Cybersecurity(Degree)
Safeguard digital landscapes with our cybersecurity quizzes. Navigate through encryption, network security, and ethical hacking. Prepare to defend against cyber threats and contribute to the protection of critical systems.
Information Security Governance and Policy
Governance is about the rules and frameworks that ensure a Zambian organization’s security strategy is effective and legally compliant. This course covers international standards like ISO 27001 and how to develop effective security policies for employees. You will learn how to lead a security team and how to communicate security …
Introduction to Cybersecurity Concepts
This course serves as your entry point into the world of digital defense. You will explore the different types of cyber threats, from simple malware to complex phishing schemes that often target Zambian mobile money users. We discuss the importance of the CIA triad—Confidentiality, Integrity, and Availability—and how it applies …
Intrusion Detection and Prevention Systems
This course focuses on the tools used to monitor networks for malicious activity in real-time. You will learn how to set up and manage Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), which are the 'security cameras' of the digital world. In Zambia, these systems are essential for protecting …
Networking Protocols and Secure Hardware
You cannot protect a network if you do not understand how it communicates. This course dives into the protocols that power the internet, such as TCP/IP, and the physical hardware like routers and switches used in Zambian corporate offices. You will learn how data packets travel across the globe and …
Network Security and Advanced Firewalls
Building on your networking knowledge, this course focuses on defending the perimeter. You will learn how to configure firewalls, set up Virtual Private Networks (VPNs), and implement access control lists to keep intruders out of sensitive Zambian business networks. We look at how to monitor network traffic for suspicious activity …
Operating System Security (Linux and Windows)
Every operating system has its own set of vulnerabilities. This course teaches you how to 'harden' both Linux and Windows systems to make them resistant to attack. You will learn about user permissions, kernel security, and how to patch systems against known exploits. Given that much of Zambia's server infrastructure …
Programming for Security and Scripting
Automation is a key part of modern security, and this course teaches you how to write scripts that can detect threats or automate repetitive tasks. Using languages like Python and Bash, you will learn to build small tools that can scan networks or analyze log files—skills that are incredibly valuable …
Software Security and Secure Coding Practices
Many security breaches are caused by poorly written code. This course focuses on writing software that is secure from the start, avoiding common mistakes like SQL injection and cross-site scripting (XSS). In Zambia's booming app development market, knowing how to write secure code is a major advantage that sets you …
Systems Analysis and Secure Design
Before building a system, you must analyze its requirements and design it with security in mind. This course teaches you the systems development life cycle (SDLC) and how to integrate security at every stage. In the Zambian corporate world, being able to design a system that is efficient yet secure …