Day 8:00-9:00 9:00-10:15 10:15-10:45 10:45-11:15 11:15-12:15 12:15-1:15 pm 1:15-2:15 pm 2:15-4:00 pm 4:00-4:30pm 4:30-7:00pm
Sunday 27th LAB SETUP BY HOST INSTITUTION
Monday 28th ARRIVAL & REGISTRATION TEA BREAK ARRIVAL & REGISTRATION Introduction, House Rules and Expectations Understanding Computer Networks (Trends , Components and Terminologies) Internet Addressing Structure TEA BREAK Cyber Security Fundamentals
(Trends , threat and Terminologies)
Tuesday 29th RECAP Data as an Asset: Introduction to Organisational data (Lab 1.1: Compare that with Hash Lab 1.2: What was taken) Cyber Attacks, Concepts and Techniques & Analysing Cyber Attack I Analysing Cyber Atack II The Cyber Security Landscape LUNCH Group Activity I (Network Setup) Group Activity II (Hacking Tools I)
Wednesday 30th Protecting Your Data and Privacy Security in Layers (Practices to protect and mitigate attacks) Email and Web Browser Privacy Lab 3.1 Online Risky Behaviour Group Activity III (Hacking Tools II) Group Activity III (Hacking Tools II)
Thursday 31st Security in Networked Environment Cyber Warfare and Prevention - Initiatives in West Africa (Class to discuss) Intrusion Detection and Prevention National Vulnerability Database Group Activity IV (Vulnerability Assessment) Group Activity IV (Vulnerability Assessment)
Friday 1st Legal and Ethical Issues in Cyber Security Technical Discussion, Career & Research Directions in Cyber Security Technical Discussion, Career & Research Directions in Cyber Security CLOSING & AWARD OF CERTIFICATES TEA & DEPARTURE