and helpful environment.

Abiodun Adewodu

The in-depth teaching, and in relation to real-life applications, exploring different hands-on projects made it indeed brain-tasking and worthwhile. The patient and grounded tutors and most especially the patience in follow-ups even after the training period makes them an exceptional data school as this is really rare. The recommendations for opportunities and the community of like minds are absolutely commendable too.

Confidence Joseph

Tech 365 offers insightful and informative teachings. The courses are broken down in a way that even a layperson can easily understand. Everyone is made to see that tech can be simplified. I used to find tech-related courses quite challenging, and I struggled hard trying to learn it myself, but since joining Tech 365, I’ve discovered that it’s not as difficult as I expected. I can confidently say that you get real value for the money you invest.

Emmanuella Omolade

Tech365 is a great place to start from Novice to Ninja! There is no wuruwuru to the answer; The instructor takes you from the simplest example to the complex one solving them as simple as it could be. For every challenge encountered; it becomes another learning curve for knowledge. I will definitely recommend Tech365 who want solid background knowledge or a career shift in ICT. Thank you.

Oluwaseun Popoola

Training Fees

Cyber Security

Covers all cyber security Modules. 5 Months

N1,000,000

$1000

Cybersecurity & Software development

Covers all the cyber security modules, software development modules. 9 months

N1,500,000

$1,500

Frequently Asked Questions (FAQs)

As fraud increases online, the demand for cyber security personal is also on the increase especially outside Nigeria. As you build competences and experience, getting a job becomes easier.

No prior programming experience is required. Our training approach is beginner friendly, and we work on several real world projects to help our student have deeper understanding of each module. However, you need to know how to operate the computer efficiently. 

We have weekend class for those who cannot attend the weekday class. 10am to 1pm (Nigerian Time)

You can pay N500,000 at the beginning of each month to attend the training.

Yes, it is recommended you come with your own laptop as it will help you to practice whatever you are learning. However, we provide laptop that can be used only within our premises if need be.

Depending on your budget, Core i7, 16 GB ram with SSD is best.

However, core i3 or i5 with 4gb or 8gb ram HDD will also work fine.

It can be HP, DELL, Mac or any other brand.

Yes. In fact, this is our strength. We are committed to supporting our students to ensure they succeed. You will be added to our WhatsApp group to connect with others and also ask questions.

We don’t guarantee job after the training. However, some of our students are connected to remote internships with companies like Accenture, PwC, KPMG etc. We share job alerts from time to time on available vacancies and tips that can help our students get job faster. We also offer CV review, LinkedIn profile optimization and letter of recommendation to diligent students.

All our training are physical at our Ikeja office. However, those who are outside Nigeria or living far can join online. Who join our classes from Canada, The UK, USA, UAE, Finland etc.

Yes. Tech365 was established to bridge the practical knowledge that people are lacking to secure a job. Hence, we focus on making the class beginner friendly with lots of projects to help the participants master the skill.

We issue a certificate of completion after the training. If you are interested in certification, you can pay to take certification exam by international bodies online.

You can chat with our representation using the WhatsApp chat button on our website or call the phone number at the top or bottom of this page. You can also click the register button on this page to show your interest and one of our team will reach out to you.

We don’t compete based on price. Our fees is based on the value we offer. If you want a place that will give you in-depth knowledge and value for your money, you are in the right place. Our past students are glad to learn from us as our training is hands-on and designed to make you job-ready. You can check what over 80 of our students had to say about our training on our Google review page.

Our Students Work at

devops engineering training bootcapmp Lagos Nigeria