No prior experience required
Cyber Security Certification
Cyber Security Certification
Cyber Security Certification
Start a new career in cyber security or accelerate in your existing role with the essential skills and accountability you need to succeed
Start a new career in cyber security or accelerate in your existing role with the essential skills and accountability you need to succeed
Start a new career in cyber security or accelerate in your existing role with the essential skills and accountability you need to succeed
6 spots left in the upcoming cohort!


Live
Zoom Classes
10 Weeks
Interactive learning
Guidance
With Experienced QA Testers
Pre-requisites
None
Here's everything you'll learn and apply
Here's everything you'll learn and apply
Gain practical skills and knowledge to excel in your tech career.
Week 1
Introduction to Cybersecurity
Learn the fundamentals of cybersecurity, including its importance and common threats such as malware, phishing, and ransomware. Understand essential terms like the CIA Triad, encryption, and vulnerabilities, and explore career paths in cybersecurity.
Week 1
Introduction to Cybersecurity
Learn the fundamentals of cybersecurity, including its importance and common threats such as malware, phishing, and ransomware. Understand essential terms like the CIA Triad, encryption, and vulnerabilities, and explore career paths in cybersecurity.
Week 1
Introduction to Cybersecurity
Learn the fundamentals of cybersecurity, including its importance and common threats such as malware, phishing, and ransomware. Understand essential terms like the CIA Triad, encryption, and vulnerabilities, and explore career paths in cybersecurity.
Week 2
Cybersecurity Awareness and Best Practices
Develop awareness of cyber risks by identifying social engineering tactics and improving password and email security. Practice safe online behavior, manage devices securely, and perform a data breach check to assess your own exposure.
Week 2
Cybersecurity Awareness and Best Practices
Develop awareness of cyber risks by identifying social engineering tactics and improving password and email security. Practice safe online behavior, manage devices securely, and perform a data breach check to assess your own exposure.
Week 2
Cybersecurity Awareness and Best Practices
Develop awareness of cyber risks by identifying social engineering tactics and improving password and email security. Practice safe online behavior, manage devices securely, and perform a data breach check to assess your own exposure.
Week 3
Networking Fundamentals
Understand core networking concepts like the OSI model, IP addressing, and protocols such as DNS and DHCP. Gain hands-on experience using Wireshark to analyze traffic and configure basic firewall rules for network protection.
Week 3
Networking Fundamentals
Understand core networking concepts like the OSI model, IP addressing, and protocols such as DNS and DHCP. Gain hands-on experience using Wireshark to analyze traffic and configure basic firewall rules for network protection.
Week 3
Networking Fundamentals
Understand core networking concepts like the OSI model, IP addressing, and protocols such as DNS and DHCP. Gain hands-on experience using Wireshark to analyze traffic and configure basic firewall rules for network protection.
Week 4
Operating System Basics
Master essential system administration tasks in both Windows and Linux environments. Learn to manage users, set permissions, use the command line, and perform file encryption and remote access operations securely.
Week 4
Operating System Basics
Master essential system administration tasks in both Windows and Linux environments. Learn to manage users, set permissions, use the command line, and perform file encryption and remote access operations securely.
Week 4
Operating System Basics
Master essential system administration tasks in both Windows and Linux environments. Learn to manage users, set permissions, use the command line, and perform file encryption and remote access operations securely.
Week 5
Cryptography
Explore how encryption protects data using symmetric and asymmetric methods. Learn about hashing, digital signatures, and secure web protocols like HTTPS. Apply these concepts by encrypting and decrypting files with OpenSSL.
Week 5
Cryptography
Explore how encryption protects data using symmetric and asymmetric methods. Learn about hashing, digital signatures, and secure web protocols like HTTPS. Apply these concepts by encrypting and decrypting files with OpenSSL.
Week 5
Cryptography
Explore how encryption protects data using symmetric and asymmetric methods. Learn about hashing, digital signatures, and secure web protocols like HTTPS. Apply these concepts by encrypting and decrypting files with OpenSSL.
Week 6
Threats, Vulnerabilities, and Attacks
Identify and analyze various cyberattacks including phishing, XSS, and DoS. Develop basic skills in vulnerability assessment and malware analysis, and simulate a phishing campaign to understand attack vectors and defense strategies.
Week 6
Threats, Vulnerabilities, and Attacks
Identify and analyze various cyberattacks including phishing, XSS, and DoS. Develop basic skills in vulnerability assessment and malware analysis, and simulate a phishing campaign to understand attack vectors and defense strategies.
Week 6
Threats, Vulnerabilities, and Attacks
Identify and analyze various cyberattacks including phishing, XSS, and DoS. Develop basic skills in vulnerability assessment and malware analysis, and simulate a phishing campaign to understand attack vectors and defense strategies.
Week 7
Security Tools and Technologies
Gain practical knowledge of cybersecurity tools like firewalls, antivirus, IDS/IPS, and SIEM systems. Install and configure firewall rules, and use platforms like Splunk or ELK Stack to analyze and interpret security event data.
Week 7
Security Tools and Technologies
Gain practical knowledge of cybersecurity tools like firewalls, antivirus, IDS/IPS, and SIEM systems. Install and configure firewall rules, and use platforms like Splunk or ELK Stack to analyze and interpret security event data.
Week 7
Security Tools and Technologies
Gain practical knowledge of cybersecurity tools like firewalls, antivirus, IDS/IPS, and SIEM systems. Install and configure firewall rules, and use platforms like Splunk or ELK Stack to analyze and interpret security event data.
Week 8
Penetration Testing & Web Security
Learn the fundamentals of ethical hacking, including reconnaissance, scanning, and exploitation techniques. Understand common web vulnerabilities through the OWASP Top 10 and explore tools like Nmap, Wireshark, Metasploit, and ZAP. Apply your skills by conducting a basic penetration test using Nmap and ZAP.
Week 8
Penetration Testing & Web Security
Learn the fundamentals of ethical hacking, including reconnaissance, scanning, and exploitation techniques. Understand common web vulnerabilities through the OWASP Top 10 and explore tools like Nmap, Wireshark, Metasploit, and ZAP. Apply your skills by conducting a basic penetration test using Nmap and ZAP.
Week 8
Penetration Testing & Web Security
Learn the fundamentals of ethical hacking, including reconnaissance, scanning, and exploitation techniques. Understand common web vulnerabilities through the OWASP Top 10 and explore tools like Nmap, Wireshark, Metasploit, and ZAP. Apply your skills by conducting a basic penetration test using Nmap and ZAP.
Week 9
Cloud & Network Security
Develop foundational knowledge of cloud security with a focus on AWS. Understand how to manage identities and permissions using IAM, and configure firewalls to secure cloud resources. Put this into practice by securing an AWS environment and reviewing activity logs for anomalies.
Week 9
Cloud & Network Security
Develop foundational knowledge of cloud security with a focus on AWS. Understand how to manage identities and permissions using IAM, and configure firewalls to secure cloud resources. Put this into practice by securing an AWS environment and reviewing activity logs for anomalies.
Week 9
Cloud & Network Security
Develop foundational knowledge of cloud security with a focus on AWS. Understand how to manage identities and permissions using IAM, and configure firewalls to secure cloud resources. Put this into practice by securing an AWS environment and reviewing activity logs for anomalies.
Week 10
Incident Response & Compliance
Master the process of responding to security incidents by learning how to analyze logs and identify threats. Understand key cybersecurity regulations like GDPR and NIST frameworks. Gain hands-on experience by reviewing log data and drafting a basic incident response plan.
Week 10
Incident Response & Compliance
Master the process of responding to security incidents by learning how to analyze logs and identify threats. Understand key cybersecurity regulations like GDPR and NIST frameworks. Gain hands-on experience by reviewing log data and drafting a basic incident response plan.
Week 10
Incident Response & Compliance
Master the process of responding to security incidents by learning how to analyze logs and identify threats. Understand key cybersecurity regulations like GDPR and NIST frameworks. Gain hands-on experience by reviewing log data and drafting a basic incident response plan.
Meet Your Instructors
Meet Your Instructors
Partner with your dedicated mentor to refine your skills and propel your career journey.
Mercy Ogah Diligence
Cyber Security Instructor
Mercy Ogah Diligence is a highly skilled Cybersecurity Analyst with over four years of experience in protecting digital infrastructure and mitigating cyber risks. A First class graduate of Computer Science, she has built a strong track record across core areas of cybersecurity, including penetration testing, incident response, SIEM operations, threat intelligence, cloud and network security. Her ability to implement effective security protocols and respond swiftly to threats has positioned her as a reliable expert in the field.
Clinton Nkweke
Clinton Nkweke is a QA Lead with over 7 years of experience in the Software Development Life Cycle (SDLC). He has successfully delivered and tested more than 15 world-class applications while working with companies such as Zealhosts, Revolt Technology, and Inspiro Technology
A quality enthusiast, Clinton is dedicated to ensuring high-quality software. He leverages expert tools like Jira, TestRail, Postman, and BrowserStack to maintain software excellence. Now, he has decided to mentor aspiring Quality Assurance professionals, empowering them to drive quality in software across the globe.
Effiong Lesley
Business Intelligence Analyst at Dayfigurez Consult Ltd
Effiong Lesley is a versatile Data Analyst and Customer Service Analyst with over seven years of experience bridging non-technical and technical roles in the Telecoms and Energy sectors. A Microsoft Certified Power BI Data Analyst Associate, Lesley excels in data preparation, modeling, visualization, and business needs analysis.He is proficient in digital tools such as Microsoft Excel, Power BI, Tableau, PostgreSQL, Looker, and Python, leveraging these skills to drive business growth and improve operational efficiency.
Emmanuel Abang
Head of Product at MoneyGram
Emmanuel Abang, Head of Product at MoneyGram and former Group Product Manager at Eventbrite. With over 11 years of product management experience, including roles at Meta, SoFi and Wells Fargo, Emmanuel is a seasoned leader in driving innovation. Leveraging expertise in machine learning from optimizing recommendations at Facebook, he now shares invaluable insights as a featured speaker at Product School, empowering aspiring product professionals.
Victor Ukachukwu
Former Product Manager at Meta
Meet Victor Ukachukwu, a seasoned Product Manager with over 5 years of experience leading software product development. With a background at Meta, WeSchool and various startups, he's built a diverse range of products, from Social commerce, Marketplaces, E-learning and SaaS platforms to AI-driven solutions. Starting his career by founding a startup in 2019, he's since made significant contributions to startups, scaleups, and tech giants alike.
Manjesh Singh Yadav
Product Designer at TutorBin
Manjesh is a seasoned UI/UX designer with 6 years of industry experience. He has a passion for creating exceptional user experiences and has worked across diverse sectors. Currently, he is working at TutorBin and has previously held positions at InnovationM and ULISFintech. Manjesh has a strong passion for building products and educating aspiring designers using a design thinking mindset and processes. He thrives in collaborative environments, seamlessly blending creativity and functionality to deliver impactful solutions.
Mercy Ogah Diligence
Cyber Security Instructor
Mercy Ogah Diligence is a highly skilled Cybersecurity Analyst with over four years of experience in protecting digital infrastructure and mitigating cyber risks. A First class graduate of Computer Science, she has built a strong track record across core areas of cybersecurity, including penetration testing, incident response, SIEM operations, threat intelligence, cloud and network security. Her ability to implement effective security protocols and respond swiftly to threats has positioned her as a reliable expert in the field.
Clinton Nkweke
Clinton Nkweke is a QA Lead with over 7 years of experience in the Software Development Life Cycle (SDLC). He has successfully delivered and tested more than 15 world-class applications while working with companies such as Zealhosts, Revolt Technology, and Inspiro Technology.
A quality enthusiast, Clinton is dedicated to ensuring high-quality software. He leverages expert tools like Jira, TestRail, Postman, and BrowserStack to maintain software excellence. Now, he has decided to mentor aspiring Quality Assurance professionals, empowering them to drive quality in software across the globe.
Effiong Lesley
Business Intelligence Analyst at Dayfigurez Consult Ltd
Effiong Lesley is a versatile Data Analyst and Customer Service Analyst with over seven years of experience bridging non-technical and technical roles in the Telecoms and Energy sectors. A Microsoft Certified Power BI Data Analyst Associate, Lesley excels in data preparation, modeling, visualization, and business needs analysis.He is proficient in digital tools such as Microsoft Excel, Power BI, Tableau, PostgreSQL, Looker, and Python, leveraging these skills to drive business growth and improve operational efficiency.
Emmanuel Abang
Head of Product at MoneyGram
Emmanuel Abang, Head of Product at MoneyGram and former Group Product Manager at Eventbrite. With over 11 years of product management experience, including roles at Meta, SoFi and Wells Fargo, Emmanuel is a seasoned leader in driving innovation. Leveraging expertise in machine learning from optimizing recommendations at Facebook, he now shares invaluable insights as a featured speaker at Product School, empowering aspiring product professionals.
Victor Ukachukwu
Former Product Manager at Meta
Meet Victor Ukachukwu, a seasoned Product Manager with over 5 years of experience leading software product development. With a background at Meta, WeSchool and various startups, he's built a diverse range of products, from Social commerce, Marketplaces, E-learning and SaaS platforms to AI-driven solutions. Starting his career by founding a startup in 2019, he's since made significant contributions to startups, scaleups, and tech giants alike.
Manjesh Singh Yadav
Product Designer at TutorBin
Manjesh is a seasoned UI/UX designer with 6 years of industry experience. He has a passion for creating exceptional user experiences and has worked across diverse sectors. Currently, he is working at TutorBin and has previously held positions at InnovationM and ULISFintech. Manjesh has a strong passion for building products and educating aspiring designers using a design thinking mindset and processes. He thrives in collaborative environments, seamlessly blending creativity and functionality to deliver impactful solutions.
Frequently Asked Questions
Frequently Asked Questions
Find answers to frequently asked questions here. Contact us if you
can't find what you need.
Find answers to frequently asked questions here. Contact us if you can't find what you need.
What are the prerequisites for joining the KairosLabs Bootcamp?
The Bootcamp is designed for individuals with varying levels of experience in tech. While there are no strict prerequisites, a basic understanding of computer science fundamentals and a passion for learning are beneficial.
What are the prerequisites for joining the KairosLabs Bootcamp?
The Bootcamp is designed for individuals with varying levels of experience in tech. While there are no strict prerequisites, a basic understanding of computer science fundamentals and a passion for learning are beneficial.
What are the prerequisites for joining the KairosLabs Bootcamp?
The Bootcamp is designed for individuals with varying levels of experience in tech. While there are no strict prerequisites, a basic understanding of computer science fundamentals and a passion for learning are beneficial.
Can I participate in the Bootcamp while working or attending school?
Can I participate in the Bootcamp while working or attending school?
Can I participate in the Bootcamp while working or attending school?
What sets the KairosLabs Bootcamp apart from other online learning platforms?
What sets the KairosLabs Bootcamp apart from other online learning platforms?
What sets the KairosLabs Bootcamp apart from other online learning platforms?
How are the Bootcamp projects structured, and will I receive feedback on my work?
How are the Bootcamp projects structured, and will I receive feedback on my work?
How are the Bootcamp projects structured, and will I receive feedback on my work?
At KairosLabs, we advance tech careers for professionals and deliver innovations for businesses worldwide.
support@kairoslabs.io
At KairosLabs, we advance tech careers for professionals and deliver innovations for businesses worldwide.
support@kairoslabs.io
At KairosLabs, we advance tech careers for professionals and deliver innovations for businesses worldwide.
support@kairoslabs.io
Live
Zoom Classes
Guidance
With Experienced
QA Testers
10 Weeks
Interactive Learning
Pre-requisites
No Experienced
Required