Become a Certified Cybersecurity Analyst
Level 1 (Associate)
Learn and develop processes and tools to protect systems, networks, and programs from digital malicious attacks.



Next Start date
15th May, 2025
Extended registrations ends April 20th
Duration
8 weeks
Schedule
Twice Weekdays 10am - 2pm or Saturdays 10am - 5pm
Format
Physical or Online
What you will learn
- Understanding the significance of cybersecurity
- Types of cyber threat
- Network basics
- Installations and setup of all tools required in course of study.
- Networking protocols (TCP/IP, DNS, HTTP/HTTPS)
IP Addressing and Subnetting
- Open Source Intelligence (OSINT)
Passive Information Gathering
Active Information Gathering
DNS Enumeration
WHOIS Data Collection
Port Scanning Techniques
Service Enumeration
Vulnerability Scanning
Banner Grabbing
SNMP Enumeration
Privilege Escalation
Backdoors and Logic Bombs
Rootkits and Trojans
Post-Exploitation Activities
Web Server Enumeration
Web Application Vulnerabilities
Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
SQL Injection Basics
Firewall Evasion Methods
Honeypots and Honeynets
Packet Fragmentation
Protocol Tunneling
Spoofing and Masquerading
Encrypted Attacks
- Outline the process for developing content campaigns.
- Create a content plan with key messaging
- Assess which content marketing tactics meet specific marketing and business goals.
- Determine the key metrics for measuring and optimizing content marketing tactics.
- Select appropriate influencers for your project and determine your influencer outreach strategy.
- Curate and modify digital content across your social channels.
- Determine the role of community management in social media marketing. Identify metrics and KPIs for measuring the impact of social media.
- Use of CRM (Customer Relationship Management) & Marketing automation tool
Symmetric Key Cryptography
Asymmetric Key Cryptography
Public Key Infrastructure (PKI)
Secure Key Exchange
Applications of Cryptography
Wireless Network Basics
Wi-Fi Security Protocols (WEP, WPA, WPA2, WPA3)
Wireless Network Authentication Methods
Wireless Access Point (AP) Security
Rogue Access Point Detection
- Throughout this course, you will be introduced to Artificial Intelligence (AI) concepts and tools that can enhance your productivity and workflow. You will learn how to leverage AI to automate tasks, gain insights, and improve overall efficiency.
- Your instructor will guide you through the exploration of various AI tools and technologies, tailored to the specific needs and goals of the course. This hands-on experience will enable you to develop practical skills and apply AI solutions to real-world problems.
What is Cybersecurity?
Cybersecurity: Protecting the Digital World
While software developers build things, cybersecurity experts protect them. They’re like the security guards of the digital world, defending against cyberattacks like hackers.
Imagine your online bank account. Cybersecurity professionals work hard to protect your money and personal information from being stolen. They identify vulnerabilities in systems, develop security measures, and respond to cyberattacks when they happen.
Key skills:
Problem-solving: Identifying and fixing security weaknesses.
Technical knowledge: Understanding how systems and networks work.
Analytical thinking: Identifying patterns and threats.
Communication: Explaining complex security issues to others.

Kickstart your career with our NEST Program

1-1 Mentorship
Everyone’s career transformation journey is different, so you’ll have 1-on-1 session from a dedicated career coach

Portfolio
Showcase your newfound skills and impress recruiters with a professional portfolio we help you create

Internship Placement
Gain valuable industry experience through an internship secured through our network of 100+ partner companies.

Interview Prep
Develop your interview skills with our comprehensive guide and preparation support & mock interviews

LinkedIn profile
Make a strong first impression on potential employers with help of our team. This includes a professional headshot for your LinkedIn profile

Craft A Winning CV
If your intention is to get a job, you get expert guidance on building and optimising a compelling CV to land interviews.
Next Digital Marketing Course
15th May, 2025
Our education advisors can talk you through the payment options available to you. Start your career in product design today.
Flexible payment plans available. Our team can help answer any of your questions about the course. Get in touch.
Cybersecurity Associate
Level 1
N280,000
N250,000
Extended registrations ends April 20th
Cybersecurity Mastery
Associate + Ethical Hacking + Comptia Security+ certification prep
N480,000
N430,000
Extended registrations ends April 20th
Testimonials
What our clients say about us?
The training was excellent. I appreciated the one-on-one support and how the trainers simplified complex topics. I feel much more confident about choosing the right health insurance now.
Become a Certified Cybersecurity Professional
Earn an employer-recognized certificate and get a professional portfolio that will help you get hired.
grads have chosen Torilo Academy to launch new careers or upskill to greater heights
since TA has been dedicated to transforming the careers and lives of our students
of graduates report positive career outcome and secure jobs within few months of graduation
Join our growing community of 7,500+ alumni
Alumni Stories

From Marketing Novice to Digital Strategist: How Torilo Academy's Course Landed Me My Dream Role
Through hands-on training at Torilo Academy, I mastered digital marketing essentials. The practical skills and portfolio building helped me secure a position as a Digital Strategist.
- Watch Story

From Marketing Novice to Digital Strategist: How Torilo Academy's Course Landed Me My Dream Role
Through hands-on training at Torilo Academy, I mastered digital marketing essentials. The practical skills and portfolio building helped me secure a position as a Digital Strategist.
- Watch Story
You're in good company. Our Alumni practice Cybersecurity with the world's leading organisations.









FAQs
Absolutely! Network security is a cornerstone of our curriculum. We cover network architecture, firewall configuration, intrusion detection/prevention systems, VPN implementation, secure network design principles, and common network attack vectors. Hands-on labs include configuring secure networks and identifying/remediating vulnerabilities.
Basic programming familiarity is helpful but not required. We provide introductory modules on Python and bash scripting specifically for security applications.
Yes, our curriculum aligns with the knowledge domains for several security certifications including CompTIA Security+.
Yes, we cover social engineering attack vectors including phishing, pretexting, baiting, and tailgating. You'll learn to conduct phishing simulations, measure effectiveness of awareness initiatives, and create policies that address the human element of security.
Torilo Academy distinguishes itself through our lab-intensive approach with our course time dedicated to hands-on practice in our custom-built cyber range. Our instructors are practicing security professionals who bring real-world experience and current threats directly into the classroom.
Learn high-quality skills from home with our online courses. Watch recorded lessons whenever you want, join live sessions with teachers, and use tools to work with other students on projects. Our courses are designed so everyone can take part, including people with disabilities.
To enroll, click the apply button an complete the application form with your personal details. Upon completion, a personnel will contact you on how to proceed.