Skill Development Programme in Cybersecurity
The Skill Development Programme in Cybersecurity is designed to equip learners with the practical knowledge and technical expertise required to thrive in today’s rapidly evolving digital world. As cyber threats become more sophisticated, the demand for skilled professionals who can protect systems, data, and networks is higher than ever. This programme focuses on real-world applications, helping participants understand the core principles of cybersecurity while staying current with industry standards and best practices. Applicants with a keen interest in emerging technologies are eligible for the programme.
Throughout the course, learners will explore key areas such as network security, ethical hacking, cyber threat analysis, data protection, and risk management. Emphasis is placed on hands-on experience, where students work with industry-relevant tools and simulations to apply what they learn in practical settings. Whether you're a beginner or someone looking to upskill, the programme builds a strong foundation and progresses into more advanced topics, ensuring well-rounded development.
In addition to technical training, participants receive career support including CV guidance, mock interviews, and job search assistance tailored for cybersecurity roles. By the end of the programme, learners will not only earn a respected certificate but also possess the skills, confidence, and support needed to pursue roles such as Security Analyst, IT Security Specialist, or Cybersecurity Consultant in both the public and private sectors.
Accreditation
Each of the skill development programmes are accredited by the London Management Qualifications Authority (LMQ).
-
Network Administration
- Network Configuration – LAN, WAN
- Segmentations, VLANs and Subnetting
- Network Mapping Tools
- Troubleshooting and Monitoring Networks
- Network Devices – Switches, Routers
- Telecommunication
- System Administration Tools: Cisco Packet Tracer, Nmap, Windows, PowerShell
-
Cybersecurity Fundamentals
- Most Common Vulnerabilities, Risks, And Threats
- The Main Concepts In Cybersecurity
- Types Of Malware And Attackers
- NIST & International Cybersecurity Framework
- Most Common Cyber-Attacks
- Famous Cyber Incidents In The Industry
-
Network & Application Security
- Security Tools – Firewalls, Antivirus, IDS/IPS, SIEM, DLP, EDR
- Honeypots and Cyber Traps
- Cryptography – Symmetric vs. Asymmetric Keys
- Encryption/Decryption, Hash Functions
- Security Architecture
- Access Control Methods, Multi-factor Authentication
- Authentication Protocols Tools: Kali Linux, Splunk, Snort IDS, Active, Directory, Nmap, OpenVPN, Windows, Firewall, Linux, Iptables
-
Incident Handling
- Types Of Attacks in The Web Area (DDOS, SQL Injection, XSS, LFI, Command FInjection)
- Types Of Attacks in The Domain Area (Typo Squatting, Domain Hijacking, Pass The Hash, Pass The Ticket, LDAP Reconnaissance, Brute Force)
- Types Of Attacks in The Malware Area (Ransomware, Virus, Worm, Trojan Horse, Adware)
- Practicing The Role of SOC Analysts by Detecting And Analyzing Alerts And Incidents In Splunk, SIEM, And EDR
- Analyzing Malicious Indicators Using Virus Total and Documenting the Findings
- Group and Individual Incident Report Writing Tools: Splunk, In-House SIEM, Wazuh, VirusTotal, Powershell, Wireshark
-
Forensics
- Computer Memory Forensics, Memory Dump Analysis
- FTK Imager, Autopsy, Redline and RAM capturing
- Digital Evidence Acquisition Methodologies
- Registry Forensics
- Windows Timeline Analysis and Data Recovery
- Network Forensics, Anti-Forensics and Steganography
- Tools: Volatility Framework, FTK Imager, Autopsy, Network Miner, Wireshark, OpenStego, Shell Bags Explorer, winmd5 free, Magnet RAM Capture, Redline, HxD
-
Malware Analysis
- Dynamic Malware Analysis, Reverse Engineering and Malware Obfuscation
- File less Malware Analysis
- Containment, Eradication and Recovery Malware Stages
- Analysis using Sys internals Tools: Procexp, Procmon, Autoruns, TCPView, PuTTY, ExeInfo PE, ProcDOT, HashCalc, FileAlyzer, PDFStreamDumper, HxD, Wireshark, UPX
-
Ethical Hacking And Incident Response
- What is Hacking and Ethical Hacking and the Penetration
- Testing Frameworks
- Ethical Hacking Phases: Reconnaissance, Scanning
- Obtaining Access, Maintaining Access, Covering Tracks, and The Cyber Kill Chain.
- Network Hacking - Metasploit Framework
- Web Application Hacking - OWASP Top 10 – XSS, SQL
- Injection, Manual and Automated Attacks
- Post-Incident Activities
- Capture the Flag Challenge
- Tools: Metasploit, SQLMap, Nmap, OSINT Framework, CUPP, Hydra, Recon-ng, Burp Suite.
-
Secure Design Principles
- Trend Analysis
- Artificial Intelligence in Cybersecurity
- Zero-Trust Policy
- Best Detection Methodologies
- Incident Impact Mitigation
-
Risk Management
- Analyzing, Prioritizing, Evaluating and Monitoring
- Severity of Internal and External Risks
- Risk Management Policies, Procedures, Standards and Guidelines
- Security Models
Career Prospects
- Cybersecurity Analyst
- Information Security Officer
- Ethical Hacker / Penetration Tester
- Network Security Engineer
- Security Consultant
- Incident Responder
- Security Software Developer
- Risk Analyst / Security Auditor
- Chief Information Security Officer (CISO)
- Digital Forensics Expert
- Malware Analyst
- Security Operations Center (SOC) Analyst
- IT Compliance Analyst
- Cloud Security Specialist
- Identity and Access Management (IAM) Specialist