cybersecurity
Join our intensive bootcamp to become a cybersecurity professional in 4 months.
- Become a cybersecurity professional with no prior experience.
- Live and instructor-led, learn online and in-person.
- Learn from qualified cybersecurity professionals with in-depth industry experience.
- Receive job interview coaching from our career team.
Explore all 15 topics
Topic 1: AI for Cybersecurity Units
Learn how to leverage AI by adding new sections to your cybersecurity course. This will help you understand the practical applications of AI and how to use it to overcome cybersecurity challenges. You will acquire the skills needed to identify and respond to security threats in real-time, as well as predict potential cyber threats and attack patterns. With AI as your ally, you can become a strong defender of cyberspace and a valuable asset to your organization.
Topics Covered:
- Introduction to AI and its applications in cybersecurity
- AI for threat detection and incident response
- AI in malware analysis and NLP
- AI in network security and threat hunting
- AI for predictive security analytics
Topic 2: Cybersecurity Basics
This lesson will teach you the fundamentals of cybersecurity, giving you a thorough grasp of the field’s definition and scope, as well as an introduction to the variety of career paths available in this quickly expanding sector. In addition, we will concentrate on developing fundamental abilities related to operating systems, which will establish a solid technical foundation.
Topics Covered:
- Cybersecurity roles and careers
- Cybersecurity specializations
- Cybersecurity best practices
- Vocabulary and acronyms
- Introduction to operating system concept
Topic 3: Cybersecurity Fundamentals
In this lesson, you will learn about cyber threats, their actions, motives, and strategies. You will also explore different types of threat actors, typical attack methods, and the frameworks required to develop a robust defence strategy. By reviewing real-world data breaches, you’ll understand how experts establish defence guidelines using the CIA Triad and the cyber death chain concept.
Topics Covered:
- The CIA triad: Three-legged stool
- Threat actor types and attributes
- Cyber kill chain
- Ethical hacking
- Using Linux and Unix
- Intro to a security certification
4: Cybersecurity Attacks
In the fields of information security and cybersecurity, three important concepts are attacks, threats, and vulnerabilities. Vulnerabilities are the weaknesses present in a system or network, while threats refer to the possible risks or dangers that can exploit these weaknesses. Attacks, on the other hand, are the actual acts carried out by threat actors to compromise security and exploit vulnerabilities.
Topics Covered:
- Social engineering
- Attack types
Topic 5: Host-Based Security
In this lesson, we will focus on the security of workstations and servers, also known as host security. It includes patching, hardening, and secure configuration, which are all crucial procedures for safeguarding workstations and servers from malicious actors. These measures serve as the first line of defence against intrusions and are essential for protecting your systems.
Topics Covered:
- Operating System Hardening
- Microsoft Windows Hardening
- Advanced Hardening Concepts
- System Patching
- Virtualization Technology
Topic 6: Network Security
Network security refers to the use of hardware and software solutions to protect computer networks and ensure the accessibility, integrity, and confidentiality of data. This involves understanding embedded systems, the Internet of Things (IoT), and firewalls. You will also learn about network hardware and software, such as virtual private networks, load balancers, routers, switches, network access control, proxy servers, and intrusion prevention. Additionally, you will gain practical experience with firewalls and RADIUS, and explore the latest advancements in wireless security and cloud computing deployment possibilities.
Topics Covered:
- Network technologies and models
- Securing TCP/IP networks
- Network attacks
- Network devices
- Firewalls, IoT, and embedded systems
- Wireless and cloud
Topic 7: Identity and Access Management
In the field of cybersecurity, Identity and Access Management (IAM) is a crucial area that aims to manage user identities and their access to data and resources within a company. This lesson will cover IAM governance and explain how to control user identities and access by employing accounting, authorization, and authentication.
Topics Covered:
- Controlling access
- Zero trust
- Microsoft security, compliance, and identity
fundamentals
Topic 8: Cryptography
It’s fascinating how cryptography can protect communication and information using mathematical algorithms and encryption techniques to transform it into an unreadable format. This practice ensures the privacy, accuracy, legitimacy, and non-repudiation of data in various applications. If you’re interested in learning more about cryptographic technologies and concepts, this course will delve deeply into these topics, which are all included in the Security+ exam.
Topic Covered:
- Cryptography technologies and methods
Topic 9: Security Architecture
Security architecture, also known as information security architecture, is a comprehensive framework used by organizations to plan and implement security measures. Its main goal is to protect the organization’s data, assets, and technological infrastructure from various risks and threats. This framework consists of various procedures, methods, technologies, and policies that are designed to ensure the security of an organization’s sensitive data, uphold regulatory compliance, and minimize security vulnerabilities. An effective security architecture is essential for safeguarding an organization’s data and assets.
Topics Covered:
- Enterprise Security
- Authentication and Authorization
- Resilience
Topic 10: Security Operations
The Security Operations lesson covers blue-team security operations, which include security toolkits, encryption, and incident response workflows and protocols. In this lesson, you’ll have the opportunity to work with industry-leading tools like Wireshark and Splunk. Additionally, you’ll learn the fundamental Python scripting abilities necessary for success as a cybersecurity analyst.
Topics Covered:
- Using Tools to Monitor Systems and Networks
- Forensics
- Asset Security
- Physical Security
- Incident Response and Investigation
Topic 11: Application Security
When developing software, security is often an afterthought, with functionality being given more attention. However, to achieve the best results, security and functionality should be planned and integrated at every stage of the development life cycle. This will protect the necessary layers. In this lesson, we will discuss the complex field of secure software development, including the risks and vulnerabilities that arise from inadequate security integration in programs.
Topics Covered:
- Intro to application security
- Secure development
- Application attacks
- Application security implementation
Topic 12: Security Assessment and Testing
In this lesson, you will learn how to design Information Security (IS) audit test plans, conduct security assessments, and suggest remediation actions. You will also gain insight into the methods used by IS auditors in their engagements. Additionally, you will be introduced to additional ideas related to web security testing and the usage of Kali Linux. By working on mini projects, you can learn more about software testing strategies, real-world vulnerability management difficulties, and other aspects of penetration testing.
Topics Covered:
- Logical and physical security testing
- Mobile device security
- Governance risk and compliance
- Security policies
Topic 13: Preparation for Exams
In this final lesson, you will learn about the top qualifications and certifications for cybersecurity professionals, which are highly sought after by employers and designed to validate fundamental cybersecurity skills.
Topics Covered:
- Exam topics refresh and review
- Exam state of readiness
- Mock exams
Topic 14: Projects
The 10 projects included in this bootcamp range from researching and analyzing real-world events to reviewing industry-leading materials, such as podcasts, videos, and writing reflections on the topic, helping you to develop analytical and communication skills for a successful career. Your projects will also allow you to put together a few high-level project plans, giving you a taste of the project-managementaspectof cybersecurity roles.
Capstone Project
The guided capstone project will involve multiple stages of solution design for a specific problem statement. As part of this capstone, you will need to engage in a hypothetical “structured walkthrough” penetration test. The guided capstone aims to provide you with a comprehensive understanding of how different components that you learn throughout the bootcamp combine to create an experience that acquaints you with the daily routine of a security analyst.
Topic 15: Building a Career
Throughout the boot camp, you will have access to career activities that will guide you in creating a job search strategy that is tailored to your background and goals. You will learn how to craft a resume that stands out, evaluate companies and roles, and excel in interviews. Your career coach will be by your side every step of the way, providing personalized tips and feedback based on your objectives.
Topic Covered:
- Various types of roles in the industry.
- Building a network and using it to land interviews
- Creating a high-quality resume, LinkedIn profile, and cover letter
- Preparing for technical and non-technical interviews
What you can expect from the course
Learn all of the skills, tools, disciple and processes you need to become a Product Designer.
Work with an expert mentor and tutor, who will guide you through, and provide feedback and insight.
Work within an environment with the right ambiance for learning
Build an impressive project portfolio out of the projects you complete.
The hub has an integrated power supply, air-conditioned classroom, high tech training tools, high speed internet, free refreshments.
Receive coaching from our career team to ensure you stand out at interviews.
Browse available payment plans
At LM Tech Hub, we believe in empowering individuals through education, and we are dedicated to making our programs accessible to a diverse range of learners.
LM TECH HUB provides flexible and convenient payment options for you to participate in the programme. We are pleased to offer the following payment options:
Study Now, Pay Later
Study to become the best programmer that you can be without having to worry about the costs while studying. This option allows shortlisted candidates that meet our selection criteria to start their studies immediately and defer payment until a later date.
Pay back after you start a job ₦250,000 + interest
Total course fee ₦250,000
Upfront deposit (must be paid at enrollment) ₦50,000
Maximum loan amount ₦200,000
Payments made during the course ₦0
Loan repayment 2 months after starting a job
Flexible payments in 3 instalments
Candidates do not have to pay for the course all at once, with a flexible payment plan you are allowed to pay in three instalments. With 30% paid upfront to secure a place and the remaining 70% spread over the period of the course.
Course fee ₦250,000
30% deposit paid at the enrollment ₦75,000
Balance paid in 2 instalments during the course ₦87,000
Total Cost ₦250,000
Get 20% off when you pay upfront
For those who prefer to complete their payment before the program begins. This option provides you with peace of mind, knowing that your tuition is settled, and you can fully immerse yourself in the program from day one
Course fee before discount ₦250,000
Discount ₦50,000
Total Cost of the course ₦200,000
Bank fiananced study loan over 12 months
You can finance your education through our partner Sterling Bank. Visit www.edubanc.ng for more information.
Course fee ₦250,000
Upfront depost paid at application stage ₦0
Loan amount ₦250,000
Repayment over 12 months before interest charge ₦20,850
Repayment over 12 months with interest charge ₦26,267
Interested candidates must be B.Sc or HND certificate holders, and have either started or completed NYSC. A verifiable guarantor is required for Study Now, Pay Later.
Please note that specific terms and conditions may apply to each payment option, and eligibility criteria for the Study Now, Pay Later program will be assessed on an individual basis.
Are you ready to start a career in tech?
Unleash your potential with our comprehensive program designed to equip you with the knowledge and skills needed to excel in your career.