Become a Certified Cybersecurity Analyst

Level 1 (Associate)

Learn and develop processes and tools to protect systems, networks, and programs from digital malicious attacks.

Next Start date

15th May, 2025

Extended registrations ends April 27th

Duration

8 weeks

Schedule

Twice Weekdays 10am - 2pm
or Saturdays 10am - 5pm

Format

Physical or Online

Next Start date

15th May, 2025

Extended registrations ends April 27th

Duration

8 weeks

Format

Physical or Online

Schedule

Twice Weekdays 10am - 2pm
or Saturdays 10am - 5pm

What you will learn

  • Understanding the significance of cybersecurity
  • Types of cyber threat
  • Network basics
  • Installations and setup of all tools required in course of study.
  • Networking protocols (TCP/IP, DNS, HTTP/HTTPS)
  • IP Addressing and Subnetting

  • Open Source Intelligence (OSINT)
  • Passive Information Gathering

  • Active Information Gathering

  • DNS Enumeration

  • WHOIS Data Collection

  • Port Scanning Techniques

  • Service Enumeration

  • Vulnerability Scanning

  • Banner Grabbing

  • SNMP Enumeration

  • Privilege Escalation

  • Backdoors and Logic Bombs

  • Rootkits and Trojans

  • Post-Exploitation Activities

  • Web Server Enumeration

  • Web Application Vulnerabilities

  • Cross-Site Scripting (XSS)

  • Cross-Site Request Forgery (CSRF)
  • SQL Injection Basics

  • Firewall Evasion Methods

  • Honeypots and Honeynets

  • Packet Fragmentation

  • Protocol Tunneling

  • Spoofing and Masquerading

  • Encrypted Attacks

  • Symmetric Key Cryptography

  • Asymmetric Key Cryptography

  • Public Key Infrastructure (PKI)

  • Secure Key Exchange

  • Applications of Cryptography

  • Wireless Network Basics

  • Wi-Fi Security Protocols (WEP, WPA, WPA2, WPA3)

  • Wireless Network Authentication Methods

  • Wireless Access Point (AP) Security

  • Rogue Access Point Detection

  • Throughout this course, you will be introduced to Artificial Intelligence (AI) concepts and tools that can enhance your productivity and workflow. You will learn how to leverage AI to automate tasks, gain insights, and improve overall efficiency.
  • Your instructor will guide you through the exploration of various AI tools and technologies, tailored to the specific needs and goals of the course. This hands-on experience will enable you to develop practical skills and apply AI solutions to real-world problems.
  •  

System Requirements

Please note: Students should have a laptop with the following minimum specifications:

  • Windows System
  • External Hard Drive
  • Free Internal Storage of 256GB – 500GB
  • 8 – 16GB RAM
    .

What is Cybersecurity?

Cybersecurity: Protecting the Digital World
While software developers build things, cybersecurity experts protect them. They’re like the security guards of the digital world, defending against cyberattacks like hackers.

Imagine your online bank account. Cybersecurity professionals work hard to protect your money and personal information from being stolen. They identify vulnerabilities in systems, develop security measures, and respond to cyberattacks when they happen.

Key skills:

  • Problem-solving: Identifying and fixing security weaknesses.
  • Technical knowledge: Understanding how systems and networks work.
  • Analytical thinking: Identifying patterns and threats.
  • Communication: Explaining complex security issues to others.

Kickstart your
career with our NEST Program

Internship Placement

Gain valuable industry experience through an internship secured through our network of 100+ partner companies.

Interview Prep

Develop your interview skills with our comprehensive guide and preparation support & mock interviews

1-1 Mentorship

Everyone’s career transformation journey is different, so you’ll have 1-on-1 session from a dedicated career coach

LinkedIn profile

Make a strong first impression on potential employers with help of our team. This includes a professional headshot for your LinkedIn profile

Portfolio

Showcase your newfound skills and impress recruiters with a professional portfolio we help you create

Craft A Winning CV

If your intention is to get a job, you get expert guidance on building and optimising a compelling CV to land interviews.

Next Cybersecurity Course

15th May, 2025

Our education advisors can talk you through the payment options available to you. Start your career in product design today.

Cybersecurity Associate

Level 1

N280,000

N250,000

Extended registrations ends April 27th

Cybersecurity Mastery

Associate + Ethical Hacking + Comptia Security+ certification prep 

N480,000

N430,000

Extended registrations ends April 27th

Flexible payment plans available. Our team can help answer any of your questions about the course. Get in touch.

Tola Adegbite

Cybersecurity, Luminous

“I have a new job as a cybersecurity! I am deeply grateful for all the time and energy from the Torilo Academy team who helped me with my interview preparation.”

“I have a new job as a Cybersecurity! I am deeply grateful for all the time and energy from the Torilo Academy team who helped me with my interview preparation .”

Tola Adegbite

Cybersecurity, Luminous

Become a Certified Cybersecurity Professional

Become a Certified Cybersecurity Professional

Earn an employer-recognized certificate and get a professional portfolio that will help you get hired.

10k+

grads have chosen Torilo Academy to launch new careers or upskill to greater heights

2012

since TA has been dedicated to transforming the careers and lives of our students

85%

of graduates report positive career outcome and secure jobs within few months of graduation

Join our growing community of 7,500+ alumni

You're in good company. Our Alumni practice Cybersecurity with the world's leading organisations.

You're in good company. Our Alumni work with leading organisations.

You're in good company. Our Alumni work with leading organisations.

Alumni Stories

Play Video

I’m proud to be a graduate of Torilo Academy. The hands-on training and expert guidance here transformed my career path.

Watch Story
Watch Story
Play Video

“I learned something I thought was not possible and it has boosted my confidence’”

Watch Story
Watch Story
Play Video

“The learning rate is excellent, and I never would have imagined that I could do this.”

 

Watch Story
Watch Story

Upcoming Course Start Date

Start Date Path Schedule Length Tuition Fee Status
15th May, 2025 Accelerator Weekdays or Weekends 8 Weeks N280,000 Open

Upcoming Course Start Date

Start Date Path Tuition Fee Schedule Status
15th May, 2025 Accelerator
8 Weeks
N280,000 Weekdays or Weekends Open

FAQs

Absolutely! Network security is a cornerstone of our curriculum. We cover network architecture, firewall configuration, intrusion detection/prevention systems, VPN implementation, secure network design principles, and common network attack vectors. Hands-on labs include configuring secure networks and identifying/remediating vulnerabilities.

Basic programming familiarity is helpful but not required. We provide introductory modules on Python and bash scripting specifically for security applications. 

Yes, our curriculum aligns with the knowledge domains for several security certifications including CompTIA Security+. 

Yes, we cover social engineering attack vectors including phishing, pretexting, baiting, and tailgating. You'll learn to  conduct phishing simulations, measure effectiveness of awareness initiatives, and create policies that address the human element of security.

Torilo Academy distinguishes itself through our lab-intensive approach with our course time dedicated to hands-on practice in our custom-built cyber range. Our instructors are practicing security professionals who bring real-world experience and current threats directly into the classroom. 

Learn high-quality skills from home with our online courses. Watch recorded lessons whenever you want, join live sessions with teachers, and use tools to work with other students on projects. Our courses are designed so everyone can take part, including people with disabilities.

To enroll, click the apply button an complete the application form with your personal details. Upon completion, a personnel will contact you on how to proceed.