The Certified Information Security Expert (CISE – Level 1) course is a foundational cybersecurity training program designed to equip beginners and those looking to upskill with practical, hands-on experience in the field of information security. With 80% of the course focused on practical exercises, participants gain essential skills needed to identify, prevent, and respond to cybersecurity threats effectively. The course covers a wide range of topics, making it an ideal entry point for those interested in pursuing a career in cybersecurity.
CYBERSECURITY CERTIFICATE COURSE
Certified Information Security Expert (CISE - Level 1)
DURATION
3 Months
REGISTRATION FEE
Ghc 200.00
TUITION FEE
Ghc 4000.00
SCHOLARSHIP
Array
Course Overview
Learning Objectives
The CISE – Level 1 course aims to provide participants with a solid foundation in cybersecurity, with a strong emphasis on practical skills and hands-on experience. The course objectives are designed to ensure that learners not only understand theoretical concepts but also gain the ability to apply them effectively in real-world scenarios. The comprehensive objectives for the course are as follows:
- Understand Ethical Hacking Principles and Legal Frameworks
- Explain the fundamentals of ethical hacking, including its purpose, methodologies, and legal considerations.
- Differentiate between ethical hacking and malicious hacking, emphasizing the importance of ethical standards and adherence to relevant laws.
- Gain Proficiency in Networking Fundamentals
- Understand the basic concepts of networking, including network topologies, protocols, IP addressing, and subnetting.
- Describe the role of networking in cybersecurity and the types of attacks that can target network infrastructure.
- Develop Skills in Information Gathering (Foot-Printing and Reconnaissance)
- Perform information-gathering techniques to collect and analyze data about target systems, networks, and organizations.
- Utilize tools and techniques for reconnaissance, such as WHOIS lookup, DNS enumeration, and social media footprinting.
- Learn Google Hacking Techniques
- Use advanced search operators to find sensitive information and security vulnerabilities in publicly accessible web data.
- Identify potential security risks related to improperly indexed data on the internet.
- Master Scanning Techniques for Vulnerability Detection
- Perform network and system scanning to identify open ports, services, and potential vulnerabilities.
- Use scanning tools such as Nmap and Nessus for comprehensive vulnerability assessment.
- Understand System Hacking for Windows and Linux Environments
- Explore techniques for exploiting vulnerabilities in Windows 7 and Linux systems.
- Understand the different types of user privileges and how privilege escalation can be achieved on these platforms.
- Apply countermeasures to protect Windows and Linux systems from common threats.
- Assess Mobile Security (Android & iPhone Hacking)
- Understand the security architecture of mobile devices, including Android and iOS.
- Identify vulnerabilities in mobile applications and operating systems, and learn methods for exploiting them.
- Apply best practices for securing mobile devices.
- Differentiate Between Various Types of Malware
- Understand the characteristics, behavior, and propagation mechanisms of malware, including viruses, worms, and trojans.
- Detect and mitigate malware infections on different systems using appropriate tools.
- Apply Techniques for Web Application Security (SQL Injection and XSS)
- Identify and exploit common web application vulnerabilities, such as SQL Injection and Cross-Site Scripting (XSS).
- Understand how these vulnerabilities can be used to compromise web applications and databases.
- Implement secure coding practices and input validation techniques to mitigate these vulnerabilities.
- Perform Network Sniffing and Traffic Analysis
- Use sniffing tools to capture and analyze network traffic, understanding the data flow and identifying potential security issues.
- Detect sniffing attacks and implement countermeasures to protect against data interception.
- Understand Social Engineering Tactics
- Explain the principles of social engineering and how attackers manipulate human behavior to gain unauthorized access.
- Identify different social engineering techniques, such as phishing, pretexting, and baiting.
- Implement measures to educate users and prevent social engineering attacks.
- Protect Against Identity Theft and Fraud
- Understand the methods used in identity theft and fraud schemes.
- Implement best practices for protecting personal and organizational data from identity theft.
- Defend Against Denial of Service (DoS) Attacks
- Explain the methods used to carry out DoS and Distributed Denial of Service (DDoS) attacks.
- Implement detection and mitigation strategies to defend against service disruption.
- Prepare for Real-World Cybersecurity Challenges
- Gain practical experience through hands-on labs and exercises to simulate real-world scenarios.
- Develop problem-solving skills and critical thinking for identifying and responding to security threats effectively.
- Understand the importance of continuous learning and staying updated with the latest cybersecurity trends and technologies.
By completing the CISE – Level 1 course, participants will be equipped with the skills and knowledge to begin a career in cybersecurity, perform ethical hacking activities, and protect digital assets from a range of cyber threats.
LEARNING OUTCOMES
Why Take This Course?
- Practical Focus: With 80% hands-on labs, learners get practical experience that prepares them for real-world cybersecurity challenges.
- Comprehensive Coverage: The course addresses all key aspects of cybersecurity, from ethical hacking principles to mobile and web security.
- For Beginners & Upskillers: Ideal for individuals new to cybersecurity or professionals who wish to enhance their skills and knowledge.
The CISE – Level 1 course is a valuable step for anyone looking to enter the field of cybersecurity or enhance their understanding of information security threats, vulnerabilities, and defensive techniques.
Target Audience FOR
CYBERSECURITY CERTIFICATE COURSE Course
Not Displayed Yet
Job Prospects for
CYBERSECURITY CERTIFICATE COURSE Course
Not Displayed Yet …
Course Requirements
- Basic Understanding of Computers
- Laptop (at least i5 processor and 8 GB RAM)
- There is no other academic requirement
Mode of Delivery
Online/Offline (Hybrid)
Session Days
Friday, Saturday
Payment Plans
A payment of 50% is due before the start of the course.
Course Materials
Year-Month-Day
Start Date: 2024-11-01