Breaking News

Starting on the 27th of September, The Cyber Security Laboratory, in conjunction with ACE, will launch an introductory course in Cyber Security at Abidjan, Cote D'Ivoire. The full course schedule is here.



INTRODUCTION TO CYBER SECURITY

As individuals, organizations and nations increasingly depend on IT infrastructure to make decisions; confidentiality, availability and integrity of data become more crucial. Globally, digital assets are continuously under attack. The ease of attacks make it imperative for individuals and organizations to continually update their knowledge on sources of attack, proactive and preventive mechanisms against such attacks and what to do, in a likely case of a successful attack.

The rapid improvement in Africa digital connectivity, outstripping the 1 million route-kilometre benchmark in 2015 for fibre and International bandwidth hovering around 8Tbps, has made Africa an hub of attraction. Africa digital asset is on increase and of interest to businesses around the globe as much as to cyber criminals. Thus, there is urgent imperative to build capabilities within the continent to safeguard these digital assets.

To address these issues, the Africa Centre of Excellence in Software Engineering (ACE), Obafemi Awolowo University, Ile-Ife, Nigeria as part of its mandate as a software hub in the West Africa sub-region announces a 5-day hands-on, activity-based cyber security workshop between Monday, August 28th and Friday, September 1st, 2017.

Participants will learn about common cyber attacks and the techniques for identifying, detecting, and defending against cybersecurity threats. They will also gain a basic understanding of personal, physical, network, web, and wireless security, as well as a foundation for more advanced study of cybersecurity. The course will also expose participants to the importance of being safe online, the potential consequences of cyberattacks, remediation options and emerging research areas in cybersecurity.

While this training draw copiously from Cisco Inc and IBM approach to Cyber Security, effort has been made to make delivery as neutral as possible.



The Instructors are drawn from both the industry and academic with rich background in cyber security.

Certificate of participation will be awarded at the end of the training.



Signed, Organizers.




Day 8:00-9:00 9:00-10:15 10:15-10:45 10:45-11:15 11:15-12:15 12:15-1:15 pm 1:15-2:15 pm 2:15-4:00 pm 4:00-4:30pm 4:30-7:00pm
Sunday 27th LAB SETUP BY HOST INSTITUTION
Monday 28th ARRIVAL & REGISTRATION TEA BREAK ARRIVAL & REGISTRATION Introduction, House Rules and Expectations Understanding Computer Networks (Trends , Components and Terminologies) Internet Addressing Structure TEA BREAK Cyber Security Fundamentals
(Trends , threat and Terminologies)
Tuesday 29th RECAP Data as an Asset: Introduction to Organisational data (Lab 1.1: Compare that with Hash Lab 1.2: What was taken) Cyber Attacks, Concepts and Techniques & Analysing Cyber Attack I Analysing Cyber Atack II The Cyber Security Landscape LUNCH Group Activity I (Network Setup) Group Activity II (Hacking Tools I)
Wednesday 30th Protecting Your Data and Privacy Security in Layers (Practices to protect and mitigate attacks) Email and Web Browser Privacy Lab 3.1 Online Risky Behaviour Group Activity III (Hacking Tools II) Group Activity III (Hacking Tools II)
Thursday 31st Security in Networked Environment Cyber Warfare and Prevention - Initiatives in West Africa (Class to discuss) Intrusion Detection and Prevention National Vulnerability Database Group Activity IV (Vulnerability Assessment) Group Activity IV (Vulnerability Assessment)
Friday 1st Legal and Ethical Issues in Cyber Security Technical Discussion, Career & Research Directions in Cyber Security Technical Discussion, Career & Research Directions in Cyber Security CLOSING & AWARD OF CERTIFICATES TEA & DEPARTURE





© Cyber Security Lab. All rights reserved | Design by Michael