ADDI CYBERSECURITY INITIATIVE
The African Diaspora Development Institute in collaboration with Eretmis Academy is bring cybersecurity education to the African Youth in the Diaspora and on the content. This collaboration has made it easier than ever for you or a loved one to enroll in a premier cybersecurity training or even sponsor an African Youth to learn cybersecurity.
The goal of this collaboration is to Transform Africa into a global leader of cybersecurity innovation and job creation this decade.
What To Expect In This Course
In this course, you will learn the basics of cybersecurity, the different cybersecurity career paths and skills employers are desperately looking for, as well as the duties & responsibilities of cybersecurity professionals. Students will learn identity & access management, networking technologies & tools, threat & vulnerability identification, and assessment.
The course covers cybersecurity risk management, cybersecurity architecture & design, introduction to cloud & cloud security, cryptography & PKI, and cybersecurity frameworks. The course will covers the CompTIA Security+ Certification Exams objectives with over 200 Security+ practice test.
This course is designed to give you a practical hands-on cybersecurity experience, which will enable you to perform your duties as a cybersecurity professional when you land your first cybersecurity job. At the end of the course, you would have acquired the knowledge, skills, tools, and confidence to perform entry-level cybersecurity duties in any organization.
THIS COURSE IS FOR YOU IF
- You want to get your first cybersecurity certification (CompTIA Security+)
- You want to work in an industry where entry-level positions start as high as $78,000 and is projected to increase over the next 10 years.
- You want to start a career in cybersecurity, but you don’t have any I.T. experience.
- You want to secure your future with a job that can give the financial freedom you want.
- You want to work in an industry with 0% unemployment rate and endless opportunities.
- You want to start a career in cybersecurity as soon as possible.
WHAT YOU'LL LEARN
You will learn how to install and configure systems to secure applications, networks, and devices, perform threat analysis and respond with appropriate mitigation techniques, participate in risk mitigation activities, and operate with an awareness of applicable policies, laws, and regulations.
You will learn the core knowledge required of any entry-level cybersecurity role and serve as a springboard to intermediate-level cybersecurity jobs. This course incorporates best practices in hands-on troubleshooting to ensure security. You will acquire practical cybersecurity problem-solving skills.
At the end of this course, you will know how to identify and address security incidents. You will learn the various methods that hackers use to break into computer networks. You will also learn how to use different cybersecurity tools to identify and mitigate vulnerabilities.
WHO SHOULD TAKE THIS COURSE?
Most people want to get into I.T. & cybersecurity, but they do not know how or where to start. Getting into the I.T. & cybersecurity field can be difficult for beginners who do not have over $80,000 for a four-year college degree. The beauty of the I.T. & cybersecurity field is that you do not need a college degree to start; all you need to start is a certification.
This course is designed for anyone who wants to start a new career with entry-level positions starting as high as $78,000 per year. Professionals such as doctors, nurses, engineers, police, teacher, taxi drivers, home care workers, hotel workers, etc. can all take this course. This course can help you move into the cybersecurity field of your current profession. This course is designed for people with or without I.T. & cybersecurity background.
This course is invaluable to beginners, regardless of your experience or your current job. Cybersecurity has become an inevitable part of all industries. All you need for this course is readiness and willingness to study.
TECHNICAL REQUIREMENTS FOR THIS COURSE
BASIC REQUIREMENTS
You should be familiar with using a computer and accessing the internet. You will need to have a current email account to enroll in this course.
BROWSER REQUIREMENTS
Google Chrome is the recommended browser when attending the online live class. You can use any browser like Windows Edge or Explorer or Firefox.
ADDITIONAL REQUIREMENTS
Some of the hands-on performance activities may require downloading additional software or programs. The course instructors will assist students in downloading and installing these programs.
Courses Offered
Our courses are designed for all levels of professionals (beginners, intermediate, and advanced). Our courses break down complex cybersecurity concepts into simple everyday scenarios that our students can relate to.
Entry-Level Course Curriculum
- Introduction To Module One (0:45)
- Download Module1 Lesson Notes
- Lesson One: Introduction To Cybersecurity (25:03)
- Lesson Two: Cybersecurity Career Path (36:35)
- Lesson Three: Certificate Vs. Degree (21:20)
- Lesson Four: Cybersecurity Competency Model (16:46)
- Lesson Five: Cybersecurity Language (16:24)
- Download Cybersecurity Language Cheat Sheet
- Introduction to Module Two (0:59)
- Download Module2 Lesson Notes
- Lesson 1: Cybersecurity CIA (92:19)
- Lesson 2: Cybersecurity Definitions (10:54)
- Lesson 3: Cybersecurity Controls (22:00)
- Lesson 4: Types of Vulnerabilities (41:55)
- Lesson 5: Identification of Vulnerabilities (13:27)
- Lesson 6: Penetration Testing (36:46)
- Lesson 7: Indicators of Compromise (27:21)
- Lesson 8: Types of attacks (77:04)
- ASSIGNMENT-Hands-On Exercise
- Introduction to Module Three (0:50)
- Download Module3 Lesson Notes
- Lesson1: Introduction to Risk Management (64:59)
- Lesson 2: Security Policies, Plans, and Procedures (14:07)
- Lesson 3: Personnel Management (42:16)
- Lesson 4: Business Impact Analysis Concepts (23:38)
- Lesson 5: Incident Response Procedures (27:42)
- Lesson 6: Basic Concepts of Forensics (22:50)
- Lesson 7: Disaster Recovery and Continuity (40:57)
- Lesson 8: Data Security and Privacy Practices (17:40)
- Quiz/Practice Test
- Introduction To Module Four (1:26)
- Download Module 4 Lesson Notes
- Lesson One: Computer Networking Basics (33:02)
- Lesson Two: Install and configure network components, both hardware and software (137:58)
- Lesson Three: Network Security (103:58)
- Lesson Four: How to use appropriate software tools to assess the security posture of an organization (23:13)
- Lesson Five: Troubleshoot common security issues (13:36)
- Lesson Six: Deploy Mobile Devices Securely (34:51)
- Lesson Seven: Implement Secure Protocols (6:30)
- Quiz/Practice Test
- Introduction to Module Six (1:15)
- Download Module 6 Lesson Notes
- Lesson 1: Introduction to Cybersecurity Architecture and Design (10:08)
- Lesson 2: Cybersecurity Frameworks, best practices, secure configuration guides (18:45)
- Lesson 3: Secure Network Architecture Concepts (7:59)
- Lesson 4: Secure Systems Design (36:37)
- Lesson 5: Secure Staging Deployment Concepts (9:41)
- Lesson 6: Embedded Systems and associated security implications (22:50)
- Lesson 7: Secure Application Development and Deployment Concepts (60:02)
- Lesson 8: Cloud and Virtualization Concepts (44:25)
- Lesson 9: Resiliency and Automation Strategies to Reduce Risk (17:16)
- Lesson 10: Importance of Physical Security Controls (17:04)
- Quiz/ Practice Test
- Module Introduction (0:46)
- Download Module7 Lesson Notes
- Lesson 1: Basic Concepts of Cryptography (31:30)
- Lesson 2: Cryptography Algorithms and their Basic Characteristics (66:50)
- Lesson 3: Install and Configure Wireless Security Settings (23:16)
- Lesson 4: Implement Public Key Infrastructure (44:30)
- Quiz/ Practice Test
- Module Introduction (0:53)
- Download Module 8 Lesson Notes
- Lesson One: Identity and Access Management Concepts (30:03)
- Lesson Two: Install and Configure Identity and Access Services (30:51)
- Lesson Three: Implement Identity And Access Management Controls (19:45)
- Lesson Four: Common Account Management Practices (30:32)
- Quiz/Practice Test
- Introduction to Hands-on Performance Training (1:43)
- Lesson One: Introduction to Virtual Machines (VMs) (26:47)
- Lesson Two: Risk Associated With Virtual Machine (5:36)
- Lesson Three: Installation of Hypervisors and Virtual Machines (40:27)
- Installation of Metasploitable 3 (17:16)
- Installation of Parrot OS(Similar Kali Linux) (8:38)
- Installation of Windows 10 Virtual Machine (8:38)
- Installation of Windows 8 Virtual Machine (11:27)
- Windows Command Line Basics (23:09)
- Linux Command Line Basics (27:20)
- Lesson Four: Command Line Tools (54:32)
- Lesson Five: Intro To Popular Cybersecurity Tools (8:48)
- Lesson Six: Cybersecurity Collective Tools (17:14)
- Installation of SIEM Tools -Splunk (10:13)
- Installation of Nessus (14:58)
- Installation of Vulnerability Scanning Tool-Qualys (7:40)
- Lesson Seven: Cybersecurity Preventive Tools (6:48)
- Lesson Eight: Password Cracking Tools (2:10)
- Lesson Nine: Exploitation Tools (8:00)
- Lesson Ten: Social Engineering Attack Simulation (0:59)
- Vulnerability Database-CWE, NVD, CVE, CVSS (19:09)
- LESSON FIVE NOTES
- COMMAND CHEAT SHEET
- Nmap-Port/Network Scanner (35:58)
- How to configure FIREWALL, GROUP POLICY, PASSWORD POLICY (26:00)
- Nikto-Web Vulnerability Scanner (17:36)
- Wireshark and Man-in-the-middle Attack (14:20)
- Wireless Network Configuration (17:40)
- Using Nessus-1 (26:07)
- Using Nessus-2 (31:22)
- Splunk Enterprise 1 (60:12)
- Splunk Enterprise 2 (34:34)
- Hands-On Exercise
- Splunk Security Essentials 1 (39:05)
- Splunk Security Essential 2 (12:53)
- Splunk Enterprise Security (Splunk Cloud) (49:59)
- Nikto -Web Vulnerability Scanner (21:00)
- BurpSuite (Web Application Security Testing) (22:24)
- Social Engineering (How to Detect Phishing Attack) (31:09)
- Social Engineering (Credential Harvester Attack) (19:22)