
Introducing
CYBER SECURITY
Learners who complete this Cyber Security will be able to: identify and describe the various threats to the security, analyse models and practices for managing security; develop, evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice.
Cyber Security
Course Details
Background
The Cyber Security course is intended for persons who wish to broaden and deepen their understanding of cyber security. The course provides a unique opportunity to develop leading-edge in-depth knowledge in the area of security technologies and practices. This course is especially designed to tackle the cyber security challenges not only in the Zambian ICT industry but Africa as a whole, and the world at large. The course is rooted in the belief that theory and research must translate into real-world solutions and an accessible path to career advancement.
Rationale
The Cyber Security course provides the basis of cyber security and introduces students to dozens of proven security theories and techniques whilst emphasising on the practical applicability thereof. The modules offered herein are there to equip learners with skills that will be very valuable in solving security challenges currently being faced in the industry. Learners who complete this Cyber Security will be able to: identify and describe the various threats to the security, analyse models and practices for managing security; develop, evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice.
The course progresses from introductory work in cyber security to culminating real-life practical labs which will aid students in solving real-world cyber security problems.
Code
CYB111Fees
K3,500 Per PersonPayment Plan Available with Initial Deposit of K2000 to Enroll in the Course.
Location / Learning Mode
OnlineContact
Coordinator: Dr A Zimba
Email: azimba@mu.ac.zm
Dates
Intakes
Intake |
Start Date |
End Date |
Time |
Group 1 |
31st January 2022 |
11th February 2022 |
18 – 20 |
Group 2 |
14th February 2022 |
25th February 2022 |
18 – 20 |
Group 3 |
28th February 2022 |
11th March 2022 |
18 – 20 |
Group 4 |
14th March 2022 |
25th March 2022 |
18 – 20 |
Group 5 |
28th March 2022 |
8th April 2022 |
18 – 20 |
Group 6 |
11th April 2022 |
22nd April 2022 |
18 – 20 |
|
|
||
Group 6 to 10 |
Full Schedule To be Announced in April |
Aim
To produce cyber security personnel who have the necessary skills and professional expertise to meet the ever-growing needs of Zambia and the SADC region. This will enable the successful participants to plan, design, and implement security technologies using a wide spectrum of security tools.
Objectives
At the end of the program Learners should be able to:
- Identify and describe the various threats to the security of digital information and information systems
- Analyse models and practices for managing security of digital information and information systems
- Utilise security-based digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique and disseminate both technical and professional information
- Evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice.
- Undertake risk assessment regarding the security of digital information and information systems and develop strategies for controlling risk
- Design, develop and implement cyber security solutions and software, and associated policies and procedures for optimal use to withstand emerging attacks/threats in cyber space.
- Integrate ethical principles into personal practice
Competencies
- Cyber security policy formulation
- Operating systems security implementation
- Knowledge of effective cyber security design principles
- Information and network security implementation
- Good cyber security analysis techniques
- Adherence to cyber security ethics and standards
Entry requirements
You will need a working computer that is able to support virtualization, either VMware or Virtual Box.
Expected prior knowledge
Must have competency in computer networking and operating systems.
COURSE DELIVERY.
Intensive 2 weeks of didactic lectures, hands-on practical and tutorials sessions
QUALIFICATION
Upon successful completion, the candidates will be awarded a certificate in Cyber Security and a grade appended to the certificate. This qualification will only apply to a student who passes the final exam and completes the assignment or quizzes.
Course Content
- Security Fundamentals
- Encryption Essentials
- Operating Systems Security
- Software Security
- Ethical Hacking
- Digital Forensics
- Securing Network and Information Systems
- Security Polices and Models
Course Coordinator
PhD. Cybersecurity
M.Sc. Engineering & Technology
Lesson Schedule
Day |
Lesson/activity |
Day 1 |
Security Fundamentals |
Day 2 |
Encryption Essentials |
Day 3 |
Operating Systems Security |
Day 4 |
Software Security Quiz 1 |
Day 5 |
Labs and Practicals on System Security |
Day 6 |
Ethical Hacking |
Day 7 |
Digital Forensics |
Day 8 |
Securing Network and Information Systems Quiz 2 |
Day 9 |
Security Polices and Models |
Day 10 |
Labs & Practicals on network Security Assignments due and Final Quiz |
Note |
Final Security Project due 7 days after completion (day 10) |
Teaching Methods
- Lecture using virtual classrooms
- Practical hands-on online tutorials using virtual machines
- Assessments using ICT technologies
- Zoom and Moodle BigBlueButton interactive software
Timing and schedules
Tentatively from 18 hours to 20 hours
Assessment Method
- Assignment 30%
- Quizzes 10%
- Security project 60%
Certifications
Mulungushi University certificate will be provided