Overview
Click to Apply
Cybersecurity course provides students with foundational to advanced knowledge and skills in the field of cybersecurity. The course covers essential concepts, principles, and practices related to protecting information systems, networks, and data from cyber threats. Students will explore various cybersecurity domains, including network security, cryptography, risk management, and ethical hacking. Through a combination of 10% theoretical lectures, 80% hands-on exercises, and 10% real-world case studies, students will develop a solid understanding of cybersecurity fundamentals and prepare for further studies or careers in the field.
uniYAT Practical Institute (UPI) stands out as the sole institution in Ghana offering 85% practical hands-on training, enabling students to acquire a top-notch skillset.
Click to Apply
Other job titles used to refer to this kind of work include:
What You Can Do
Upon completing a program in Cyber Security, you will acquire the knowledge and skills required for roles such as:
- Information Security Officer (CISO): Responsible for overseeing and managing the overall security posture of an organization.
- Security Analyst: Analyzes security data and monitors networks for security breaches or intrusions.
- Penetration Tester (or Ethical Hacker): Conducts authorized simulated cyberattacks to evaluate the security of systems and networks.
- Security Engineer: Designs and implements security systems and measures to protect an organization’s infrastructure.
- Incident Responder: Investigates and responds to security incidents, including breaches and cyberattacks.
- Security Architect: Designs and builds secure IT systems and networks, considering security requirements and best practices.
- Security Consultant: Provides expert advice and guidance on cybersecurity matters to organizations, often in a consulting capacity.
- Security Administrator: Manages and maintains security systems, including firewalls, intrusion detection/prevention systems, and access controls.
- Cryptographer: Designs and implements cryptographic algorithms and protocols to secure data and communications.
- Forensic Analyst: Investigates cybercrimes and gathers digital evidence for legal proceedings.
- Threat Intelligence Analyst: Monitors and analyzes cyber threats and trends to proactively defend against potential attacks.
- Compliance Officer: Ensures that an organization complies with relevant cybersecurity regulations and standards.
- Security Operations Center (SOC) Analyst: Monitors security events and alerts in real-time and investigates potential security incidents.
- Cybersecurity Trainer/Instructor: Educates employees or students on cybersecurity best practices, policies, and procedures.
- Vulnerability Assessor: Identifies and assesses vulnerabilities in systems and networks to help mitigate potential risks.
What You Will Earn
A competitive yearly starting salary ranging from GHS38,000 to GHS68,000 per annum
Taught programs under Cyber Security Engineering
- Introduction to Cybersecurity
- Cyber Threats and Attack Vectors
- Principles of Information Security
- Network Security Fundamentals
- Cryptography and Secure Communication
- Risk Management in Cybersecurity
- Ethical Hacking and Penetration Testing
- Incident Response and Disaster Recovery
- Cybersecurity Tools and Techniques
- Emerging Trends in Cybersecurity
Core Curriculum Competencies
The Core Curriculum Competencies listed below identify what you, as a student, will be able to do upon completion of your programme, regardless of your level. You will acquire these core competencies through your general education courses (i.e. English, math, etc.) and your program of study courses.
- Communicate clearly and effectively both orally and in writing.
- Demonstrate effective problem-solving and reasoning skills.
- Work effectively in groups of people from diverse backgrounds.
- Demonstrate ethical and professional understanding and conduct.
- Apply appropriate information literacy skills to locate, evaluate, and use information effectively.
- Use computers or related technology for practical and/or professional applications.
- Apply scientific inquiry and mathematical reasoning to practical problems.
INTERNSHIPS
For current programs, internships provide a path to translate classroom-based instruction to real-world scenarios, get a sense of the industry and make connections for future employment endeavours. We enforce and require every student to participate in at least one month of field experience in their chosen career field.
DURATION
The Cyber Security Engineering course spans approximately one year. This year is divided into three levels, with each level lasting for 4 months. Therefore, the course consists of three levels in total.
Class Sessions
Sessions | Weekdays, 8 credit hours (Monday to Thursday) 2hrs daily |
Weekends, 8 credit hours (Saturdays and Sundays) 4hrs daily |
Morning Session 1 | 8.30 am to 11 am | 9 am to 1 pm |
Morning Session 2 | 11 am to 1 pm | Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â —— |
Afternoon Session | 1 pm to 3 pm | 2 pm to 6 pm |
Evening Session | 5:30 pm to 7:30 pm | Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â —— |
Fees
- Registration form: GHS 100 (one-time payment)
- Admission fee: GHS 395 (one-time payment)
- Tuition fee: GHS 2655 (paid per level or semester)
Foreign students
Registration form: Free
Admission fee USD 50 (one-time payment)
Tuition fee: USD 350 (paid per level or semester)
The quoted fees above represent the cost per level or semester of the program.
Click to Apply
Hostel
- Yes! Hostel facility available
- Hostel fees are paid separately
- Obey all hostel rules and regulations
Course Materials
All course materials will be provided during the lessons and through online links. However, other required materials need to be purchased before taking the class. To fully benefit from this course, access to a personal laptop is also necessary.
General Admission Requirement
- Must demonstrate talent and potential
- Must be focused and willing to enact change
- Must have a passion for computers
- Willingness to work long hours in an office setting
- No prior computer knowledge is required (Training will be provided
Course Requirement
Level1: Networking Foundations
- Introduction to Networking
- Basic networking concepts, protocols, and models.
- Overview of OSI and TCP/IP models.
- Computer Networks
- Local Area Networks (LANs) and Wide Area Networks (WANs).
- Network topologies and technologies.
- Network Security Fundamentals
- Basics of cryptography and secure communication.
- Network vulnerabilities and threats.
- Operating Systems and Network Integration
- Understanding OS networking components.
- Network configuration and integration with OS.
- Routing and Switching
- Router and switch configurations.
- Routing protocols and VLANs.
Level 2: Cyber Security Principles
- Cybersecurity Fundamentals
- Security policies, risk management, and compliance.
- Incident response and disaster recovery.
- Firewalls and Intrusion Detection Systems
- Design and implementation of firewalls.
- Intrusion detection and prevention systems.
- Ethical Hacking and Penetration Testing
- Introduction to ethical hacking.
- Penetration testing methodologies.
- Secure Software Development
- Integrating security into the software development lifecycle.
- Common software vulnerabilities and secure coding practices.
- Wireless and Mobile Security
- Securing wireless networks.
- Mobile device security and challenges.
Level 3: Advanced Networking and Capstone Project
- Advanced Routing and Switching
- Advanced routing protocols (e.g., OSPF, BGP).
- Layer 3 switching and network optimization.
- Virtualization and Cloud Security
- Virtual network configurations.
- Security considerations in cloud environments.
- Network Forensics
- Digital forensics principles and techniques.
- Incident analysis and response.
- Emerging Trends in Cyber Security
- Current and future trends in cybersecurity.
- Industry best practices and continuous learning in cybersecurity.
Course Features
- Lectures 0
- Quizzes 0
- Duration 5 Semesters
- Skill level All levels
- Language English
- Students 219
- Certificate Yes
- Assessments Yes
Curriculum
Instructor
Requirements
- WASSCE