Conditional scholarship up to 20%
âš  Alert: Offer available till 31st of March 2026

Programs features

Learning Formula

Hybrid/60% hands on lab

Intake

2 Times A Year

Language

English

Get to know about this short course and what it offers

The Advanced Diploma in Cybersecurity at Docenti Global Business School is a globally focused academic and professional qualification designed to develop advanced theoretical knowledge and practical competencies for securing digital systems, networks, and information assets in complex organizational environments.

The programme progresses learners from intermediate to advanced cybersecurity practice, building specialized technical expertise, analytical capability, and strategic security management skills. It prepares graduates for professional roles across sectors including finance, government, healthcare, energy, and technology.

The curriculum covers network and systems security, ethical hacking and advanced penetration testing, security operations and monitoring (SIEM), cloud and distributed systems security, digital forensics, and cyber threat intelligence, alongside governance, risk management, and compliance aligned with ISO/IEC 27001, NIST Cybersecurity Framework, and GDPR.

Learners gain practical competence in vulnerability management, incident detection and response, cryptography, secure operating system architecture, and enterprise security design through applied labs, case studies, and simulations.

This Advanced Diploma provides an academically robust alternative to a traditional undergraduate degree and a strong foundation for further academic progression or professional certification. Graduates are prepared for roles such as Cybersecurity Analyst, Network Security Engineer, SOC Specialist, Information Security Officer, IT Risk Manager, and Cybersecurity Consultant, and receive a globally recognized certification from the Skill Development Council (SDC), Canada.

The programme is accredited and recognized by AAA, SDC (Canada), QAHE, IOA, and aligned with ISO quality standards, ensuring international credibility and academic quality. It prepares graduates to protect critical information assets, ensure regulatory compliance, and strengthen organizational resilience in today’s evolving cyber threat landscape.

Duration: 24 weeks-6 months (480 hours)

Delivery: 60% hands on lab/assessment based

Capstone Project: 2 months

Internship: 2 Month

Classes: Saturdays (10:00am – 03:30pm) & Sundays (01:00pm – 05:00pm)

Learning Format: Hybrid

Multiple Certification: Skill development council canada, Docenti Global Business School & Uptitek Ltd, UK.

Tuition: ₦2,500,000

Skill Development Council, Canada

  • Advanced Diploma in Cybersecurity

Docenti Global Business School

  • Certificate in Advanced Cybersecurity

Uptitek Ltd, UK

  • Certificate in Cybersecurity

1. Bachelors Degree, HND, OND, or any 6 to 12 months academic program from a reputable training organization.

2. 2years and above work experience

3. Experience in the area of cyberdomain and ethical hacking.

4. Advanced computer knowledge.

5. Good level with English Language

6. 21 year old and above.

7. Strong Internet Connection.

8. Tutorial on Virtual Learning.

9. Docenti LMS Onboarding.

Preparation

Training gadgets:

Personal Laptop and Smartphone

  1. Complete all 6 modules with minimum 70% score on each
  2. Submit all module capstone projects and achieve passing grades
  3. Complete minimum 80% of mandatory lab exercises
  4. Pass final practical assessment: security audit + pentest + IR
    simulation

Multiple Certifications
Earn multiple globally recognized certifications upon completion — one from Docenti Global Business School, one from Optitek Ltd and another from the Skill Development Council (SDC), Canada. This multiple recognition enhances your international credibility and signals your readiness to excel in global cybersecurity and technology environments.

Professional Internship
Gain real-world cybersecurity experience through structured internships. Work on live security projects, apply classroom knowledge to practical scenarios, and develop the technical and analytical skills that employers value most.

Industry and Company Visits
Participate in guided visits to leading organizations and cybersecurity firms. These visits provide firsthand exposure to corporate systems, operational workflows, and professional cultures — helping you connect theory with industry practice while building valuable professional networks.

Global Study Tour / Bootcamp (Thailand & Rwanda)
Engage in international study tours and bootcamps in Thailand and Rwanda, exploring innovation hubs, tech accelerators, and cross-cultural learning environments. This global exposure demonstrates how cybersecurity and digital transformation are implemented in diverse economies.

CV and Portfolio Optimization
Receive expert guidance to craft a results-driven professional CV and digital portfolio that highlight your technical expertise, certifications, and accomplishments — giving you a competitive advantage in the global job market.

Professional Social Media Branding
Enhance your online presence on platforms such as LinkedIn. Learn to build a strong digital profile, showcase your cybersecurity skills, and attract recruiters and hiring managers worldwide.

Fast-Track Access to the Job Market
Leverage Docenti’s corporate partnerships and industry links for rapid access to job opportunities after graduation. Our career support team helps you transition seamlessly from learning to professional employment in cybersecurity and related digital roles.

International Networking Opportunities
Connect with a global community of cybersecurity professionals, experts, and alumni. Participate in workshops, collaborative projects, and online forums to expand your network and gain international insights.

Business Incubation and Innovation Support
For entrepreneurial learners, the Docenti Innovation Hub provides mentorship, tools, and resources to transform cybersecurity ideas into viable business solutions. Learn how to develop, pitch, and scale innovative tech ventures.

Corporate Engagement and Industry Exposure
Interact directly with cybersecurity leaders, HR executives, and industry practitioners through seminars, interactive sessions, and conferences. These experiences enhance your visibility and deepen your understanding of real-world cybersecurity challenges.

Employer Connections and Job Placement
Benefit from Docenti’s strong partnerships with leading organizations seeking skilled cybersecurity professionals. Our placement support connects you with roles such as cybersecurity analyst, IT auditor, and digital risk specialist.

Career Services and Coaching
Access continuous career guidance, including mock interviews, job search strategies, and one-on-one coaching. Our advisors help you navigate your career path and achieve professional growth.

One-Year Access to Docenti LMS
Enjoy 12 months of post-completion access to Docenti’s Learning Management System (LMS). Revisit course materials, explore new resources, and continue learning at your own pace.

Exclusive Discounts on Future Programs
Advance your career with special discounts on all Docenti programs and selected partner institution courses — promoting lifelong learning and continuous skill development.

Personalized Coaching and Mentorship
Work closely with experienced mentors and industry experts who provide actionable insights and guidance. Receive support to grow academically, professionally, and personally throughout your cybersecurity journey.

Self-Branding and Professional Identity Building
Develop a strategic professional identity in the cybersecurity field. Identify your strengths, craft your narrative, and position yourself as a credible and confident digital security professional.

Free Global Webinars and Expert Sessions
Stay ahead of industry trends through live webinars hosted by international cybersecurity experts. Learn about ethical hacking, data privacy, digital risk management, and emerging technologies shaping the future of cybersecurity.

  • 2+ years in IT/cybersecurity or equivalent foundational certification (e.g., Security+, CEH)
  • Working knowledge of networking (TCP/IP, routing, firewalls)
  • Basic Linux/Windows system administration
  • Fundamental programming skills (Python, Bash, or PowerShell recommended)
  • Understanding of security concepts (CIA triad, encryption basics)

Target Roles:

  • Security Architect
  • Threat Intelligence Analyst
  • Penetration Testing Lead
  • Incident Response Manager
  • Cloud Security Engineer
  • SOC Operations Director

Industry Sectors:

  • Financial Services & Fintech
  • Critical Infrastructure
  • Healthcare & Pharmaceuticals
  • Defense & Government
  • Cloud Service Providers
  • Cybersecurity Consulting

Teaching Partner

uptitek

Uptitek Ltd, UK

MODULES

MODULE 1: Cyber Threat Intelligence & Adversary Analysis (Duration: 4 weeks (80 hours) 

Overview:

Master the identification, analysis, and tracking of advanced persistent
threats (APTs), nation-state actors, and cybercriminal organizations.
Learn to leverage threat intelligence platforms and frameworks to
anticipate and disrupt adversary operations

Learning Outcomes

  • Analyze APT campaigns using MITRE ATT&CK framework
  • Deploy and configure threat intelligence platforms (MISP, STIX/TAXII)
  • Conduct OSINT investigations for adversary profiling
  • Execute hypothesis-driven threat hunting in enterprise environments
  • Develop predictive threat models for proactive defense

Weekly Breakdown

Threat Landscape & APT Tactics

  • APT groups and TTPs analysis using MITRE ATT&CK framework
  • Ransomware-as-a-Service (RaaS) ecosystem analysis
  • Lab: Map real-world breach to ATT&CK techniques

Threat Intelligence Platforms

  • STIX/TAXII protocol implementation
  • TIP configuration (MISP, ThreatConnect)
  • Lab: Build automated threat feed aggregation pipeline

OSINT & Attribution

  • Advanced OSINT techniques (Maltego, theHarvester, Shodan)
  • Adversary infrastructure tracking and attribution challenges
  • Lab: Conduct OSINT investigation on simulated threat actor

Threat Hunting & Predictive Analysis

  • Hypothesis-driven threat hunting methodologies
  • Behavioral analytics and anomaly detection
  • Lab: Execute threat hunt in enterprise network simulation

Required Tools & Resources:

Software: MISP, Maltego, Shodan, theHarvester, ATT&CK Navigator
Platforms: ThreatConnect, AlienVault OTX
Reading: MITRE ATT&CK documentation, NIST SP 800-150

Module Assessment:

Capstone Project: Comprehensive threat intelligence report analyzing a
recent APT campaign, including TTPs mapping, IOC extraction, and
defensive recommendations (15-20 pages)

MODULE 2:  Zero Trust Architecture & Secure Network
Design
Duration: 4 weeks (80 hours) 

Overview:
Design and implement Zero Trust security models for modern
infrastructures including software-defined networking (SDN), multi-cloud environments, and IoT/OT convergence

Key Topics

  1. Zero Trust principles and NIST SP 800-207 implementation
  2. Software-defined networking with OpenFlow and Cisco ACI
  3. Micro-segmentation strategies to prevent lateral movement
  4. IoT/OT security and Industrial Control Systems protection
  5. ML-based network telemetry and anomaly detection

Required Tools:
GNS3/EVE-NG, Cisco ACI Simulator, pfSense, Zeek, Wireshark, AWS VPC,
Azure Virtual WAN
Capstone Project:
Design complete Zero Trust architecture for fictional enterprise with network
diagrams and security policies

MODULE 3: Enterprise System Hardening & Digital
Forensics
Duration: 4 weeks (80 hours)

Overview
Harden enterprise operating systems and conduct forensic investigations on compromised systems. Master endpoint detection and
response (EDR) and evidence preservation.
Key Topics:

  • Windows and Linux hardening using CIS benchmarks
  • SELinux/AppArmor and exploit mitigations (ASLR, DEP)
  • EDR deployment and SIEM integration
  • Digital forensics with disk imaging and timeline reconstruction
  • Memory forensics using Volatility framework

Required Tools:
Autopsy, Volatility, FTK Imager, Sleuth Kit, OSQuery, CrowdStrike Falcon, Splunk.

Capstone Project:
Complete forensic investigation report with timeline reconstruction and
chain-of-custody documentation

Module 4: Advanced Penetration Testing & Red Team
Operations

Overview:
Execute full-spectrum penetration tests using red team methodologies.
Develop custom exploits, evade modern security defenses, and simulate APT-style campaigns.

Key Topics:

  • Advanced reconnaissance and OSINT for pentesting
  • Web application and API security testing (OWASP Top 10)
  • Active Directory exploitation (BloodHound, Kerberoasting)
  • Custom payload development and AV/EDR evasion
  • Command & Control frameworks (Cobalt Strike, Empire)

Required Tools:
Metasploit, Burp Suite Pro, Cobalt Strike, BloodHound, Mimikatz,HackTheBox, TryHackMe.

Capstone Project:
Complete penetration test with executive summary, technical findings, and
remediation playbook (25-30 pages)

Module 5: Cloud-Native Security & DevSecOps
Duration: 4 weeks (80 hours)

Overview:
Secure cloud-native applications and infrastructure across AWS, Azure, and GCP. Implement DevSecOps practices including Infrastructure-as-
Code security and container orchestration

Key Topics:

  • Multi-cloud IAM and least-privilege access controls
  • Infrastructure-as-Code security scanning (Terraform, Checkov)
  • Container and Kubernetes security (RBAC, Pod Security)
  • Serverless and API Gateway security
  • Cloud compliance (CSA CCM, FedRAMP, ISO 27017)Required Tools:
    Terraform, Checkov, Docker, Kubernetes, Prisma Cloud, AWS/Azure/GCP Free Tiers

Capstone Project:
Deploy secure cloud-native application with IaC, compliance checklist, and automated security testing

Module 6: Incident Response, Recovery & Business
Continuity
Duration: 4 weeks (80 hours)

Overview:
Lead enterprise-scale incident response operations from detection through recovery. Master SOAR automation, forensic analysis, and business continuity planning.

Key Topics:

  • Incident response frameworks (NIST 800-61, SANS methodology)
  • SIEM alert triage and containment strategies
  • SOAR platforms and automated response workflows
  • Advanced log analysis and root cause determination
  • Business continuity planning and ransomware recovery

Required Tools:
Splunk Enterprise Security, TheHive, Cortex XSOAR, Cyber Range simulations.

Final Capstone:
Lead simulated enterprise incident response with live containment, forensic analysis, and post-incident report

Certifications & Accreditations

Docenti Global Business School is accredited by QAHE (ISO 17011:2017)
Recognized by the American Accreditation Association (AAA)
Accredited  by the Skill Development Council, Canada (SDC) & Uptitek Ltd UK.

nitda


ALP Code 1195

Docenti’s School of Entrepreneurs

IOA endorsed logo

Kindly Fill Out The Form If You Haven't to Apply Now

Testimonials

Olamide Sobayo

Olamide Sobayo

Learning employability skills with Docenti over the past three months has been an eye-opening experience. The classes are not just theoretical; they are practical and relatable, tailored to help me… Read more “Olamide Sobayo”

Olamide Sobayo

Sekinat

Sekinat

For anyone serious about growth, Docenti Global Business School is the place to be. My learning journey in the school proved incredibly insightful. I actively learned, consciously unlearned, and effectively… Read more “Sekinat”

Sekinat

Gbadebo Elizabeth

Elizabeth Gbadebo

Docenti Global Business School has helped me develop my career and my business mindset. Interactions with Students and Lecturers are fantastic. DGBS is a fantastic place to learn and develop… Read more “Gbadebo Elizabeth”

Gbadebo Elizabeth

Green Evans

Green Evans

I joined the Docenti Business school graduate program early this year, and so far, it has been nothing short of wonderful. The program has been made for us to have… Read more “Green Evans”

Green Evans