Cybersecurity
Cybersecurity Job Oriented Certificate Program
Mode
Online
Duration
6 months
including 2 months Certified Internship
Fees
R 7 000
Learning Outcomes
- Utilize the layers of the TCP/IP and OSI models to analyze network protocols.
- Analyze packet captures and draw conclusions about network activity.
- Create a web application and evaluate its security.
- Explain network security protocols and identify their vulnerabilities.
- Use attack tools to:
- Mount attacks on various network types
- Apply countermeasures to prevent these attacks
- Perform technical assessments:
- Map ports on a given IP
- Fingerprint services
- Catalog vulnerabilities
- Bypass firewalls
- Launch web-based exploits
- Deliver attack payloads to:
- Gain and maintain backdoor access to compromised machines.
Course Outline
- Module 1: Cybersecurity Foundational Skills
- Module 2: Cybersecurity Intermediate Skills
- Module 3: Cybersecurity Development Skills
- Module 4: Gray Hat Hacking
- Module 5: Cybersecurity Skills Application
- Module 6: Internship Project
- Module 7: Career Counselling Assistance & Employability Enhancement Program.
INTAKE
11th May,
13th July,
14th September &
16th November.
Course Overview
Cybersecurity Engineering Prep is a mandatory pre-class requirement for all students.
The prep course helps students:
- Get accustomed to the platform.
- Set up their virtual machines.
- Gain a basic understanding of Python, Systems, and Networks.
The purpose is to ensure students are prepared for the first day of class. It typically takes 10–20 hours to complete.
The course includes:
- A pre-test to assess initial knowledge.
- A post-test to evaluate understanding after completion.
Course Content Includes:
- Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP
- TCP hijacking
- ARP cache poisoning
- Domain spoofing
- Focus Areas:
- System Architecture
- Operating System Architecture
- System Exploits (hardware, OS, and memory)
- Tools Used:
- Metasploit
- Linux command-line tools (e.g., xxd, gdb, etc.)
- Topics Covered:
- Common exploits and their countermeasures:
- Buffer overflows
- TOCTOU (Time-of-Check to Time-of-Use) vulnerabilities
- Shellcode injections
- Integer overflows
- Off-by-one errors
- Cloud security basics and migration considerations
- Hypervisor exploits
- Mobile security: Android and iOS
- Common exploits and their countermeasures:
- Focuses on techniques grounded in military intelligence analysis principles.
- Explores cyberspace as a new warfighting domain, targeting:
- Public and private critical infrastructure
- Economic and national security assets across all sectors globally
- Focuses on Governance, Risk Management, and Compliance in information security.
- Prepares students to engage all functional levels within an organization to support secure information systems.
This course will focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices. We will explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). We will learn the steps involved in Incident Response and Crisis Management.
Python Programming for Cybersecurity Engineers
- Python is a fundamental skill for Cybersecurity Engineers.
- This course introduces the structure and language for creating Python scripts and automation.
Course Focus:
- Learning basic coding
- Performing code analysis
- Practicing secure coding techniques
Learning Outcomes:
- Describe the usage of Metasploit and other Kali Linux pentesting tools.
- Describe the Penetration Testing Execution Standard (PTES).
- Utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks
- Deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
Learning Outcomes:
- Explain the fundamental goals of cryptography.
- Apply knowledge to use common crypto software.
- Analyze vulnerable applications with respect to cryptographic best practices.
- Create tools to attack and fix applications in a virtual lab environment.
- By the course’s conclusion, students will have covered all relevant parts of the cryptography section of the industry-standard CISSP certification program.
Interested?
Complete this form, our team will be in touch soon.
Address
Atrium on 5th, 9th Floor,
5th Street Sandton,
Johannesburg, 2196
Digital Information Solutions
© Copyright 2025. Digital Information Solutions. All rights reserved.
Branch
Ajman Free Zone C1 Building
C1-1F-SF10345
United Arab Emirates (UAE)