
Diploma in Cybersecurity
The deadline to apply for the 1st 2025 academic session is March 30th, 2025.
Get started today or request more info about the Diploma Programme.
Duration
12 months
Deadline:
March 30th, 2025
Location
100% Online
Study Type
Self-Paced
Univad's Diploma in Cybersecurity program is your gateway to understanding and combating the evolving threats in the digital landscape. This comprehensive program is designed to equip you with the skills and knowledge needed to protect and secure information systems. Whether you're an aspiring cybersecurity professional or a seasoned IT expert, this program will empower you to defend against cyber threats with confidence and expertise.
10 Things You Will Learn:
Fundamentals of Cybersecurity
Network Security
Cryptography
Ethical Hacking and Penetration Testing
Security Risk Management
Incident Response and Recovery
Malware Analysis
Cyber Law and Ethics
Cloud Security
Data Privacy and Protection
Five Skills You Will Have:
Threat Analysis and Mitigation
Network Security Management
Ethical Hacking
Incident Response
Risk Assessment
Five Jobs for Each Skill:
Threat Analysis and Mitigation:
Cybersecurity Analyst
Threat Intelligence Analyst
Security Consultant
IT Security Specialist
SOC Analyst
Network Security Management:
Network Security Engineer
Information Security Analyst
IT Security Administrator
Network Administrator
Security Operations Center (SOC) Manager
Ethical Hacking:
Penetration Tester
Ethical Hacker
Red Team Member
Vulnerability Assessor
Security Researcher
Incident Response:
Incident Response Analyst
Incident Manager
Forensic Analyst
Cybersecurity Incident Handler
Security Operations Specialist
Risk Assessment:
Risk Management Specialist
IT Risk Analyst
Compliance Analyst
Information Risk Manager
Cyber Risk Consultant
Salary Expectations and Demand:
Cybersecurity is a high-demand field with a growing need for skilled professionals across all industries. Entry-level cybersecurity analysts can expect to earn around $60,000 to $80,000 per year, while experienced professionals, such as cybersecurity managers or ethical hackers, can command six-figure salaries. As cyber threats continue to evolve, the demand for cybersecurity experts remains robust, making it a lucrative and stable career choice.
Semester 1: Foundations of Cybersecurity
Semester 2: Play It Safe: Manage Security Risks
About this Course
This is the second course in the Univad Diploma in Cybersecurity. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Univad Diploma in Cybersecurity.
In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.
Course Syllabus
Security domains
Introduction to Course 2
Reading: Course 2 overview
Reading: Helpful resources and tips
Reading: Connect with your classmates
Welcome to module 1
Explore the CISSP security domains, Part 1
Explore the CISSP security domains, Part 2
Reading: Security domains cybersecurity analysts needs
Ashley: My path to cybersecurity
Practice Quiz: Test your knowledge: CISSP security domains
Threats, risks, and vulnerabilities
Herbert: Manage threats, risks, and vulnerabilities
NIST’s Risk Management Framework
Reading: Manage common threats, risks, and vulnerabilities
Practice Quiz: Navigate threats, risks, and vulnerabilities
Wrap-up
Reading: Glossary terms from module 1
Security frameworks and control
Welcome to module 2
Frameworks
Controls
Reading: The relationship between frameworks and controls
Practice Quiz: More about frameworks and controls
Explore the CIA triad
Reading: Use the CIA triad to protect organizations
Practice Quiz: Test your knowledge: The CIA triad
NIST frameworks
Explore the functions of the NIST Cybersecurity Framework
Practice Quiz: Test your knowledge: NIST frameworks
OWASP security principles
Reading: More about OWASP security principles
Wajih: Stay up-to-date on the latest cybersecurity threats
Plan a security audit
Complete a security audit
Reading: More about security audits
Practice Quiz: OWASP principles and security audits
Reading: Portfolio Activity: Conduct a security audit
Wrap-up
Reading: Glossary terms from module 2
Introduction to cybersecurity tools
Welcome to module 3
Logs and SIEM tools
SIEM dashboards
The future of SIEM tools
Parisa: The parallels of accessibility and security
Practice Quiz: SIEM Dashboards
Explore common SIEM tools
Reading: More about cybersecurity tools
Talya: Myths about the cybersecurity field
Practice Quiz: SIEM for Threats & Vulnerabilities
Wrap-up
Reading: Glossary terms from module 3
Use playbooks to respond to incidents
Welcome to module 4
Phases of an incident response playbook
Reading: More about playbooks
Zack: Incident response and the value of playbooks
Practice Quiz: Test your knowledge: Incident response
Apply a playbook for threats, vulnerabilities and risks.
Erin: The value of diverse perspectives in security teams
Reading: Playbooks, SIEM tools, and SOAR tools
Practice Quiz: Use a playbook to respond to an incident
Wrap-up
Reading: Glossary terms from module 4
Course wrap-up
Reading: Course 2 glossary
Discussion Prompt: Your Course 2 learning journey
Reading: Get started on the next course
Semester 3: Connect and Protect: Networks and Network Security
About this Course
This is the third course in the Univad Diploma in Cybersecurity. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the second Univad Diploma in Cybersecurity. In this course, you will explore how networks connect multiple devices and allow them to communicate.
You'll start with the fundamentals of modern networking operations and protocols. For example, you'll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. Then, you'll learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, you'll be able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
What you'll learn
—Define the types of networks and components of networks
—Illustrate how data is sent and received over a network
—Understand how to secure a network against intrusion tactics
—Describe system hardening techniques Skills you'll gain
—Security Hardening
—Network Security
—Transmission Control Protocol / Internet Protocol (TCP/IP)
—Network Architecture
—Cloud Networks This course is part of multiple programs.
Course Syllabus
Network Architecture
Introduction to Course 3
Reading: Course 3 overview
Reading: Helpful resources and tips
Discussion Prompt: Connect with your classmates
Welcome to module 1
Chris: My path to cybersecurity
What are networks?
Tina: Working in network security
Emmanuel: Useful skills for network security
Network tools
Reading: Network components, devices, and diagrams
Cloud networks
Reading: Cloud computing and software-defined networks
Practice Quiz: Test your knowledge: Introduction to network
Introduction to network communication
The TCP/IP model
The four layers of the TCP/IP model
Reading: Learn more about the TCP/IP model
Reading: The OSI model
Practice Quiz: Test your knowledge: Network communication
IP addresses and network communication
Reading: Components of network layer communication
Practice Quiz: Local and wide network communication
Wrap-up
Reading: Glossary terms from module 1
Practice Quiz: Test your knowledge: System identification
Practice Quiz: Network interception attack tactics
Network operations
Welcome to module 2
Network protocols
Reading: Common network protocols
Reading: Additional network protocols
Antara: Working in network security
Wireless protocols
Reading: The evolution of wireless security protocols
Practice Quiz: Recognize different network protocols
Firewalls and network security measures
Virtual private networks (VPNs)
Security zones
Reading: Subnetting and CIDR
Proxy servers
Virtual networks and privacy
Reading: VPN protocols: Wireguard and IPSec
Wrap-up
Reading: Glossary terms from module 2
Secure against network intrusions
Welcome to module 3
The case for securing networks
Practice Quiz: How intrusions compromise your system
Matt: A professional on dealing with attacks
Denial of Service (DoS) attacks
Reading: Read tcpdump logs
Reading: Real-life DDoS attack
Practice Quiz: Protect networks from DoS attacks
Malicious packet sniffing
IP Spoofing
Wrap-up
Security Hardening
Welcome to module 4
Security hardening
OS hardening practices
Reading: Brute force attacks and OS hardening
Reading: Test your knowledge: OS hardening
Practice Quiz: Test your knowledge: OS hardening
Network hardening practices
Reading: Network security applications
Practice Quiz: Test your knowledge: Network hardening
Network security in the cloud
Kelsey: Cloud security explained
Reading: Secure the cloud
Cryptography and cloud security
Practice Quiz: Test your knowledge: Cloud hardening
Wrap-up
Reading: Glossary terms from module 4
Course wrap-up
Reading: Course 3 glossary
Discussion Prompt: Your Course 3 learning journey
Reading: Get started on the next course
Semester 4: Tools of the Trade: Linux and SQL
About this Course
This is the fourth course in the Univad Diploma in Cybersecurity. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the third Univad Diploma in Cybersecurity.
In this course, you will explore computing skills that you’ll use on-the-job as a cybersecurity analyst. First, you'll practice using Linux, an operating system commonly used by cybersecurity professionals. For example, you'll use the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, you'll use SQL to communicate with a database. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
What you'll learn
—Explain the relationship between operating systems, applications, and hardware
—Compare a graphical user interface to a command line interface
—Navigate and manage the file system using Linux commands via the Bash shell
—Use SQL to retrieve information from a database Skills you'll gain
—Command line interface (CLI)
—SQL
—Linux
—Bash This course is part of multiple programs.
Course Syllabus
Introduction to operating systems
Introduction to Course 4
Reading: Course 4 overview
Reading: Helpful resources and tips
Discussion Prompt: Connect with your classmates
Welcome to module 1
Kim: My journey into computing
Introduction to operating systems
Reading: Compare operating systems
Discussion Prompt: Your background in operating systems
Practice Quiz: Operating Systems: Test Your Skills
Inside the operating system
Reading: Requests to the operating system
Resource allocation via the OS
Reading: Virtualization technology
Practice Quiz: OS at work: Test your knowledge
GUI versus CLI
Reading: The command line in use
Practice Quiz: Activity: Select the user interface
Ellen: My path into cybersecurity
Practice Quiz: Test your knowledge: The user interface
Wrap-up
Reading: Glossary terms from module 1
Practice Quiz: Test your knowledge: SQL and databases
The Linux operating system
Welcome to module 2
Introduction to Linux
Phil: Learn and grow in the cybersecurity field
Linux architecture
Reading: Linux architecture explained
Practice Quiz: Test your knowledge: All about Linux
Linux distributions
KALI LINUX ™
Reading: More Linux distributions
Reading: Package managers for installing applications
Reading: Lab tips and troubleshooting steps
Practice Quiz: Test your knowledge: Linux distributions
Introduction to the shell
Reading: Different types of shells
Input and output in the shell
Practice Quiz: Test your knowledge: The shell
Discussion Prompt: Strategies to learn new skills
Wrap-up
Reading: Glossary terms from module 2
Linux commands in the Bash shell
Welcome to module 3
Linux commands via the Bash shell
Core commands for navigation and reading files
Reading: Navigate Linux and read file content
Practice Quiz: Navigate the Linux file system in Bash
Find what you need with Linux
Reading: Filter content in Linux
Create and modify directories and files
Reading: Manage directories and files
Practice Quiz: Manage file content in Bash
File permissions and ownership
Change permissions
Reading: Permission commands
Add and delete users
Reading: Responsible use of sudo
Damar: My journey into Linux commands
The Linux community
Man pages within the shell
Reading: Linux resources
Discussion Prompt: Linux Commands for Cybersecurity Pros
Practice Quiz: Test your knowledge: Get help in Linux
Wrap-up
Reading: Reference guide: Linux
Reading: Glossary terms from module 3
Databases and SQL
Welcome to module 4
Introduction to databases
Query databases with SQL
Reading: SQL filtering versus Linux filtering
Adedayo: SQL in cybersecurity
Basic queries
Basic filters on SQL queries
Filter dates and numbers
Filters with AND, OR, and NOT
Join tables in SQL
Types of joins
Reading: Compare types of joins
Wrap-up
Reading: Reference guide: SQL
Reading: Glossary terms from module 4
Course wrap-up
Reading: Course 4 glossary
Reading: Your Course 4 learning journey
Reading: Get started on the next course
Semester 5: Asset and Threat Management
Semester 6: Cybersecurity: Threat Detection and Response
The next application deadlines are:
Priority Deadline: August 30, 2024
Final Deadline: September 10, 2024
Have questions? Attend an upcoming Information Session or use the chat box at the bottom right corner of the screen.
For more information about the Univad Diploma Tuition, session durations, and deadlines, kindly visit the Tuition page to access this information and even more.
Our students are happy
We're revolutionizing education in Africa, making quality learning accessible and affordable for all, regardless of location or socio-economic background. Discover the joy and satisfaction shared by our happy students!

Somtochi
Script Writing
Univad's Script Writing course is a must for anyone aspiring to be a screenwriter. The program's structured approach, insightful feedback, and collaborative environment elevated my scriptwriting skills. Now, I'm working on my first screenplay, and I owe it all to Univad.

Oriyomi
Fashion Design
Univad's Fashion Design course programme was an eye-opener for me. I learned everything from fashion history to garment construction. Today, I'm confidently pursuing my dream career as a fashion designer.

Erhinyuse
Communication/PR
Choosing Univad's Communications was one of the best decisions I've made for my career. The program covers a wide range of communication strategies, from PR to digital marketing. The instructors are top-notch, and the coursework is incredibly engaging.


