Helping Nations Become Cyber Secure & Digitally Confident
Welcome Learners!
We are thrilled to offer this special program to eager learners interested in pursuing careers in cybersecurity. There are five billion people online and 50% are already compromised. Joining the cyber industry is a higher-calling for those interested in protecting people and society.
To get started, click the button below:
Overview
This course is intended to provide learners with fundamental knowledge and skills of Cyber Security with a focus on how to protect data and business operations against cyber threats. This course will examine cyber security frameworks and standards, and threat landscapes, and provides the tools, tactics, and procedures to protect people and businesses from the devastating impact of cybercrime.
Mode of Delivery: Online - This course will be delivered via the Hybrid Flexible modality. It will be delivered through the use of interactive online lectures, online discussions, and practical demonstrations.
What will I Learn?
Upon successful completion of this course, the students will have reliably demonstrated the ability to:
Understand and become proficient with Cyber Security, including fundamentals and standards.
Comprehend and communicate the cyber threat landscape.
Understand, analyze, and respond to common cyber threats such as phishing, business email compromise, ransomware, and supply chain attacks.
Use tools, tactics, and procedures leveraged by threat actors. Demonstrate competence with penetration testing, vulnerability assessments, and open-source intelligence best practices.
Differentiate and understand external threats, cyber literacy, and threat assessment analyst roles and responsibilities.
Present and implement their learnings in real-life use cases.
Who Should do this Course
This course is designed for individuals who are 18 years or older have, completed secondary school and have a keen interest in computer science with basic proficiency in Microsoft Office Suite
Important Information
Fees cover the cost of the program, the cost of the laptop; the cost of the software, training and placement assistance.
Acceptance to the Programme is done in Three Stages
Stage One - Acceptance to Programme: Cyber Nations reviews applications, conducts PLUM assessments (valuates candidates' individual differences in understanding social cues and their ability to anticipate the impact that different actions may have on the feelings and impressions of others), and interviews, and notifies parties of the decision.
Stage Two – Funding: Funding Committee will review all applications to ensure applicants meet the necessary requirements and complete a security check.
Stage Three – Security Check: A security screening and reference checks will be completed prior to full acceptance into the program.
At a Glance
Admissions Term: Ongoing, Quarterly In-Take
Registration: Open
Time: Min. 30 hours per week
Duration: 4 Months
Certificate Awarded: Professional Development Certificate of Competence - Cyber Security Analyst
Course Code: PBRB.CYBER01
Capacity: TBD (Based on Employer Coalition Demand)
Cost: Varies based on region
The specifications for the required laptops needed for such programme
Windows 10 or 11
Microsoft Office 2010 or newer
Intel Core i7
16GB Ram
500GB - 1TB Solid State Drive
Web Camera & Microphone
Please note, if you have a laptop that meets these specifications and want to utilize it, special conditions applies.