| Day | 8:00-9:00 | 9:00-10:15 | 10:15-10:45 | 10:45-11:15 | 11:15-12:15 | 12:15-1:15 pm | 1:15-2:15 pm | 2:15-4:00 pm | 4:00-4:30pm | 4:30-7:00pm |
|---|---|---|---|---|---|---|---|---|---|---|
| Sunday 27th | LAB SETUP BY HOST INSTITUTION | |||||||||
| Monday 28th | ARRIVAL & REGISTRATION | TEA BREAK | ARRIVAL & REGISTRATION | Introduction, House Rules and Expectations | Understanding Computer Networks (Trends , Components and Terminologies) Internet Addressing Structure | TEA BREAK | Cyber Security Fundamentals (Trends , threat and Terminologies) |
|||
| Tuesday 29th | RECAP | Data as an Asset: Introduction to Organisational data (Lab 1.1: Compare that with Hash Lab 1.2: What was taken) | Cyber Attacks, Concepts and Techniques & Analysing Cyber Attack I | Analysing Cyber Atack II | The Cyber Security Landscape | LUNCH | Group Activity I (Network Setup) | Group Activity II (Hacking Tools I) | ||
| Wednesday 30th | Protecting Your Data and Privacy | Security in Layers (Practices to protect and mitigate attacks) | Email and Web Browser Privacy | Lab 3.1 Online Risky Behaviour | Group Activity III (Hacking Tools II) | Group Activity III (Hacking Tools II) | ||||
| Thursday 31st | Security in Networked Environment | Cyber Warfare and Prevention - Initiatives in West Africa (Class to discuss) | Intrusion Detection and Prevention | National Vulnerability Database | Group Activity IV (Vulnerability Assessment) | Group Activity IV (Vulnerability Assessment) | ||||
| Friday 1st | Legal and Ethical Issues in Cyber Security | Technical Discussion, Career & Research Directions in Cyber Security | Technical Discussion, Career & Research Directions in Cyber Security | CLOSING & AWARD OF CERTIFICATES | TEA & DEPARTURE | |||||