Cyber Security

Shape Image One

Computer Hacking Forensic Investigator [CHFI]

  • Provides students with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using groundbreaking digital forensics technologies
₦80,000 Duration:12 weeks
Book Now
Shape Image One
Shape Image One

Certified Ethical Hacking [CEH]

  • Provides in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack
₦100,000 Duration:12 weeks
Book Now
Shape Image One
Shape Image One

Certified Secure Computer User [CSCU]

  • This provides students with the fundamental knowledge about cyber security, and the main threats to data security. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats
₦60,000 Duration:8 weeks
Book Now
Shape Image One
Shape Image One

Certified Encryption Specialist

  • The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES
₦80,000 Duration:8 weeks
Book Now
Shape Image One
Shape Image One

Certified Disaster Recovery Professional (CDRP)

  • Provides the students with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place and how to recover and restore their organization’s critical data in the aftermath of a disaster.
₦80,000 Duration:16 weeks
Book Now
Shape Image One
Shape Image One

Certified Incident Handler (CIH)

  • Provides students with the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration. Students will learn to apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents.
₦85,000 Duration:12 weeks
Book Now
Shape Image One
Shape Image One

Certified Application Security Engineer (Java and .NET) [CASE]

  • Provides the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.
₦85,000 Duration:12 weeks
Book Now
Shape Image One
Shape Image One

Certified Penetration Tester (CPT)

  • Provides the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.
₦100,000 Duration:16 weeks
Book Now
Shape Image One
Shape Image One