Cybersecurity(Degree)

Safeguard digital landscapes with our cybersecurity quizzes. Navigate through encryption, network security, and ethical hacking. Prepare to defend against cyber threats and contribute to the protection of critical systems.

Placeholder
Third Year

Cloud Security Architecture and Design

As more Zambian companies move their data to the cloud, securing cloud environments has become a top priority. This course covers the security challenges of cloud computing and how to design secure architectures for platforms like AWS, Azure, and Google Cloud. You will learn about identity management, data encryption in …

Read more
0 Views
0 Topics
Placeholder
Second Year

Cryptography Basics for Digital Defense

Cryptography is the science of keeping secrets. In this course, you will learn about the algorithms used to encrypt data, ensuring that sensitive information—like banking transactions in Zambia—remains private. We cover symmetric and asymmetric encryption, digital signatures, and the public key infrastructure (PKI). Understanding how encryption works is fundamental to …

Read more
0 Views
0 Topics
Placeholder
Second Year

Cyber Law and Professional Ethics

Being a security expert comes with great responsibility. This course explores the legal framework surrounding digital activities in Zambia, including the Cyber Security and Cyber Crimes Act. You will learn about the ethical dilemmas faced by security professionals, such as privacy concerns and the boundaries of ethical hacking. Understanding the …

Read more
0 Views
0 Topics
Placeholder
Fourth Year

Cybersecurity Risk Management for Business

In your final year, you take a step back to look at the 'big picture' of security. This course teaches you how to identify, assess, and prioritize digital risks within a Zambian business context. You will learn how to balance the cost of security measures against the potential impact of …

Read more
0 Views
0 Topics
Placeholder
Third Year

Digital Forensics and Incident Response

When a cybercrime occurs, digital forensics experts are called in to investigate. This course teaches you how to collect and preserve digital evidence, analyze hard drives, and track the source of an attack. You will also learn about incident response—how to act quickly to contain a breach and minimize damage …

Read more
0 Views
0 Topics
Placeholder
Fourth Year

Disaster Recovery and Business Continuity

What happens when the worst-case scenario occurs? This course teaches you how to plan for and recover from major security incidents or system failures, ensuring that a Zambian company can continue to operate during a crisis. You will learn about data backups, secondary sites, and crisis communication strategies. Business continuity …

Read more
0 Views
0 Topics
Placeholder
Third Year

Ethical Hacking and Penetration Testing

In this exciting course, you learn how to think like a hacker to better defend systems. Ethical hacking involves legally breaking into systems to find vulnerabilities before the 'bad guys' do. You will use the same tools and techniques as real-world attackers to perform penetration tests on networks and applications. …

Read more
0 Views
0 Topics
Placeholder
Fourth Year

Final Year Cybersecurity Research Project

Your degree culminates in a major research project where you tackle a real-world cybersecurity challenge. Whether it is developing a new encryption method or analyzing the security of local Zambian mobile payment systems, this is your chance to show off everything you have learned. The research skills you gain here …

Read more
0 Views
0 Topics
Placeholder
First Year

Fundamentals of Computing for Security

Every great cybersecurity expert starts with a deep understanding of how computers actually work. This course covers the essential building blocks of hardware and software, providing you with the foundation needed to spot vulnerabilities later in your degree. In Zambia's rapidly digitizing economy, knowing the 'ins and outs' of computing …

Read more
0 Views
0 Topics