Cybersecurity(Degree)

Safeguard digital landscapes with our cybersecurity quizzes. Navigate through encryption, network security, and ethical hacking. Prepare to defend against cyber threats and contribute to the protection of critical systems.

Placeholder
Fourth Year

Information Security Governance and Policy

Governance is about the rules and frameworks that ensure a Zambian organization’s security strategy is effective and legally compliant. This course covers international standards like ISO 27001 and how to develop effective security policies for employees. You will learn how to lead a security team and how to communicate security …

Read more
0 Views
0 Topics
Placeholder
First Year

Introduction to Cybersecurity Concepts

This course serves as your entry point into the world of digital defense. You will explore the different types of cyber threats, from simple malware to complex phishing schemes that often target Zambian mobile money users. We discuss the importance of the CIA triad—Confidentiality, Integrity, and Availability—and how it applies …

Read more
0 Views
0 Topics
Placeholder
Third Year

Intrusion Detection and Prevention Systems

This course focuses on the tools used to monitor networks for malicious activity in real-time. You will learn how to set up and manage Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), which are the 'security cameras' of the digital world. In Zambia, these systems are essential for protecting …

Read more
0 Views
0 Topics
Placeholder
First Year

Networking Protocols and Secure Hardware

You cannot protect a network if you do not understand how it communicates. This course dives into the protocols that power the internet, such as TCP/IP, and the physical hardware like routers and switches used in Zambian corporate offices. You will learn how data packets travel across the globe and …

Read more
0 Views
0 Topics
Placeholder
Second Year

Network Security and Advanced Firewalls

Building on your networking knowledge, this course focuses on defending the perimeter. You will learn how to configure firewalls, set up Virtual Private Networks (VPNs), and implement access control lists to keep intruders out of sensitive Zambian business networks. We look at how to monitor network traffic for suspicious activity …

Read more
0 Views
0 Topics
Placeholder
Second Year

Operating System Security (Linux and Windows)

Every operating system has its own set of vulnerabilities. This course teaches you how to 'harden' both Linux and Windows systems to make them resistant to attack. You will learn about user permissions, kernel security, and how to patch systems against known exploits. Given that much of Zambia's server infrastructure …

Read more
0 Views
0 Topics
Placeholder
First Year

Programming for Security and Scripting

Automation is a key part of modern security, and this course teaches you how to write scripts that can detect threats or automate repetitive tasks. Using languages like Python and Bash, you will learn to build small tools that can scan networks or analyze log files—skills that are incredibly valuable …

Read more
0 Views
0 Topics
Placeholder
Third Year

Software Security and Secure Coding Practices

Many security breaches are caused by poorly written code. This course focuses on writing software that is secure from the start, avoiding common mistakes like SQL injection and cross-site scripting (XSS). In Zambia's booming app development market, knowing how to write secure code is a major advantage that sets you …

Read more
0 Views
0 Topics
Placeholder
Second Year

Systems Analysis and Secure Design

Before building a system, you must analyze its requirements and design it with security in mind. This course teaches you the systems development life cycle (SDLC) and how to integrate security at every stage. In the Zambian corporate world, being able to design a system that is efficient yet secure …

Read more
0 Views
0 Topics