Facyber signed a major partnership with a Nigerian university. It will be announced next week. This partnership makes it possible for our programs to be co-awarded with the university.
Our Cybersecurity education is structured around four key pillars of policy, management, technology and digital forensics. This implies that we cover all the core needs of any organization or state institutions. While some staff like corporate lawyers may require training on policy, some staff like IT managers may need technical skills. Others like business leaders will find the management module useful. We deliver all these programs through our web portal.
The program structure is presented below: certificate programs take 12 weeks; diploma programs which require certificate programs as perquisites take 24 weeks (inclusive of the certificate programs) and the nanodegree programs require a live (virtual) one week training with the diploma programs as prerequisites
Program Descriptions
Tekedia Mini-MBA edition 16 (Feb 10 – May 3, 2025) opens registrations; register today for early bird discounts.
Tekedia AI in Business Masterclass opens registrations here.
Join Tekedia Capital Syndicate and invest in Africa’s finest startups here.
Certificate in Cybersecurity Policy (CCYP): Certificate in Cybersecurity Policy deals with the policy analysis and implementation aspects of cybersecurity. It presents theory and topical issues, at government and enterprise levels, with both technical and managerial components in the fields of information systems security. The program helps learners develop skills on the policy, ethical, and legal issues associated with cybersecurity and information security.
Diploma in Cybersecurity Policy (DCYP) Capstone: This is a practical-oriented program where learners are tasked with developing solutions for a theoretical or real case cybersecurity policy issue with the guidance of a mentor. A project report is required at the end of the program.
Certificate in Cybersecurity Technology (CCYT): The Certificate in Cybersecurity Technology is designed to provide learners with skills to analyze multi-faceted complex cybersecurity issues, develop capabilities to make strategic decisions to protect organizations from threats and become competent cybersecurity professionals.
Diploma in Cybersecurity Technology (DCYT) Capstone: This is a practical-oriented program where learners are tasked with developing capabilities in the core technical aspect of cybersecurity. Learners will have access to some tools and equipment to work throughout this program. A project report is required at the end of the program.
Certificate in Cybersecurity Management (CCYM): The Certificate in Cybersecurity Management equips and prepares learners with modern skills to become effective managers across the broad nexus of cybersecurity and intrusion preventions in organizations. The central core is developing capacity to prevent anticipated cyber intrusions, using experiences to mitigate future threats, and formulating and implementing enterprise-level cybersecurity roadmaps. The program also explores the roles of regulation, policy developments, legal instruments and civil liberties.
Diploma in Cybersecurity Management (DCYM) Capstone: This is a practical-oriented program where learners are tasked with developing cybersecurity project management capabilities with the guidance of a mentor. Here, learners develop cybersecurity implementation frameworks. A project report is required at the end of the program.
Certificate in Cybersecurity Intelligence & Digital Forensics (CCDF): The Certificate in Cybersecurity Intelligence & Digital Forensics is structured to provide modern skills to those interested in digital forensics, digital intelligence and uncovering digital evidence. The program equips learners with broad analytical frameworks and prepares them to become competent cyber investigators.
Diploma in Cybersecurity Intelligence & Digital Forensics (DCDF) Capstone: This is a practical-oriented program where learners are tasked with developing capabilities in digital forensics, digital evidence and digital intelligence. Learners will have access to some tools and equipment to work throughout this program. A project report is required at the end of the program.