On Campus & Online

Full Stack Cybersecurity

The Cyber Security Full-Stack program is designed to equip you with comprehensive skills in cybersecurity, preparing you to protect and develop secure applications and systems. This course offers a blend of theoretical knowledge and practical experience, covering a wide range of topics essential for a career in cybersecurity. The curriculum includes hands-on projects and simulations to apply your learning in real-world scenarios.

Download the Syllabus

DOWNLOAD SYLLABUS - ONLINE

We are delighted to give you a peep into our packages. Kindly provide your details below after which you’ll be able to download our syllabus.

Applications are currently Open!

Duration

10 WeeksFour times a week

Start Date

1st February, 2025

Level

Beginner

Prerequisites

A Laptop

Projects

1 Project

Cost

₦1,000,000

The Cyber Security Full-Stack program is designed to equip you with comprehensive skills in cybersecurity, preparing you to protect and develop secure applications and systems. This course offers a blend of theoretical knowledge and practical experience, covering a wide range of topics essential for a career in cybersecurity. The curriculum includes hands-on projects and simulations to apply your learning in real-world scenarios.

In this bootcamp, you will learn the following:

  • Cybersecurity Fundamentals: Understand the basics of cybersecurity, including threat analysis, encryption, and risk management.
  • Offensive Security Techniques: Learn about penetration testing, ethical hacking, and vulnerability assessment to identify and exploit security weaknesses.
  • Defensive Security Strategies: Study methods to protect systems and networks, including firewalls, intrusion detection systems, and incident response planning.
  • Network Security: Gain knowledge of securing network infrastructures, understanding protocols, and implementing security measures to prevent unauthorized access.
  • Application Security: Learn to identify and mitigate security vulnerabilities in software applications, focusing on secure coding practices and code reviews.
  • Digital Forensics: Understand the process of investigating cybercrimes, including data recovery, analysis, and reporting.

By the end of the program, you’ll have a deep understanding of both offensive and defensive cybersecurity strategies, enabling you to protect and defend information systems effectively.

To ensure a successful learning experience and hands-on practice in our Ethical Hacking course, students are required to meet the following prerequisites:

  • Basic Computer Skills: A basic understanding of computer systems, including knowledge of operating systems, file systems, and basic computer terminology.
  • Eagerness/Zeal (Passion) to Learn: A strong desire to learn and explore new concepts and technologies.
  • No Prior Programming skills need
  • Access to a computer system or device with the capability to download and store a minimum of 200 gigabytes (GB) worth of files for their lab exercises. These files are important resources for online students to work on remotely.
  • Reliable Internet connection

Laptop Specifications:

  • RAM – 16GB
  • Space: 500GB SSD
  • CORE I7 – 7TH upward generation
NDE (Network Defense Essentials)

Network Defense Essentials is a first-of-its-kind MOOC certification that
provides foundational knowledge and skills in network security with add-on
labs for hands-on experience.

Course Outline

  • Network Security Fundamentals
  • Identification, Authentication, and Authorization
  • Network Security Controls: Administrative Controls
  • Network Security Controls: Physical Controls
  • Network Security Controls: Technical Controls
  • Virtualization and Cloud Computing
  • Wireless Network Security
  • Mobile Device Security
  • IoT Device Security
  • Cryptography and PKI
  • Data Security
  • Network Traffic Monitoring
EHE (Ethical Hacking Essentials)

Ethical Hacking Essentials is a first-of-its-kind MOOC certification that
provides foundational knowledge and skills in ethical hacking with add-on
labs for hands-on experience. The course contains 12 modules and add-on
labs covering fundamental ethical hacking concepts, including emerging
technologies like IoT and OT, cloud computing, etc.

Course Outline

  • Information Security Fundamentals
  • Ethical Hacking Fundamentals
  • Information Security Threats and Vulnerabilities
  • Password Cracking Techniques and Countermeasures
  • Social Engineering Techniques and Countermeasures
  • Network-Level Attacks and Countermeasures
  • Web Application Attacks and Countermeasures
  • Wireless Attacks and Countermeasures
  • Mobile Attacks and Countermeasures
  • IoT and OT Attacks and Countermeasures
  • Cloud Computing Threats and Countermeasures
  • Penetration Testing Fundamentals
DFE (Digital Forensics Essentials)

Digital Forensics Essentials is a first-of-its-kind MOOC certification that
offers foundational knowledge and skills on digital forensics with add-on
labs for hands-on experience. Twelve modules cover the fundamental
concepts of digital forensics, such as dark web forensics, investigating web
application attacks, and more.

Course Outline

  • Computer Forensics Fundamentals
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-forensics Techniques
  • Windows Forensics
  • Linux and Mac Forensics
  • Network Forensics
  • Investigating Web Attacks
  • Dark Web Forensics
  • Investigating Email Crime
  • Malware Forensics
CCT (Certified Cybersecurity Technician)

EC-Councilʼs C|CT certification immerses students in well-constructed
knowledge transfer. Training is accompanied by critical thinking challenges
and immersive lab experiences that allow candidates to apply their
knowledge and move into the skill development phase in the class itself.
Upon completing the program, C|CT-certified professionals will have a
strong foundation in cybersecurity principles and techniques as well as
hands-on exposure to the tasks required in real-world jobs.

Course Outline

  • Information Security Threats And Vulnerabilities
  • Information Security Attacks
  • Network Security Fundamentals
  • Identification, Authentication, and Authorization
  • Network Security Controls: Administrative Controls
  • Network Security Controls: Physical Controls
  • Network Security Controls: Technical Controls
  • Network Security Assessment Techniques and Tools
  • Application Security
  • Virtualization and Cloud Computing
  • Wireless Network Security
  • Mobile Device Security
  • Cryptography
  • Data Security
  • Network Troubleshooting
  • Network Traffic Monitoring
  • Network Log Monitoring and Analysis
  • Incident Response
  • Computer Forensics
  • Business Continuity and Disaster Recovery
COMPTIA SECURITY PLUS

CompTIA Security+ (SY0-701) is an internationally recognized certification
that validates the foundational skills required for a career in cybersecurity.
The certification focuses on the essential knowledge and skills needed to
assess security posture, monitor networks, and respond to security events.
As the latest version in the Security+ series, SY0-701 covers up-to-date
threats and solutions in todayʼs evolving cybersecurity landscape.

Course Outline

  • General Security Concepts
  • Threats, Vulnerabilities, and Mitigations
  • Security Architecture
  • Security Operations
  • Security Program Management and Oversite
CEH (Certified Ethical Hacker)

The Certified Ethical Hacker (CEH) certification, offered by EC-Council, is
one of the most recognized and respected certifications in cybersecurity.
The CEH credential equips IT professionals with the knowledge and skills
needed to identify vulnerabilities in computer systems and networks using
the same tools and techniques as malicious hackers, but in a lawful and
legitimate manner.

Course Outline

  • Footprinting and Reconnaissance
  • Scanning Network
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading Ids, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography

Ajuyah Tosan Omatsola

Process Engineer
Prima Corporation Limited

Speak To a Learning Advisor
Speak To a Learning Advisor Form - Online

Come with expectations

100% Live Online Classes

You’ll be taught and mentored by some of the best teachers in the industry.

100% Instructor-Led classes

You will be taught & mentored by Industry expert.

Certificate

Get your very own physical certificate to prove your participation

Support System

Become part of an ever-growing, supportive community of like minds

Hands on Assignment

Grow with individual assignment feedback from your instructor.

Community Discussion

In app forum to collaborate with your peers.

Project Based Training

An hands-on approach to horn the skill you have learnt.

Success Stories

FAQs

Our program is 100% online, Live training program within the comfort of your home. However, if you are interested in our physical program click here.

A typical program at Univelcity runs for 3 Months, while our Fullstack program runs for 6 Months.

We are at No. 42 Montgomery Road, Yaba, Lagos (Adepate House).

Yes, we have evening classes. This class is structured best to suit individuals who have busy weekends.

The online classes are held every Saturday of the week 10 AM – 1 PM and Sunday 2PM – 5PM or 5PM – 8PM. We recommend this program if you are unavailable during the weekdays but would love to still learn an IT skill

Yes, you can. To join the waiting list, kindly apply for your desired course and get to let us know which cohort you intend to enroll for. We will get in touch with you.

You will see the dates for our next cohorts on your desired course of interest page. Feel free to reach out to us should you require clarifications. We will be happy to answer any questions and get in touch with you as soon as applications are open for another cohort.

Yes, you will be requiring a laptop. All our classes are hands-on and very practical.

Visit our FAQ Page for more help

Full Stack Cybersecurity

Learn the basics of Cybersecurity and how you can protect networks and yourself online today. Start your training for a career in Cybersecurity today.

Download the Syllabus

DOWNLOAD SYLLABUS - ONLINE

We are delighted to give you a peep into our packages. Kindly provide your details below after which you’ll be able to download our syllabus.