PHYSICAL AND ONLINE Cyber Security BOOTCAMP

Cyber Security Training

Techbly Cyber Security training is beginner-friendly, practical and project-based. It is designed to help participants become job-ready.
Web Security
Cryptography
Operating System
Wireless Security
Penetration Testing
CEH
Linux
Networking

6 Months

Duration

Physical/Online

Classes

Weekday/Weekend

Mon, Web & Fri (Saturdays)

10am - 1pm (WAT)

Time

WHY TECHBLY

Training Benefits

Here are some of the benefits of learning at Techbly.
Curriculum

Cyber Security Course Outline

Module 1

Introduction to Cybersecurity

By the end of the course, students should have a solid understanding of fundamental cybersecurity principles, networking concepts, and practical skills to address security challenges in real-world scenarios. They should be able to apply this knowledge to assess and mitigate cybersecurity risks effectively.

Introduction to Cybersecurity and Networking Basics

  • Understand the fundamental concepts of cybersecurity and its importance in today’s digital landscape.
  • Identify the basic components of computer networks and communication protocols.
  • Differentiate between the TCP/IP model and the OSI model.

Subnetting Fundamentals and IP Addressing

  • Explain the concept of IP addressing and the difference between IPv4 and IPv6.
  • Understand subnetting and subnet masks.
  • Apply subnetting techniques to design and configure subnets.

Operating Systems and Network Security

  • Identify the features and vulnerabilities of different operating systems (Windows, Linux, MacOS).
  • Explain the basic principles of network security and common security tools.

Web Security and Malware

  • Describe web protocols (HTTP, HTTPS) and common web vulnerabilities.
  • Identify different types of malware and methods for detection

Cryptography and Access Control

  • Define cryptography and differentiate between symmetric and asymmetric encryption.
  • Explain common access control mechanisms and authentication methods.

Incident Response and Disaster Recovery

  • Outline the incident response process and best practices for handling cybersecurity incidents.
  • Develop a disaster recovery plan and understand the importance of backups

Risk Management in Cybersecurity

  • This module focuses on understanding and mitigating risks in cybersecurity.
  • Students will learn about the process of identifying, assessing, and prioritizing risks to information assets and systems.
  • Topics may include risk assessment methodologies, risk analysis techniques, risk mitigation strategies, and risk monitoring and control.
  • Review key topics covered in the CC exam objectives, such as network
  • security, compliance and operational security, threats and vulnerabilities,
  • application security, and more
Advanced

Certified Ethical Hacking (CEH)

The general learning objective for a Certified Ethical Hacking (CEH) course is to equip students with the knowledge, skills, and ethical framework necessary to effectively identify, assess, and mitigate security risks through hands-on practice, critical thinking, and adherence to ethical and legal standards, ultimately preparing them for the CEH certification exam and careers in cybersecurity

INTRODUCTION TO ETHICAL HACKING AND INFORMATION SECURITY

  • Understand the importance of ethical hacking in cybersecurity.
  • Define information security concepts and principles.
  • Identify the objectives and scope of the CEH certification.

FOOTPRINTING AND RECONNAISSANCE

  • Learn techniques for footprinting and reconnaissance.
  • Understand how to gather information about targets using OSINT techniques.
  • Familiarize with tools and methodologies for footprinting and reconnaissance.

SCANNING NETWORKS

  • Understand various network scanning techniques.
  • Learn how to conduct port scanning and service identification.
  • Explore vulnerability scanning and analysis methodologies.

ENUMERATION AND SYSTEM HACKING

  • Learn techniques for enumerating network resources and identifying vulnerabilities.
  • Understand methods for gaining unauthorized access to systems.
  • Familiarize with exploitation
  • techniques and post-exploitation methodologies.

MALWARE THREATS AND COUNTERMEASURES

  • Identify different types of malware threats.
  • Learn malware analysis techniques and tools.
  • Understand how to implement malware countermeasures and defenses.

SNIFFING AND SOCIAL ENGINEERING

  • Understand network sniffing techniques.
  • Learn social engineering principles and methodologies.
  • Explore countermeasures against sniffing and social engineering attacks.

DENIAL-OF-SERVICE (DOS) ATTACKS

  • Learn about DoS and DDoS attacks.
  • Explore DoS attack techniques and tools.
  • Understand methods for mitigating and preventing DoS attacks.

SESSION HIJACKING AND WEB APPLICATION ATTACKS

  • Learn techniques for session hijacking.
  • Understand common web application vulnerabilities.
  • Familiarize with tools and methodologies for web application testing and exploitation
  • WIRELESS NETWORK SECURITY

    • Identify wireless network security vulnerabilities.
    • Learn wireless hacking techniques.
    • Understand methods for securing wireless networks and
    • implementing countermeasures.

    CRYPTOGRAPHY AND EVADING IDS, FIREWALLS, AND HONEYPOTS

    • Understand the fundamentals of cryptography and encryption techniques.
    • Learn techniques for evading IDS, firewalls, and honeypots.
    • Explore methods for implementing secure cryptographic protocols and defences.

    PENETRATION TESTING AND REPORTING

    • Understand the process of planning and conducting penetration tests.
    • Familiarize with tools and methodologies for penetration testing.
    • Learn how to report findings and recommendations effectively

    CEH EXAM PREPARATION AND REVIEW

    • Review key topics covered in the CEH exam.
    • Practice exam questions and quizzes.
    • Develop exam preparation strategies and tips
CAREER COACHING

LinkedIn Optimization

Portfolio building and collaboration

  • Improving your profile to attract job opportunities
  • CV review
  • Career tips
  • Job Alert
WORK EXPERIENCE

Internship

Apply for cybersecurity non-paid remote internship with Mastercard, Telstra, PwC, Datacom, JP Morgan chase, common wealth bank etc to boost your CV and experience

our

Training Fees

Cyber Security

N1,000,000
Covers all cyber security Modules. 5 Months

Cybersecurity & Software development

N1,500,000
Covers all the cyber security modules, software development modules. 9 months
our

Frequently Asked Questions (FAQs)


As fraud increases online, the demand for cyber security personal is also on the increase especially outside Nigeria. As you build competences and experience, getting a job becomes easier.


No prior programming experience is required. Our training approach is beginner friendly, and we work on several real world projects to help our student have deeper understanding of each module. However, you need to know how to operate the computer efficiently.


We have weekend class for those who cannot attend the weekday class. 10am to 1pm (Nigerian Time)

You can pay N200,000 or N300,000 at the beginning of each month to attend data analytics and science respectively. N500,000 monthly for artificial intelligence.

Yes, it is recommended you come with your own laptop as it will help you to practice whatever you are learning. However, we provide laptop that can be used only within our premises if need be.

Depending on your budget, Core i7, 16 GB ram with SSD is best.

However, core i3 or i5 with 4gb or 8gb ram HDD will also work fine.

It can be HP, Dell, Mac, or any other brand.

Yes. In fact, this is our strength. We are committed to supporting our students to ensure they succeed. You will be added to our WhatsApp group to connect with others and also ask questions.

We don’t guarantee job after the training. However, some of our students are connected to remote internships with companies like Accenture, PwC, KPMG etc. We share job alerts from time to time on available vacancies and tips that can help our students get job faster. We also offer CV review, LinkedIn profile optimization and letter of recommendation to diligent students.


All our training are physical at our Ikeja office. However, those who are outside Nigeria or living far can join online. Who join our classes from Canada, The UK, USA, UAE, Finland etc.


Yes. Techbly was established to bridge the practical knowledge that people are lacking to secure a job. Hence, we focus on making the class beginner-friendly with lots of projects to help the participants master the skill.

We issue a certificate of completion after the training. If you are interested in certification, you can pay to take certification exam by international bodies online.

You can chat with our representation using the WhatsApp chat button on our website or call the phone number at the top or bottom of this page. You can also click the register button on this page to show your interest and one of our team will reach out to you.

We don’t compete based on price. Our fees is based on the value we offer. If you want a place that will give you in-depth knowledge and value for your money, you are in the right place. Our past students are glad to learn from us as our training is hands-on and designed to make you job-ready. You can check what over 80 of our students had to say about our training on our Google review pag

× Have a question?