Certified Cyber Security Specialist

About the Programme

Overview

This Cybersecurity training is useful and relevant in many career fields,  training in cyber security is particularly critical for network security and information technology degree programs. This Courses train students to be able to prevent access from, recognize and track down hackers.

Fundamentals of Cyber Security

This cyber security course introduces students to the basics of the field. Students study monitoring and protection procedures pertaining to security activities and learn to apply them practically. The hands-on practice involves protecting work with passwords and applying multiple security models and systems. This course also dives into the very beginnings of cryptography. Usually, this class is available through both undergraduate and graduate degree programs.

Computer Security Management

Students in this course learn to protect information pertaining to businesses. They analyze case studies and policies to determine methods for planning security projects, protecting assets and creating response plans. Students also learn to back up computers and manage security programs in this intermediate-level course, which is designed for undergraduate and graduate programs.

Establishing and Managing Information Assurance

Students study and analyze risk-management strategies. These courses cover the risks associated with computer security and options for reducing and negating them and include an overview of procedures for establishing information security and ways to enforce existing policies. Upon completion of this course, students should be able to analyze computer networks to find systemic problems and develop ways to fix them.

Forensics of Cyber Security

Through this course, students learn to track computer security violations. Topics of study include methods for recognizing network signatures and tracking them back to their origins. Students examine different tracing methods and identify techniques for their practical use. Though this course does have lecture aspects, it is primarily a hands-on course.

Hacker Techniques

Students taking this advanced cyber security class assume the role of the hacker as they identify weaknesses in computer security setups and find ways to break in. This role reversal trains students to recognize security problems and develop ways to strengthen systems. The course includes an overview of how hackers enter through holes and weaken overall systems, accompanied by step-by-step processes for responding to such breaches. Students also learn to handle the evidence hackers leave behind in order to catch and prosecute them.

Investigation and Response: Systems Forensics

This is an advanced course that trains students to protect computer systems from the realities of information security problems; hackers can break in and compromise a program in three days or less. Students study multiple computer operating systems and ways to investigate security issues by replicating attacks. They study successful measures for responding to and stopping these problems. This cyber security course uses a hands-on approach with both Windows and Linux systems.

Why Choose Us

Our Glorious Achievements

ISBAT University has been awarded charter status by Uganda National Council for Higher Education and now has carved a niche for itself among the best universities in Uganda. We believe in a diverse range of personnel to bring creative skills,
thoughts, and ideas to the table.

Apply Now