: +2349037861164 +2348128055651
info@ditsacademy.com

Become a Cyber Security Expert

Learn ethical hacking, penetration testing, and system defense with real-world tools and hands-on labs.

Cyber Security Curriculum

Ethical Hacking • Network Security • Cyber Defense

About the Course

The Cyber Security course is designed to equip students with the skills and knowledge required to protect digital systems and networks from cyber threats. It covers key areas such as network security, ethical hacking, cryptography, incident response, and risk management. Through hands-on labs, simulations, and real-world scenarios, students gain practical experience to tackle modern cybersecurity challenges and build a strong foundation for professional certifications.

Learning Methodology

Our academy adopts a structured, practical-focused approach to cyber security training. Students progress from foundational concepts to advanced techniques through hands-on labs, guided exercises, and real-world simulations. Ethical standards, assessments, and industry best practices are emphasized to prepare learners for professional roles and certification pathways.

Course Outline

Week 1: Windows Administration (Windows 10)

  • Understanding the Windows operating system
  • Console, shell, and kernel concepts
  • Windows Command Prompt and DOS commands
  • File systems in Windows
  • Executing tasks and operations via the console

Week 2: Networking Fundamentals

  • Introduction to computer networking
  • Understanding IP addresses
  • Types and classes of IP addresses
  • IP address ranges and classifications

Week 3: Cyber Security Fundamentals

  • Introduction to cybersecurity concepts
  • Data protection and safe keeping
  • Evolution of cyber threats
  • Cybersecurity domains and myths
  • Common cyber threats and mitigation techniques
  • Network security fundamentals
  • Overview of cybersecurity tools

Week 4: Introduction to Ethical Hacking

  • What ethical hacking is and why it matters
  • Roles and responsibilities of ethical hackers
  • Key ethical hacking concepts
  • Problems hacking identifies
  • Limitations of ethical hacking
  • Setting up a hacking lab

Weeks 5–6: Reconnaissance & Information Gathering

  • Network reconnaissance and footprinting
  • Discovering devices on the same network
  • Gathering device information (ports, MAC address, services)
  • Operating system detection
  • Using Zenmap for advanced scanning

Week 7: Wireless & Wi-Fi Hacking

  • WPA and WPA2 security fundamentals
  • Capturing handshakes
  • Creating and using wordlists
  • WPA/WPA2 cracking techniques
  • Securing wireless networks
  • Configuring Wi-Fi for maximum security

Week 8: Connection Attacks

  • Packet sniffing basics
  • Wi-Fi bands (2.4GHz & 5GHz)
  • Targeted packet sniffing
  • De-authentication attacks
  • ARP request replay attacks

Weeks 9–11: Sniffing & Analysis with Wireshark

  • Wireshark overview and setup
  • Sniffing and analyzing network traffic
  • Using filters and packet tracing
  • Capturing passwords and transmitted data
  • Man-In-The-Middle (MITM) attacks
  • Git & GitHub basics
  • Installing tools from GitHub into Kali Linux

Weeks 12–13: Trojan Backdoors & Payloads (Windows)

  • Understanding backdoors
  • Testing delivery methods
  • Fake update attacks
  • Backdooring downloads
  • Protecting against delivery-based attacks

Week 14: Android Backdoors

  • Creating Android backdoors
  • Binding trojans with legitimate APKs
  • Testing in virtual or physical environments

Weeks 15–16: Basic Python Programming

  • Python variables and strings
  • Python fundamentals for security
  • Penetration testing with Python
  • Overview of testing tools and platforms

Possible Career Opportunities

  • Cybersecurity Analyst
  • Penetration Tester (Ethical Hacker)
  • Security Consultant
  • Incident Responder
  • Security Operations Center (SOC) Analyst
  • Cybersecurity Researcher
Cyber Security Laptop

Why Choose This Course?

Hands on Cyber Labs

Real-World Attack Scenarios

Industry-Standard Tools

Career-Focused Training

What You'll Learn

Network & Web Security Ethical Hacking Malware & Threat Analysis System Hardening

Hands-On Experience

security-terminal

Tools You'll Use

Kali Linux Metasploit /splunk Wireshark

Start Your Cyber Security Career