Cybersecurity Bootcamp

Cost

60.000 FCFA

100% payment during registration

Learn how to analyze and manage cyber security incidents

Cybersecurity is the implementation of a set of techniques and security solutions to protect the confidentiality, integrity, and availability of information and data. With our Cybersecurity Bootcamp, learn how to ensure the protection of data and information systems by using advanced cybersecurity techniques.
Young contemporary cyber security manager typing in front of computer
Presentation

Cybersecurity protection must cover the entire life cycle of data, from its generation and processing, to its transfer, storage and disposal. In order to meet the security needs of an information system, it is necessary to have a good general knowledge of the organization of networks and applications.

To achieve this, you need to follow the steps that lead to a computer attack: information gathering, searching for vulnerabilities, exploitation and post-exploitation. With this knowledge, you will be able to guarantee the security of an information system by identifying the weaknesses and associated risks to help make decisions and design a remediation plan.

By the end of this bootcamp, participants will have real experience of operational cybersecurity. They will be able to operate in a variety of environments, understand the organization and operations of a network as well as the techniques for securing data and detecting vulnerabilities. The technical skills acquired will cover the fundamentals of protecting a company, its network, its IT systems, its employees and its data against cyber threats and cyber attacks.

Why choose the Cybersecurity Bootcamp?
  • Add a highly demanded skill for beginners and professionals transitioning into cybersecurity.
  • Develop a solid foundation in cybersecurity, a fundamental technology to secure data and information systems in various fields and applications against cyber threats and cyberattacks.
  • Invest in your career plan and open yourself up to enormous professional opportunities.
  • Designed to be accessible to all, whether you are a beginner or a professional looking to strengthen your skills in cybersecurity.
  • Learn at your own pace and tailor your learning to your needs and schedule.
  • Master communication in cybersecurity and the deployment of awareness and support actions to ensure a security culture within the company.
  • Experienced professors and cybersecurity experts will guide you throughout your training with personalized support.
Why learn cybersecurity?
  • Technical:
    • Essential to understanding information system security (networks, cryptography, network security, digital data security)
    • Threats and challenges in cybersecurity
    • Designing a cybersecurity program
  • Legal:
    • Standards and regulations related to IT security and personal data protection
    • Building and drafting policies, procedures, and documentation
  • Sector-specific:
    • Understanding the issues of information system security in various sectors and organizations such as hospitals, local authorities, businesses, banks, etc.
  • Functional:
    • Project management in the field of cybersecurity
    • Management (Governance, Risk, and Compliance)
    • Communication and crisis management
    • Conducting risk analysis and the ability to provide recommendations and risk treatment measures.
Program

Training based on a lot of application exercises and mini-projects directly done on your computer so that you can implement the concepts developed in the courses. A total of 40 hours per week of online or in-person over 2 weeks. The content of the program covers the following topics:

  • Introduction to cybersecurity: issues and basic concepts
  • Understanding and administering networks
  • Concepts and operation of operating systems
  • Identification and authentication architecture
  • Email, network and database security
  • Penetration testing and ethical hacking
  • Vulnerability research and analysis
  • Exploiting vulnerabilities (memory corruption, injection, etc.)
  • Identification of attack strategies
  • Protocol manipulation tools
  • Reverse engineering of malware
  • Cybersecurity audits and risk analysis
  • Legal consideration in cybersecurity
  • Data protection and privacy
  • Information gathering and social engineering (OSINT).
Admission

Required degree: No degree is required to attend this Bootcamp. The bootcamp is designed to be accessible to all profiles. However, a basic knowledge of networks, operating systems (Linux, Windows, or MacOS), and an interest in IT, cybersecurity, science, and technology are encouraged.

Required documents: Please fill out the online application form. You will need the following documents:

  • ID card, passport, or driver’s license
  • Certificate or diploma of the last level of study
  • Transcripts of the last level of study
  • Two (2) color passport-sized photos

After submitting your application, if your profile catches our attention, you will be contacted for an interview (via video conference or in person) with the admission committee. During the interview, you will have the opportunity to present your experiences and motivation to join this program.

Afterwards, you will receive a response regarding your admission application. If you are authorized to enroll at LIAT, you will need to pay the registration fees as outlined in your admission letter.

The application processing fee is 10 000 FCFA.
Once admitted, the membership fee to the LIAT Student Association (AEL) is 5000 FCFA.