Become a Certified Cybersecurity Analyst

Learn and develop processes and tools to protect systems, networks, and programs from digital malicious attacks.

Cybersecurity

What you will learn:

  • Understanding the significance of cybersecurity
  • Types of cyber threat
  • Network basics
  • Installations and setup of all tools required in course of study.
  • Networking protocols (TCP/IP, DNS, HTTP/HTTPS)
  • IP Addressing and Subnetting

  • Open Source Intelligence (OSINT)
  • Passive Information Gathering

  • Active Information Gathering

  • DNS Enumeration

  • WHOIS Data Collection

  • Port Scanning Techniques

  • Service Enumeration

  • Vulnerability Scanning

  • Banner Grabbing

  • SNMP Enumeration

  • Privilege Escalation

  • Backdoors and Logic Bombs

  • Rootkits and Trojans

  • Post-Exploitation Activities

  • Web Server Enumeration

  • Web Application Vulnerabilities

  • Cross-Site Scripting (XSS)

  • Cross-Site Request Forgery (CSRF)
  • SQL Injection Basics

  • Firewall Evasion Methods

  • Honeypots and Honeynets

  • Packet Fragmentation

  • Protocol Tunneling

  • Spoofing and Masquerading

  • Encrypted Attacks

  • Symmetric Key Cryptography

  • Asymmetric Key Cryptography

  • Public Key Infrastructure (PKI)

  • Secure Key Exchange

  • Applications of Cryptography

  • Wireless Network Basics

  • Wi-Fi Security Protocols (WEP, WPA, WPA2, WPA3)

  • Wireless Network Authentication Methods

  • Wireless Access Point (AP) Security

  • Rogue Access Point Detection

  • Cyber Security Overview
  • Introduction to Ethical Hacking
  • Type of Hackers
  • Stage Of Hacking
  • Penetration Testing
  • Type of Penetration Testing
  • Stage of Penetration Testing
  • OS & Cybersecurity
  • Os Installation
  • Web Reconnaissance
  • Net Reconnaissance
  • Network Vulnerability Scanning

  • Web Vulnerability Scanning

  • Introduction to Website Database Hacking

  • Final Web Live Hacking demo 3

  • Changing of Mac – macchanger -s [interface]

  • Wireless Deauthentication Attack

  • Hacking wireless networks with Air tools (Aircrack-ng)

  • Hacking wireless networks using Wifite and Fern wifi cracker

  • Email Harvesting

  • Phishing using SET Toolkit

  • IP Logging

  • Grabify

  • SETToolkit

  • Google Dorking – vulnerable websites confidential documents

  • osintframework.com

  • Reverse Image Search

  • Email OSINT

  • Spiderfoot

  • Tor Browser

  • Darkweb Search Engine

  • Exploring career paths in ethical hacking (penetration tester, security analyst)

  • Industry certifications for ethical hackers (CEH, OSCP, etc.)

  • Building a career in cybersecurity

Required Tools

Accelerator

Immersive practical training courses designed to take you form beginner level and help you navigate the journey to becoming a pro in your industry.

  • 8 weeks training
  • Live online
  • Milestone projects
  • Portfolio building

Nest

Immersive practical training courses designed to take you form beginner level and help you navigate the journey to becoming a pro in your industry.

  • 6 weeks training
  • 8 weeks internship placement
  • Portfolio building
  • CV review & LinkedIn optimization
  • Mock interviews
Cybersecurity

What you will learn:

  • Understanding the significance of cybersecurity
  • Types of cyber threat
  • Network basics
  • Installations and setup of all tools required in course of study.
  • Networking protocols (TCP/IP, DNS, HTTP/HTTPS)
  • IP Addressing and Subnetting

  • Open Source Intelligence (OSINT)
  • Passive Information Gathering

  • Active Information Gathering

  • DNS Enumeration

  • WHOIS Data Collection

  • Port Scanning Techniques

  • Service Enumeration

  • Vulnerability Scanning

  • Banner Grabbing

  • SNMP Enumeration

  • Privilege Escalation

  • Backdoors and Logic Bombs

  • Rootkits and Trojans

  • Post-Exploitation Activities

  • Web Server Enumeration

  • Web Application Vulnerabilities

  • Cross-Site Scripting (XSS)

  • Cross-Site Request Forgery (CSRF)
  • SQL Injection Basics

  • Firewall Evasion Methods

  • Honeypots and Honeynets

  • Packet Fragmentation

  • Protocol Tunneling

  • Spoofing and Masquerading

  • Encrypted Attacks

  • Symmetric Key Cryptography

  • Asymmetric Key Cryptography

  • Public Key Infrastructure (PKI)

  • Secure Key Exchange

  • Applications of Cryptography

  • Wireless Network Basics

  • Wi-Fi Security Protocols (WEP, WPA, WPA2, WPA3)

  • Wireless Network Authentication Methods

  • Wireless Access Point (AP) Security

  • Rogue Access Point Detection

  • Cyber Security Overview
  • Introduction to Ethical Hacking
  • Type of Hackers
  • Stage Of Hacking
  • Penetration Testing
  • Type of Penetration Testing
  • Stage of Penetration Testing
  • OS & Cybersecurity
  • Os Installation
  • Web Reconnaissance
  • Net Reconnaissance
  • Network Vulnerability Scanning

  • Web Vulnerability Scanning

  • Introduction to Website Database Hacking

  • Final Web Live Hacking demo 3

  • Changing of Mac – macchanger -s [interface]

  • Wireless Deauthentication Attack

  • Hacking wireless networks with Air tools (Aircrack-ng)

  • Hacking wireless networks using Wifite and Fern wifi cracker

  • Email Harvesting

  • Phishing using SET Toolkit

  • IP Logging

  • Grabify

  • SETToolkit

  • Google Dorking – vulnerable websites confidential documents

  • osintframework.com

  • Reverse Image Search

  • Email OSINT

  • Spiderfoot

  • Tor Browser

  • Darkweb Search Engine

  • Exploring career paths in ethical hacking (penetration tester, security analyst)

  • Industry certifications for ethical hackers (CEH, OSCP, etc.)

  • Building a career in cybersecurity

Required Tools

Accelerator

Immersive practical training courses designed to take you form beginner level and help you navigate the journey to becoming a pro in your industry.

  • 6 weeks training
  • In-person or online
  • Milestone projects
  • Portfolio building

Nest

Immersive practical training courses designed to take you form beginner level and help you navigate the journey to becoming a pro in your industry.

  • 6 weeks training
  • 8 weeks internship placement
  • Portfolio building
  • CV review & LinkedIn optimization
  • Mock interviews

Upcoming Course Start Date

Location Start Date Path Schedule Length Tuition Fee Status
Live Online June 17, 2024 Accelerator Weekdays or Weekends 16 Weeks £350 Open

Upcoming Course Start Date

Location Start Date Path Tuition Fee Schedule Status
Live Online June 17, 2024 Accelerator
16 Weeks
£350 Weekdays or Weekends Open

Where Torilo grads. get hired

Ready to start your Tech, Design,
Digital or Data journey?

Take the next step and speak to our admissions team. Book a 15-minute chat to ask questions and learn more about our programs.

Where Torilo grads. get hired

Ready to start your Tech, Design, Digital or Data journey?

Take the next step and speak to our admissions team. Book a 15-minute chat to ask questions and learn
more about our programs.

Torilo Academy | Training Centre In Lagos, Nigeria

4.8Out of 5 stars

Overall rating out of 111 Google reviews

Femi Fatunla
a month ago

Torilo Academy has been a great experience. Their practical approach to learning is excellent. The Tutors ensure all students are carried along.

Badmus Miftau
a month ago

This is the best Tech center so far

akinlembola ade
a month ago

the experience has actually been electric

oluwole tobiloba
a month ago

Michael Ezeh
a month ago

Learning at Torilo Academy has been great so far. Super nice tutors.