Certificate Program in Cybersecurity
- Onsite and Online
- Intakes: Jan, Apr, Jul, Oct
The Cybersecurity Certificate Program is a beginner-friendly, 12-module course covering essential cybersecurity concepts and practices to protect personal and organizational data. It includes topics such as cybersecurity threats, authentication, cryptography, network security and cyber attacks. Emphasizing hands-on learning, it covers secure software development, incident response and digital forensics. Key principles like the CIA Triad and cyber hygiene best practices are taught. Graduates gain foundational skills to identify and mitigate threats, apply basic controls and pursue further cybersecurity studies or entry-level roles.
Course Description
The Cybersecurity Certificate Program is designed to provide foundational knowledge and skills in cybersecurity for beginners. This comprehensive 12-module course introduces learners to essential cybersecurity concepts, principles and practices needed to protect personal and organizational data in today’s digital world. Participants will explore fundamental topics, including cybersecurity threats, security principles, authentication, cryptography, network security and common cyber attacks.
The program emphasizes practical applications, with hands-on learning in areas like secure software development, incident response and digital forensics. Key principles such as the CIA Triad (Confidentiality, Integrity, Availability) and the Principle of Least Privilege are covered, offering a framework for establishing secure environments. Learners will also delve into best practices for personal cyber hygiene, including password management, safe browsing and email security.
Upon completion, participants will have the skills to identify and mitigate common cyber threats, apply basic security controls and develop habits for cyber safety in both personal and professional context. This course serves as a strong foundation for further study in cybersecurity and prepares learners for entry-level roles or more advanced certifications in the field
Learning Outcomes
Upon completing this program, learners will:
- Understand the fundamentals of cybersecurity and common threats.
- Recognize and apply core security principles, including the CIA Triad and Least Privilege.
- Identify different cyber attacks and learn basic methods to prevent them.
- Gain foundational knowledge in cryptography, IAM and network security.
- Understand basic incident response steps and digital forensics principles.
- Develop essential cyber hygiene habits for personal and professional use.
Target Audience
The Cybersecurity Certificate Program is designed for individuals with basic computer skills who are eager to expand their knowledge in cybersecurity. This program is ideal for beginners who want to build a solid foundation in cybersecurity concepts, practices and defensive techniques. It’s suited for students, career changers, IT enthusiasts or anyone interested in protecting digital information and understanding the fundamentals of cyber defense
Lecture Panel
The lecture panel for the Cybersecurity Certificate Program is composed of seasoned cybersecurity professionals and esteemed university lecturers. Each panel member brings over a decade of experience in the cybersecurity and information technology fields with specialized expertise spanning various areas of the industry. This unique blend of hands-on industry insight and academic rigor provides students with a well-rounded, comprehensive education in cybersecurity. The faculty’s combined knowledge and practical experience ensure that students gain both theoretical understanding and practical skills, equipping them for real-world cybersecurity challenges.
Course Outline
Module 1: Introduction to Cybersecurity | |
---|---|
Content: Overview of cybersecurity, its significance, and key concepts. Topics: Cybersecurity history, trends, and career opportunities; Introduction to confidentiality, integrity and availability (CIA Triad). |
Module 2: Cybersecurity Threat Landscape | |
---|---|
Content: Common threats and vulnerabilities affecting digital security. Topics: Malware (viruses, worms, trojans), social engineering, phishing attacks and ransomware. Objective: Recognize different types of cyber threats and understand their potential impacts. |
Module 3: Security Principles and Frameworks | |
---|---|
Content: Fundamental principles for establishing a secure environment. Topics: CIA Triad, Principle of Least Privilege and Defense-in-Depth. Objective: Learn how these principles apply to creating secure systems. |
Module 4: Authentication and Authorization Basics | |
---|---|
Content: Essential aspects of access control. Topics: Authentication vs. Authorization, multi-factor authentication (MFA), biometrics and access control models. Objective: Differentiate between authentication and authorization and recognize the importance of secure access. |
Module 5: Introduction to Cryptography | |
---|---|
Content: Basics of cryptographic techniques used to secure data. Topics: Encryption (symmetric vs. asymmetric), hashing, digital signatures and Public Key Infrastructure (PKI). Objective: Understand how cryptography protects data and communications. |
Module 6: Network Security Essentials | |
---|---|
Content: Fundamental network security concepts and devices. Topics: Firewalls, VPNs, IDS/IPS and basics of network segmentation. Objective: Learn how network security tools protect data across networks. |
Module 7: Understanding Common Attacks | |
---|---|
Content: Overview of popular cyber attack methods. Topics: Social engineering, drive-by downloads, buffer overflows, cross-site scripting (XSS), SQL injection. Objective: Identify and understand tactics used by attackers. |
Module 8: Secure Software Development Practices | |
---|---|
Content: Introduction to secure coding and software protection. Topics: Secure coding practices, patch management, vulnerability management and application testing. Objective: Learn best practices for developing secure software and applications. |
Module 9: Identity and Access Management (IAM) | |
---|---|
Content: Basics of managing user identities and access. Topics: Role-based and attribute-based access control, user management and privilege escalation. Objective: Understand IAM as a key control to prevent unauthorized access. |
Module 10: Incident Response Fundamentals | |
---|---|
Content: Introductory skills for responding to and recovering from incidents. Topics: Incident response steps (preparation, detection, containment, eradication, recovery and lessons learned). Objective: Learn the basic steps to take in case of a cybersecurity incident. |
Module 11: Digital Forensics Basics | |
---|---|
Content: Introduction to digital forensics for investigating cybersecurity incidents. Topics: Evidence collection, basic forensic tools, chain of custody and data recovery. Objective: Gain a basic understanding of digital forensics and its role in cybersecurity. |
Module 12: Cyber Hygiene and Personal Security Best Practices | |
---|---|
Content: Essential security practices for everyday use. Topics: Strong passwords, social media safety, safe browsing, email security and data privacy. Objective: Develop habits for personal cybersecurity hygiene and recognize security best practices in daily activities. |
Method of Delivery
Medium of Instruction
Sinhala and Simple English
Course Duration
30 Hours
Course Schedule
2 Hours, 3 Days per week
Course Fee
Rs 15,000/=
How to Apply
- You Apply
Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.
- We Connect
After you submit your application, an admissions representative will contact you and will help you to complete the process.
- You Get Ready
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.
How To Apply
Your Application
Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.
Our Response
After you submit your application, an admissions representative will contact you and will help you to complete the process.
Your Journey
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.