Tembo Sacco Plaza, Garden Estate Rd, Nairobi, Kenya
Mon - Sat: 09:00 AM - 05:00 PM

Cybersecurity Fundamentals for IT Professionals Training Course

INTRODUCTION

This essential training course provides comprehensive knowledge and practical skills for establishing a strong foundation in Cybersecurity Fundamentals for IT Professionals. In today's interconnected world, IT professionals are on the front lines of defense against an ever-evolving landscape of cyber threats. This program equips participants with a systematic understanding of core cybersecurity domains, including network security, endpoint protection, identity management, data protection, and incident response. Participants will gain deep insights into identifying common vulnerabilities, implementing robust security controls, monitoring for suspicious activities, and responding effectively to security incidents, all crucial for protecting organizational assets and ensuring business continuity in a hostile digital environment.

This course is designed for aspiring and current IT professionals, including network administrators, system administrators, help desk technicians, and IT support staff, who need to integrate security best practices into their daily operations. It bridges the gap between general IT knowledge and specialized cybersecurity demands, empowering participants to build secure systems, troubleshoot security issues, and contribute significantly to an organization's overall cybersecurity posture.

DURATION

10 days

TARGET AUDIENCE

This course is specifically designed for IT professionals seeking to build or enhance their foundational cybersecurity knowledge and skills, including:

  • Network Administrators.
  • System Administrators.
  • Help Desk and IT Support Technicians.
  • Junior Cybersecurity Analysts.
  • IT Managers seeking a technical security overview.

OBJECTIVES

Upon completion of this course, participants will be able to:

  • Understand the core principles and concepts of cybersecurity.
  • Implement foundational network and host security controls.
  • Manage identities and access securely.
  • Apply techniques for data protection and encryption.
  • Recognize and respond to common cyber threats and incidents.

MODULES

Module 1: Introduction to Cybersecurity and Risk Management

  • Define Cybersecurity and its importance in the IT landscape.
  • Understand the CIA Triad: Confidentiality, Integrity, and Availability in depth.
  • Discuss common threats, vulnerabilities, and attacks (e.g., malware, phishing, DDoS).
  • Explore the concepts of risk, risk assessment, and risk mitigation.
  • Examine the legal, ethical, and compliance aspects of cybersecurity.

Module 2: Network Security Principles and Technologies

  • Understand fundamental network security architecture (e.g., firewalls, IDS/IPS, DMZ).
  • Discuss the configuration and management of firewalls (packet filtering, stateful inspection, application-layer).
  • Explore secure network segmentation and VLANs.
  • Examine VPN technologies (IPsec, SSL/TLS) for secure remote access.
  • Learn about common network protocols and their security implications (TCP/IP, DNS, HTTP/S).

Module 3: Endpoint Security and Malware Protection

  • Understand strategies for securing endpoints (workstations, servers, mobile devices).
  • Discuss antivirus/anti-malware solutions and their effectiveness.
  • Explore methods for patch management and vulnerability scanning.
  • Examine the importance of host-based firewalls and intrusion prevention.
  • Learn about advanced persistent threats (APTs) and fileless malware.

Module 4: Identity and Access Management (IAM)

  • Define Identity and Access Management (IAM) and its components (authentication, authorization, accounting).
  • Understand various authentication methods (passwords, MFA, biometrics, certificates).
  • Discuss the implementation of Single Sign-On (SSO) and Federated Identity.
  • Explore role-based access control (RBAC) and principles of least privilege.
  • Examine directory services (e.g., Active Directory, LDAP) and their security.

Module 5: Data Security and Encryption

  • Understand data classification and its role in data protection.
  • Discuss encryption methods (symmetric, asymmetric, hashing) and their applications.
  • Explore strategies for securing data at rest, in transit, and in use.
  • Examine data loss prevention (DLP) technologies and strategies.
  • Learn about secure data backup, recovery, and disposal.

Module 6: Security Operations and Monitoring

  • Understand the importance of security logging and auditing.
  • Discuss the role of Security Information and Event Management (SIEM) systems.
  • Explore vulnerability management and penetration testing basics.
  • Examine common monitoring tools and techniques for suspicious activity.
  • Learn about security baselines and configuration management.

Module 7: Incident Response and Business Continuity

  • Understand the phases of the incident response lifecycle (preparation, identification, containment, eradication, recovery, lessons learned).
  • Discuss the importance of an incident response plan (IRP).
  • Explore strategies for business continuity planning (BCP) and disaster recovery (DR).
  • Examine forensic readiness and evidence collection.
  • Learn about communication during a security incident.

Module 8: Cloud Security and Emerging Technologies

  • Understand the unique security challenges and models in cloud computing (IaaS, PaaS, SaaS).
  • Discuss the shared responsibility model in cloud security.
  • Explore the basics of container security and serverless computing security.
  • Examine the security implications of Internet of Things (IoT) devices.
  • Learn about the principles of DevSecOps and integrating security into development.

CERTIFICATION

  • Upon successful completion of this training, participants will be issued with Macskills Training and Development Institute Certificate

TRAINING VENUE

  • Training will be held at Macskills Training Centre. We also tailor make the training upon request at different locations across the world.

AIRPORT PICK UP AND ACCOMMODATION

  • Airport pick up and accommodation is arranged upon request

TERMS OF PAYMENT

  • Payment should be made to Macskills Development Institute bank account before the start of the training and receipts sent to info@macskillsdevelopment.com

 

Cybersecurity Fundamentals For It Professionals Training Course
Dates Fees Location Action
16/06/2025 - 27/06/2025 $2,450 Nairobi
07/07/2025 - 18/07/2025 $4,950 Johannesburg
14/07/2025 - 25/07/2025 $2,450 Nairobi
04/08/2025 - 15/08/2025 $3,950 Kigali
11/08/2025 - 22/08/2025 $5,950 Nairobi
11/08/2025 - 22/08/2025 $3,950 Kigali
18/08/2025 - 29/08/2025 $2,450 Nairobi
01/09/2025 - 12/09/2025 $3,950 Kigali
08/09/2025 - 19/09/2025 $2,950 Mombasa
15/09/2025 - 26/09/2025 $2,450 Nairobi
06/10/2025 - 17/10/2025 $3,950 Kigali
13/10/2025 - 24/10/2025 $2,950 Mombasa
20/10/2025 - 31/10/2025 $2,450 Nairobi
03/11/2025 - 14/11/2025 $3,950 Kigali
10/11/2025 - 21/11/2025 $5,950 Dubai
17/11/2025 - 28/11/2025 $2,450 Nairobi
01/12/2025 - 12/12/2025 $2,450 Nairobi