Spread the love
Cyber Security Bootcamp
Home » Cyber Security Bootcamp
Spread the love

Become a Certified Ethical Hacker in 6 months.
Our intensive Cyber Security Bootcamp is designed for IT professionals and tech enthusiasts who want to master the art of protecting digital systems from malicious attacks. Through hands-on labs and real-world simulations, you'll develop expertise in penetration testing, network security, digital forensics, and threat intelligence using industry-standard tools like Kali Linux, Metasploit, and Wireshark. A foundational understanding of computer networks and operating systems is recommended to benefit from this rigorous program fully.

Full-time Remote

  • Course Duration: 3 Months
  • Mode of Learning: 100% Online Classes | Mon - Fri 8 am - 5 pm E.A.T
  • Tuition Fee: Ksh 25,000

Part-time Remote

  • Course Duration: 3 Months
  • Mode of Learning: 100% Online Classes | Mon - Fri 6 pm - 9 pm E.A.T., Saturday 9 am - 1 pm
  • Tuition Fee: Ksh 25,000

Develop the skills to defend against cyber threats
If you aspire to become an Ethical Hacker, Security Analyst, or Information Security Specialist, this program provides the complete toolkit for success. Ideal candidates include network administrators, software developers, IT support specialists, and tech-savvy professionals looking to transition into the high-demand field of cybersecurity.

Our comprehensive curriculum covers:

  • Ethical hacking methodologies and penetration testing
  • Network security protocols and vulnerability assessment
  • Cryptography and secure communication techniques
  • Incident response and digital forensics
  • Security compliance and risk management

You'll complete multiple real-world security challenges, including simulated cyber attacks and defence scenarios, while receiving personalised mentorship from our team of certified cybersecurity professionals working in Kenya's leading financial and tech institutions.

Welcome to Prowessity!

Course Details

What is Cyber Security?
Cybersecurity is the practice of protecting systems, networks, and digital assets from malicious attacks, unauthorised access, and data breaches. It encompasses a range of technologies, processes, and practices designed to safeguard computers, servers, mobile devices, electronic systems, and sensitive information from cyber threats.

Who is this course for?

  • IT professionals seeking a cybersecurity specialisation
  • Network administrators enhancing security skills
  • Software developers building secure applications
  • Tech enthusiasts pursuing ethical hacking careers
  • Professionals responsible for organisational data protection

What are the course prerequisites?

  • Basic understanding of computer networks (TCP/IP, DNS)
  • Familiarity with operating systems (Windows/Linux)
  • Logical problem-solving abilities
  • Passion for technology and security
  • Commitment to ethical hacking principles

Why learn Cyber Security?

  • Ranked among the top 3 most in-demand tech skills globally
  • Certified experts are among the highest-paid professionals in IT.
  • Critical need across all industries in Kenya's digital economy
  • Opportunities for remote work and global employment
  • Constant intellectual challenge in a rapidly evolving field

Why Study At Prowessity?

  • Curriculum designed by certified cybersecurity experts (CEH, CISSP)
  • Hands-on training with real-world attack simulations
  • 1-on-1 mentorship from industry professionals
  • Career support, including certification guidance
  • Access to virtual hacking labs and security tools

Curriculum Overview

Orientation & Onboarding

  • Cybersecurity fundamentals and ethics
  • Introduction to Kali Linux
  • Setting up a virtual lab environment

Phase 1 - Network Security & Reconnaissance

  • Network protocols and vulnerabilities
  • Scanning techniques with Nmap
  • Enumeration and information gathering
  • Project: Network vulnerability assessment

Phase 2 - Penetration Testing

  • Metasploit framework
  • Exploit development basics
  • Web application attacks (OWASP Top 10)
  • Project: Penetration test report

Phase 3 - Defensive Security

  • Firewalls and intrusion detection systems
  • Cryptography and encryption methods
  • Security information and event management (SIEM)
  • Project: Security policy development

Phase 4 - Digital Forensics & Incident Response

  • Forensic investigation techniques
  • Malware analysis fundamentals
  • Incident handling procedures
  • Project: Cyber attack simulation and response

Phase 5 - Final Challenges

  • Capture The Flag (CTF) competition
  • Enterprise security scenario
  • Career preparation and certification guidance

Career Opportunities

  • Ethical Hacker/Penetration Tester
  • Cybersecurity Analyst
  • Information Security Specialist
  • Security Operations Centre (SOC) Analyst
  • Network Security Engineer
  • Chief Information Security Officer (CISO)

Cybersecurity Analyst
Monitor organisational networks for security breaches, investigate cyber incidents, implement security measures, and develop strategies to protect against hackers and malware attacks while ensuring compliance with data protection regulations.

Ready to launch your cybersecurity career?
Get Started Today