Curriculum

BASIC KNOWLEDGE IN CYBER SECURITY

Certificate in Certified Ethical Hacker

  1. Course Overview

This programme is for candidates to gain an in-depth knowledge ethical hacking that deals with breaking legally into computer systems and networks to identify vulnerabilities. It’s essential because it helps organizations preemptively identify and fix security flaws before malicious hackers exploit them, thus enhancing overall cybersecurity. By learning ethical hacking, you can play a vital role in securing the systems and data from threats and attacks. As an ethical hacker, you can: Conduct investigations and analyses of the target systems to identify any security or system vulnerabilities from the hacker’s point of view and suggest a remedy

  • Programme Learning Outcomes

On completion of the Modules, participants will be able to:

  • Develop the technical and problem-solving skills to tackle the broad range of cyber security challenges.
  • Learn how to research, design and implement robust cyber security measures while developing your theoretical understanding of the discipline. 
  • Create a professional development plan and produce an e-portfolio to demonstrate your understanding and experience across the topics. 
  • Plan a vulnerability assessment and penetration test for a network. Execute a penetration test using standard hacking tools in an ethical manner. Report on the strengths and vulnerabilities of the tested network.
  • Understand hacking techniques, which is the same techniques that malicious hackers use so that you can better defend against them.
  • Identify vulnerabilities, discover and understand the weaknesses in computer systems, networks, and applications.
  • Understanding of computer hardware and how various hardware devices work, including the CPU, graphics card, data storage and the motherboard.  
  • Entry Requirement
  • Senior school certificate and Basic understanding of computer knowledge
  • Duration of the Programme

                   12 weeks

  • Course Description
  • Week 1: Introduction to Ethical Hacking
  • Week 2: Footprinting and Reconnaissance
  • Week 3: Scanning Networks
  • Week 4: Enumeration, Vulnerability Analysis
  • Week 5: System Hacking, Malware Threats, sniffing
  • Week 6: Social Engineering, IoT Hacking, Cloud Computing
  • Week 7: Denial-of-Service, session Hijacking
  • Week 8: Evading IDS, Firewalls, and Honeypots
  • Week 9: Hacking Web Server, Hacking Web Applications, SQL Injection
  • Week 10: Hacking Wireless Networks, Hacking Mobile Platforms
  • Week 11: Implementation, Monitoring and Evaluation
  • Week 12: Revision, Course Assessment, and Certification

Certificate Course in Information security

  1. Course Overview

A Certificate Course in Information Security is to teach how to monitor systems and mitigate threats when they happen. This is an oversimplification of IT security degrees’ curricula. Each module will have a certain focus, but the overall goal is to help you develop the computing skills needed to prevent attacks and protect people’s data and privacy

  • Program Learning Outcomes

Upon successful completion of this course, you will be able to:

  • explain the fundamental principles of information security;
  • identify major information security threats and their modes of attack;
  • describe cryptographic models and how they are used to provide security;
  • explain the principles of access control models such as discretionary, mandatory, role, and rule-based;
  • illustrate methods of identification and authentication such as passwords, pins, biometrics, and tokens;
  • describe network security methods including network designs, firewalls, wireless encryption methods, tunneling, and network protection tools;
  • describe operating system (OS) hardening, malware protection, firewalls, and security tools;
  • explain intrusion detection systems (IDS) and intrusion prevention systems (IPS), and the advantages and disadvantages of each system; and
  • Entry Requirements
  • Basic communication skill
  • Senior school certificate and basic understanding of computer knowledge
  • Duration of the Programme

12 weeks

  • Course Description
  • Week 1: Introduction to Information Security
  • Week 2: Threats and Attack Modes
  • Week 3: Cryptographic Models
  • Week 4: Access Control
  • Week 5: Identification and Authentication
  • Week 6: Network Security
  • Week 7: Operating System (OS) Security
  • Week 8: Intrusion Detection and Prevention Systems
  • Week 9:  Guarding Against Network Intrusions
  • Week 10: Privacy Laws, Penalties, and Privacy Issues
  • Week 11: Preventing System Intrusions
  • Week 12: Revision, Evaluation and Certification

Certificate Course in Cybersecurity for managers

  1. Course Overview

This course has been designed for organizational leaders: managers, directors and advisors to the board, who seek the knowledge that will help them develop a custom cybersecurity program for their organization or improve an existing one. It goes beyond the technical solutions and presents cybersecurity as an enterprise-wide risk management challenge, with an impact at technical, organizational and governance levels. The program places emphasis on how to identify cyber threats for your organization, assess their risk levels, and determine how to mitigate these risks to acceptable levels. Develop strategies to build a cyber-resilient organization.

  • Programme Learning Outcomes

On completion of the Modules, students will be able to:

  • Develop a solid understanding of cyber risk and successful mitigation strategies to reduce an organization’s risk profile.
  • Deploy methods for discovering anomalies pertaining to cyber threats through hands-on exercises in programming, visualization, statistical analysis, machine learning, and big data analytics tools.
  • Understand the challenges around information assurance, data governance and privacy.
  •   Entry Requirements
  • Ordinary National Diploma (OND) or equivalent qualification
  • Mature-aged participants will also be considered without the minimum education requirements but with relevant work experience within a chosen area of study and a demonstrated capacity to meet course requirements.
  • Duration of the Programme

  8 Weeks.

E. Course Description

  • Week 1: Cyber security for Business
  • Week 2: Cyber security Analytics for Business
  • Week 3: Digital Forensics
  • Week 4: IT Audit and Information Assurance
  • Week 5: Audit Data
  • Week 6: Strategy in Action
  • Week 7: Financial Management in Cyber world
  • Week 8: Revision, Evaluation and Certification

Certificate Course in Network & Web Security

  1.  Course Overview  

In today’s digital age, understanding the basics of cybersecurity is essential for personal and professional safety. You will learn about network security, risk assessment, encryption mechanisms, access controls and practical skills to protect data and secure network infrastructure.

  • Entry Requirements 

 The ideal candidates for this programme is expected to possess the following certtificates

i.  Secondary school certificate

ii. Basic knowledge in computing

iii. Basic communication skills

C. Duration of the Programme

Eight weeks

 D. Course Description

This course covers the fundamentals of security, including its requirements, design, and models, as well as security, information, components, issues, analysis, architecture, multiple models, security types, and applications

Week 1: Introduction to computer and network security.

Week 2: Network Security and firewalls    

Week 3: Cryptography

Week 4: Public Key Infrastructure

Week 5: Virtual Private Networks

Week 6: Wireless Network Security and Privacy,

Week 7: Legal Issues and    Ethics

Week 8: Revision; Course Assessment and; Certification

Centre for Cyber Security and Sustainable Development

Diploma in Cyber Security

  1. List of Academic Staff
 NameStatus and QualificationResearch Interests
L. A. OlawoyinReader & Ag. DirectorM. Eng. (FUT, Akure), M.Sc. (Sussex), Ph.D. (BUPT, China)Wireless Communication
R. G. JimohProfessor B.Sc. (Ilorin); M.Sc. (Ibadan); Ph.D. (Utara, Malaysia)  Cybersecurity
Oluwakemi C. AbikoyeProfessorB.Sc, (Ilorin), M.Sc. (Ibadan); Ph.D. (Ilorin); PGDE (Ilorin)Cybersecurity
J. B. AwotundeLecturer IIB.Tech. (FUT, Minna), M.Sc. Ph.D. (Ilorin)Artificial Intelligence
M.O. OloyedeSenior LecturerB.Sc, M.Sc. Ph.D.Information Technology
A.A. OloyedeReaderM.Eng (BUK); M.Sc. Ph.D. (York, UK)  Wireless Communication

The field of cyber security deals with methods of stopping unauthorized individuals from accessing computer systems and networks, damaging hardware, software, or electronic data, and denial of services. The Dip CYBS curriculum is structured with an emphasis on software development, risk management, network security, security operations, and real-world applications of cyber security. The syllabus for the diploma program in cyber security emphasizes the principles of cyber security, along with project and assignment themes. This covers foundational subjects such as database management systems, cryptography, information security, operating systems, and secure communication. It includes the fundamentals of cyber security with an emphasis on a particular area of cyber security courses that go over every subject needed to understand cyber security in detail.

Programme Objectives:

The objectives of DCYB are but limited to:

  1. promote understanding of cyber security concerns and difficulties in IT environments;
  2. teach the fundamental concepts and abilities needed to safeguard one’s individual IT assets;
  3. acquire knowledge and techniques required to provide protection and security to our personal data and information resources;
  4. experiment and gain the knowledge and skills necessary to provide protection and security to organizational data and information in order to build a secured IT infrastructure in the companies;
  5. develop a high standard of professional ethics in providing security in the cyber world; and
  6. raise awareness of the need to take preventative measures to safeguard against fraud and cybercrimes.

 Programme Structure

The Centre follows the credit system for this Programme. To successfully complete the Diploma in Cyber Security and Sustainable Development (DCSSD) programme, the student will have to offer 32 credits over a minimum period of 1 year to a maximum of 2 years by passing all the prescribed courses.

Course Contents

SCI 701: Introduction to Sustainable Development 2 Credits

Feasibility studies. Entrepreneurship skills development. Organization and management of business. Sourcing for funds. Financial management. Patency. Marketing and management problems.  

30h (T); R

SCI 702: Scientific Research Methodology 2 Credits

Principles of scientific research. Data collection. Processing and analysis. Statistical packages. Precision and accuracy of estimates. Hypothesis formulation and testing.  Organisation of research. Report writing and presentation. Research ethics and grants.

30h (T); R

DCS 701: Basic Windows Operating System 3 Credits

Introduction to Windows, Types of Operating System, My Computer, Recycle Bin, Desktop, Drives; Creating, Renaming a directory/folder, Make a file read only, hidden, Editing a file; Delete a file. Listing the files in the directory, Create a file, Copy a file from one directory to the other, Deleting all files from a directory/folder, Deleting a director/folder, Formatting a hard disk and loading operating system, Domain, workgroup, Active Directory, User Management, Network Setting, Services, IIS Configuration.

45h (T); C

DCS 703: Linus Operating System 3 Credits

Introduction, History of Linux, Distributions of Linux, Devices and drivers, File system hierarchy, The components: Kernel, Distribution, XFree86, Sawfish, Gnome, The command line commands, File, management commands, Working with nano, Working with help (man). SSH and X-forwarding, Managing compressed archives with zip and tar, Working with GNU screen, How to add users and groups, working with su, working with sudo, Changing user password, Printing, Installing software with Yum, Yast, Rpm, Installing webmin.

45h (T); C

DCS 705: Data Communication & Networking 3 Credits

Introduction to data communication and networking. Network Reference Models: OSI and TCP/IP Models. Transmission media and network devices Physical and data link layer functionalities. Analog and digital signal. Encoding. Multiplexing and Switching: FDM, TDM, WDM, SDM, Message Switching and Circuit Switching and Packet Switching, Data Link Control Protocols: Token Passing, CSMA/CD, CSMA/CA, Internet Protocols and Services. Network Layer: Internet-working, and IP addressing, ARP, RARP, ICMP, IGMP. Transport Layer protocols: TCP& UDP. Application Layer protocols: HTTP, HTTPs, SMTP, POP, DNS, TELNET, FTP. Internet and its Services: Intranet, Extranet, www, Email

45h (T); C

DCS 707: Information Security 3 Credits

Information Security Concepts: Information security issues, goals, architecture, attacks, Security Services and Mechanisms. Introduction to Cryptography: Network security model, Cryptographic systems, Cryptanalysis, Steganography. Types of Cryptography: Symmetric key and Asymmetric Key Cryptography, Encryption and Decryption Techniques. Cryptographic Algorithms: Cryptographic hash, Message Digest, Data Encryption Standard, Advanced Encryption Standard, RSA, ECC.

45h (T); C

DCS 711: Security Threats and Vulnerabilities 3 Credits

Overview of Security Threats and Vulnerability: Types of attacks on
Confidentiality, Integrity and Availability. Vulnerability and Threats. Malware: Viruses, Worms, Trojan horses. Security Counter Measures; Intrusion Detection Systems, Antivirus Software

45h (T); C

DCS 713: Ethical Issues in Information Security & Privacy 3 Credits

Information systems security and legal compliance. Legal compliance and critical infrastructure. Intellectual property created by individuals and organizations. Information Security, Privacy and Ethics. Cyber Crime and Disaster Recovery. Digital Signature. Ethical Hacking, Penetration Testing. Computer Forensics. Cyber Laws and Standards. ISO 27001, Cyber Law (Information Technology Act, 2000). International Standards maintained for Cyber Security. Security Audit. Investigation by Investing Agency. Cyber Security Solutions Vulnerabilities. Cyber Terrorism. Hacking: Ethical issues within an organization.

45h (T); C

Second Semester

DCS 702: Application Cyber Security       3 Credits

System Security. Desktop Security. Programming Bugs and Malicious code. Database Security. Operating System Security: Designing Secure Operating Systems, OS Security. Network Security Model, Threats and Network Security. Firewalls: Overview, Types, Features, User Management. Intrusion Detection System, Intrusion Prevention System. Public Key Infrastructure, Digital Signature Schemes.

45h (T); C

DCS 706: Internet and Web Application Security 2 Credits

Business Evolution, the Internet & Security Considerations. Business Evolution, the Internet & Security Considerations. Identifying & Classifying Weaknesses in Web Applications. Strategies for Developing Secure Web Applications. Securing Mobile, Personal and Business Communications. Email security: PGP and SMIME. Web Security: Web authentication, Injection Flaws, SQL Injection. Web Browser Security. E-commerce security.

30h(T); C

DCS 710: Wireless Network Security 2 Credits

Wireless Network Components. Security issues in Wireless Networks. Securing a Wireless Network. Network security protocols and cryptographic communication mechanisms for realizing specified security properties in wireless and mobile networks, such as secrecy, integrity, authentication, privacy, crypto key distribution, and access control. The course will study three main areas: wi-fi, Bluetooth and network function, all from the perspective of wireless security.

30(h); C

DCS 799 Research Project 4 Credits

A research-based study and report on an acceptable management problem area approved by the supervisor and the Programme Committee.

180h (P); C

H. Graduation Requirements

All candidates are expected to earn a minimum of thirty-one (31) credit units in the coursework and four (4) credits in a research project. All candidates are required to write an acceptable research project on a major problem area in Cybersecurity and Sustainable Development according to Post-Graduate School regulations

I. Summary

Core Courses: SCI701(2), SCI702(2), DCS701(3), DCS702(3), DCS703(3), DCS705(3), DCS706(2), DCS707(3), DCS710(2), DCS711(3), DCS712(2), DCS713(3), DCS799(4)

Total          = 35 Credits