Become a Certified Ethical Hacker in 6 months.
Our intensive Cyber Security Bootcamp is designed for IT professionals and tech enthusiasts who want to master the art of protecting digital systems from malicious attacks. Through hands-on labs and real-world simulations, you'll develop expertise in penetration testing, network security, digital forensics, and threat intelligence using industry-standard tools like Kali Linux, Metasploit, and Wireshark. A foundational understanding of computer networks and operating systems is recommended to benefit from this rigorous program fully.
Full-time Remote
- Course Duration: 3 Months
- Mode of Learning: 100% Online Classes | Mon - Fri 8 am - 5 pm E.A.T
- Tuition Fee: Ksh 25,000
Part-time Remote
- Course Duration: 3 Months
- Mode of Learning: 100% Online Classes | Mon - Fri 6 pm - 9 pm E.A.T., Saturday 9 am - 1 pm
- Tuition Fee: Ksh 25,000
Develop the skills to defend against cyber threats
If you aspire to become an Ethical Hacker, Security Analyst, or Information Security Specialist, this program provides the complete toolkit for success. Ideal candidates include network administrators, software developers, IT support specialists, and tech-savvy professionals looking to transition into the high-demand field of cybersecurity.
Our comprehensive curriculum covers:
- Ethical hacking methodologies and penetration testing
- Network security protocols and vulnerability assessment
- Cryptography and secure communication techniques
- Incident response and digital forensics
- Security compliance and risk management
You'll complete multiple real-world security challenges, including simulated cyber attacks and defence scenarios, while receiving personalised mentorship from our team of certified cybersecurity professionals working in Kenya's leading financial and tech institutions.
Welcome to Prowessity!
Course Details
What is Cyber Security?
Cybersecurity is the practice of protecting systems, networks, and digital assets from malicious attacks, unauthorised access, and data breaches. It encompasses a range of technologies, processes, and practices designed to safeguard computers, servers, mobile devices, electronic systems, and sensitive information from cyber threats.
Who is this course for?
- IT professionals seeking a cybersecurity specialisation
- Network administrators enhancing security skills
- Software developers building secure applications
- Tech enthusiasts pursuing ethical hacking careers
- Professionals responsible for organisational data protection
What are the course prerequisites?
- Basic understanding of computer networks (TCP/IP, DNS)
- Familiarity with operating systems (Windows/Linux)
- Logical problem-solving abilities
- Passion for technology and security
- Commitment to ethical hacking principles
Why learn Cyber Security?
- Ranked among the top 3 most in-demand tech skills globally
- Certified experts are among the highest-paid professionals in IT.
- Critical need across all industries in Kenya's digital economy
- Opportunities for remote work and global employment
- Constant intellectual challenge in a rapidly evolving field
Why Study At Prowessity?
- Curriculum designed by certified cybersecurity experts (CEH, CISSP)
- Hands-on training with real-world attack simulations
- 1-on-1 mentorship from industry professionals
- Career support, including certification guidance
- Access to virtual hacking labs and security tools
Curriculum Overview
Orientation & Onboarding
- Cybersecurity fundamentals and ethics
- Introduction to Kali Linux
- Setting up a virtual lab environment
Phase 1 - Network Security & Reconnaissance
- Network protocols and vulnerabilities
- Scanning techniques with Nmap
- Enumeration and information gathering
- Project: Network vulnerability assessment
Phase 2 - Penetration Testing
- Metasploit framework
- Exploit development basics
- Web application attacks (OWASP Top 10)
- Project: Penetration test report
Phase 3 - Defensive Security
- Firewalls and intrusion detection systems
- Cryptography and encryption methods
- Security information and event management (SIEM)
- Project: Security policy development
Phase 4 - Digital Forensics & Incident Response
- Forensic investigation techniques
- Malware analysis fundamentals
- Incident handling procedures
- Project: Cyber attack simulation and response
Phase 5 - Final Challenges
- Capture The Flag (CTF) competition
- Enterprise security scenario
- Career preparation and certification guidance
Career Opportunities
- Ethical Hacker/Penetration Tester
- Cybersecurity Analyst
- Information Security Specialist
- Security Operations Centre (SOC) Analyst
- Network Security Engineer
- Chief Information Security Officer (CISO)
Cybersecurity Analyst
Monitor organisational networks for security breaches, investigate cyber incidents, implement security measures, and develop strategies to protect against hackers and malware attacks while ensuring compliance with data protection regulations.
Ready to launch your cybersecurity career?
Get Started Today