BASIC KNOWLEDGE IN CYBER SECURITY
Certificate in Certified Ethical Hacker
This programme is for candidates to gain an in-depth knowledge ethical hacking that deals with breaking legally into computer systems and networks to identify vulnerabilities. It’s essential because it helps organizations preemptively identify and fix security flaws before malicious hackers exploit them, thus enhancing overall cybersecurity. By learning ethical hacking, you can play a vital role in securing the systems and data from threats and attacks. As an ethical hacker, you can: Conduct investigations and analyses of the target systems to identify any security or system vulnerabilities from the hacker’s point of view and suggest a remedy
On completion of the Modules, participants will be able to:
12 weeks
Certificate Course in Information security
A Certificate Course in Information Security is to teach how to monitor systems and mitigate threats when they happen. This is an oversimplification of IT security degrees’ curricula. Each module will have a certain focus, but the overall goal is to help you develop the computing skills needed to prevent attacks and protect people’s data and privacy
Upon successful completion of this course, you will be able to:
12 weeks
Certificate Course in Cybersecurity for managers
This course has been designed for organizational leaders: managers, directors and advisors to the board, who seek the knowledge that will help them develop a custom cybersecurity program for their organization or improve an existing one. It goes beyond the technical solutions and presents cybersecurity as an enterprise-wide risk management challenge, with an impact at technical, organizational and governance levels. The program places emphasis on how to identify cyber threats for your organization, assess their risk levels, and determine how to mitigate these risks to acceptable levels. Develop strategies to build a cyber-resilient organization.
On completion of the Modules, students will be able to:
8 Weeks.
E. Course Description
Certificate Course in Network & Web Security
In today’s digital age, understanding the basics of cybersecurity is essential for personal and professional safety. You will learn about network security, risk assessment, encryption mechanisms, access controls and practical skills to protect data and secure network infrastructure.
The ideal candidates for this programme is expected to possess the following certtificates
i. Secondary school certificate
ii. Basic knowledge in computing
iii. Basic communication skills
C. Duration of the Programme
Eight weeks
D. Course Description
This course covers the fundamentals of security, including its requirements, design, and models, as well as security, information, components, issues, analysis, architecture, multiple models, security types, and applications
Week 1: Introduction to computer and network security.
Week 2: Network Security and firewalls
Week 3: Cryptography
Week 4: Public Key Infrastructure
Week 5: Virtual Private Networks
Week 6: Wireless Network Security and Privacy,
Week 7: Legal Issues and Ethics
Week 8: Revision; Course Assessment and; Certification
Centre for Cyber Security and Sustainable Development
Diploma in Cyber Security
Name | Status and Qualification | Research Interests |
L. A. Olawoyin | Reader & Ag. DirectorM. Eng. (FUT, Akure), M.Sc. (Sussex), Ph.D. (BUPT, China) | Wireless Communication |
R. G. Jimoh | Professor B.Sc. (Ilorin); M.Sc. (Ibadan); Ph.D. (Utara, Malaysia) | Cybersecurity |
Oluwakemi C. Abikoye | ProfessorB.Sc, (Ilorin), M.Sc. (Ibadan); Ph.D. (Ilorin); PGDE (Ilorin) | Cybersecurity |
J. B. Awotunde | Lecturer IIB.Tech. (FUT, Minna), M.Sc. Ph.D. (Ilorin) | Artificial Intelligence |
M.O. Oloyede | Senior LecturerB.Sc, M.Sc. Ph.D. | Information Technology |
A.A. Oloyede | ReaderM.Eng (BUK); M.Sc. Ph.D. (York, UK) | Wireless Communication |
The field of cyber security deals with methods of stopping unauthorized individuals from accessing computer systems and networks, damaging hardware, software, or electronic data, and denial of services. The Dip CYBS curriculum is structured with an emphasis on software development, risk management, network security, security operations, and real-world applications of cyber security. The syllabus for the diploma program in cyber security emphasizes the principles of cyber security, along with project and assignment themes. This covers foundational subjects such as database management systems, cryptography, information security, operating systems, and secure communication. It includes the fundamentals of cyber security with an emphasis on a particular area of cyber security courses that go over every subject needed to understand cyber security in detail.
Programme Objectives:
The objectives of DCYB are but limited to:
Programme Structure
The Centre follows the credit system for this Programme. To successfully complete the Diploma in Cyber Security and Sustainable Development (DCSSD) programme, the student will have to offer 32 credits over a minimum period of 1 year to a maximum of 2 years by passing all the prescribed courses.
Course Contents
SCI 701: Introduction to Sustainable Development 2 Credits
Feasibility studies. Entrepreneurship skills development. Organization and management of business. Sourcing for funds. Financial management. Patency. Marketing and management problems.
30h (T); R
SCI 702: Scientific Research Methodology 2 Credits
Principles of scientific research. Data collection. Processing and analysis. Statistical packages. Precision and accuracy of estimates. Hypothesis formulation and testing. Organisation of research. Report writing and presentation. Research ethics and grants.
30h (T); R
DCS 701: Basic Windows Operating System 3 Credits
Introduction to Windows, Types of Operating System, My Computer, Recycle Bin, Desktop, Drives; Creating, Renaming a directory/folder, Make a file read only, hidden, Editing a file; Delete a file. Listing the files in the directory, Create a file, Copy a file from one directory to the other, Deleting all files from a directory/folder, Deleting a director/folder, Formatting a hard disk and loading operating system, Domain, workgroup, Active Directory, User Management, Network Setting, Services, IIS Configuration.
45h (T); C
DCS 703: Linus Operating System 3 Credits
Introduction, History of Linux, Distributions of Linux, Devices and drivers, File system hierarchy, The components: Kernel, Distribution, XFree86, Sawfish, Gnome, The command line commands, File, management commands, Working with nano, Working with help (man). SSH and X-forwarding, Managing compressed archives with zip and tar, Working with GNU screen, How to add users and groups, working with su, working with sudo, Changing user password, Printing, Installing software with Yum, Yast, Rpm, Installing webmin.
45h (T); C
DCS 705: Data Communication & Networking 3 Credits
Introduction to data communication and networking. Network Reference Models: OSI and TCP/IP Models. Transmission media and network devices Physical and data link layer functionalities. Analog and digital signal. Encoding. Multiplexing and Switching: FDM, TDM, WDM, SDM, Message Switching and Circuit Switching and Packet Switching, Data Link Control Protocols: Token Passing, CSMA/CD, CSMA/CA, Internet Protocols and Services. Network Layer: Internet-working, and IP addressing, ARP, RARP, ICMP, IGMP. Transport Layer protocols: TCP& UDP. Application Layer protocols: HTTP, HTTPs, SMTP, POP, DNS, TELNET, FTP. Internet and its Services: Intranet, Extranet, www, Email
45h (T); C
DCS 707: Information Security 3 Credits
Information Security Concepts: Information security issues, goals, architecture, attacks, Security Services and Mechanisms. Introduction to Cryptography: Network security model, Cryptographic systems, Cryptanalysis, Steganography. Types of Cryptography: Symmetric key and Asymmetric Key Cryptography, Encryption and Decryption Techniques. Cryptographic Algorithms: Cryptographic hash, Message Digest, Data Encryption Standard, Advanced Encryption Standard, RSA, ECC.
45h (T); C
DCS 711: Security Threats and Vulnerabilities 3 Credits
Overview of Security Threats and Vulnerability: Types of attacks on
Confidentiality, Integrity and Availability. Vulnerability and Threats. Malware: Viruses, Worms, Trojan horses. Security Counter Measures; Intrusion Detection Systems, Antivirus Software
45h (T); C
DCS 713: Ethical Issues in Information Security & Privacy 3 Credits
Information systems security and legal compliance. Legal compliance and critical infrastructure. Intellectual property created by individuals and organizations. Information Security, Privacy and Ethics. Cyber Crime and Disaster Recovery. Digital Signature. Ethical Hacking, Penetration Testing. Computer Forensics. Cyber Laws and Standards. ISO 27001, Cyber Law (Information Technology Act, 2000). International Standards maintained for Cyber Security. Security Audit. Investigation by Investing Agency. Cyber Security Solutions Vulnerabilities. Cyber Terrorism. Hacking: Ethical issues within an organization.
45h (T); C
Second Semester
DCS 702: Application Cyber Security 3 Credits
System Security. Desktop Security. Programming Bugs and Malicious code. Database Security. Operating System Security: Designing Secure Operating Systems, OS Security. Network Security Model, Threats and Network Security. Firewalls: Overview, Types, Features, User Management. Intrusion Detection System, Intrusion Prevention System. Public Key Infrastructure, Digital Signature Schemes.
45h (T); C
DCS 706: Internet and Web Application Security 2 Credits
Business Evolution, the Internet & Security Considerations. Business Evolution, the Internet & Security Considerations. Identifying & Classifying Weaknesses in Web Applications. Strategies for Developing Secure Web Applications. Securing Mobile, Personal and Business Communications. Email security: PGP and SMIME. Web Security: Web authentication, Injection Flaws, SQL Injection. Web Browser Security. E-commerce security.
30h(T); C
DCS 710: Wireless Network Security 2 Credits
Wireless Network Components. Security issues in Wireless Networks. Securing a Wireless Network. Network security protocols and cryptographic communication mechanisms for realizing specified security properties in wireless and mobile networks, such as secrecy, integrity, authentication, privacy, crypto key distribution, and access control. The course will study three main areas: wi-fi, Bluetooth and network function, all from the perspective of wireless security.
30(h); C
DCS 799 Research Project 4 Credits
A research-based study and report on an acceptable management problem area approved by the supervisor and the Programme Committee.
180h (P); C
H. Graduation Requirements
All candidates are expected to earn a minimum of thirty-one (31) credit units in the coursework and four (4) credits in a research project. All candidates are required to write an acceptable research project on a major problem area in Cybersecurity and Sustainable Development according to Post-Graduate School regulations
I. Summary
Core Courses: SCI701(2), SCI702(2), DCS701(3), DCS702(3), DCS703(3), DCS705(3), DCS706(2), DCS707(3), DCS710(2), DCS711(3), DCS712(2), DCS713(3), DCS799(4)
Total = 35 Credits