Duration
4days/2months
Pricing
- Self-Paced (₦400,000)
- Online (₦350,000)
- Onsite (₦400,000)
Course Information:
A specialized training program focused on cyber intelligence gathering, online activity monitoring, and forensic tracking of digital footprints. Learn the latest tools and techniques for tracking cyber activities and mitigating security risks. across various industries.
Practical Hands-On Training:
• Real-life cyber threat case studies
• Interactive threat hunting and attack simulation exercises
• Best practices from top cybersecurity intelligence frameworks
Benefits from the Course:
• Certified Emergency Manager (CEM) Credential
• Nationally Recognized Emergency Management Qualification
• Enhanced career growth in security, safety, and crisis management
• Improved decision-making skills in high-pressure situations
• Networking opportunities with industry experts
• Confidence in handling emergencies effectively
• Comprehensive Training Materials
Key Modules:
• Digital Footprint Analysis
• Online Behavior Monitoring Techniques
• OSINT (Open-Source Intelligence) and Social Engineering
• Dark Web and Deep Web Investigations
• Threat Intelligence Gathering
• Data Leakage Detection and Prevention
• Legal and Ethical Considerations in Cyber Tracking
Why You Must Register for This Course:
• Certified cybersecurity intelligence professionals are in high demand globally
• Increase your earning potential and industry credibility
• Gain an internationally recognized certification to boost career growth
Who Should Attend?
- Cybersecurity Analysts and Threat Intelligence Specialists
- IT Security Professionals and Incident Response Teams
- Ethical Hackers and Penetration Testers
- Risk Management and Compliance Officers
- Government and Military Cyber Operations Personnel
- Law Enforcement and Digital Forensic Investigators
- Security Managers and Cyber Resilience Planners
- Business Continuity and Disaster Recovery Professionals
- Individuals Seeking a Career in Cyber Threat Intelligence
Skills Prerequisites:
• Basic understanding of cybersecurity principles and threat analysis
• Professional experience in IT security, penetration testing, or incident response (recommended)
• Commitment to ethical cybersecurity practices
• Laptop with minimum specifications:
• 8GB RAM (DDR3 to DDR6)
• SSD Drive (Minimum 256GB)
• Windows/Linux Operating System with Virtualization Support