Introduction to Cybersecurity

An introductory course designed to prepare you for the Cybersecurity bootcamp. Learn the building blocks of cybersecurity, networking & IT.

2025 Intakes in Progress

Full-time Remote

Start Date:
January 27th, 2025
Course Duration:
5 Weeks
Mode of Learning:
100% Online Classes | Mon - Fri 8 am - 5 pm E.A.T
Tuition Fee:
Ksh 40,000

Part-time Remote

Start Date:
January 27th, 2025
Course Duration:
11 Weeks
Mode of Learning:
100% Online Classes | Mon - Fri 6 pm - 9 pm E.A.T
Tuition Fee:
Ksh 40,000

Your pathway to a rewarding career in Cybersecurity starts here

Are you new to the world of cybersecurity as a professional, or just interested in getting started in this industry? This introductory course is for you.

Learners explore topics from cyber threats to cyber intelligence while gaining practical insight into governance, risk & compliance. At the end of the course, you will earn a certificate of completion from Moringa and be well-prepared to take up the professional certification exams for beginners such as the (ISC)², Network+, CompTIA A+ etc.

Course Details

Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks, unauthorized access, damage, or theft. It encompasses a wide range of technologies, processes, and practices designed to safeguard computers, servers, mobile devices, electronic systems, networks, and data from cyber threats.

If you are looking to start your career in cybersecurity from scratch you qualify. No one is left out!

  • High School Graduates: Ideal for recent high school graduates looking to explore and gain early experience in a promising field.
  • University Ongoing Students & Graduates: seeking to bridge the gap between academic knowledge and practical, job-ready skills in cybersecurity.
  • Professionals interested in changing their careers to cybersecurity.

  1. Have basic IT/computer skills.
  2. Proficiency in English – both spoken and written.
  3. Must have a computer or laptop with the following specs ( core i5 – i7, 8GB RAM, 500GB memory).
  4. Access to internet
  5. Must have a desire and curiosity to learn.

  1. Growing Demand for Cybersecurity Professionals: As cyber threats become more prevalent, there is a high demand for talent, leading to numerous job opportunities and career growth potential.
  2. Foundation for Further Specialization: Starting with cybersecurity fundamentals can pave the way for more specialized areas within the field, such as ethical hacking, threat intelligence, or security architecture.
  3. Global Relevance: Cybersecurity knowledge is applicable worldwide, making it easier to find job opportunities in various countries and industries.
  4. Career readiness: explore job trends and position yourself for a prospective job as the cybersecurity industry continues to grow.
  5. Upskill in a new field: Learn what cybersecurity is and its potential impact on you & understand the most common threats, attacks, and vulnerabilities. Also, gain insights into how businesses protect their operations from attacks.

If you are in search of a unique learning experience this is the place for you. We guarantee you will learn market-aligned skills through our practical and comprehensive curriculum.

  1. Practical hands-on learning
  2. Access to industry-relevant cybersecurity labs & projects
  3. Dedicated Technical mentor support
  4. Graduates earn a certificate upon completion of the course
  5. Access to industry networks through tech events, networking forums & the alumni community

Kickstart your journey to becoming a cybersecurity specialist

Get Started Now - Apply Here

Curriculum Overview

  • Course Overview
  • System configurations and installations
  • Onboarding

  • Basic components of computer systems
  • Operating Systems Infrastructure & architecture
  • Fundamentals of Networking

  • Governance
  • Standards and Best Practices
  • Privacy
  • Corporate Governance
  • Business Continuity Planning
  • Security Responsibility

  • Strategy in cybersecurity processes
  • The role of decision-makers in leading strategic planning efforts
  • Operational Design in Strategy development, Business and Security Strategy
  • The Enemy as a System
  • Information Environment (IE)
  • Information Superiority (IS)
  • Threat Intelligence and Cyber Threat Intelligence (CTI)
  • Learn the phases of the intelligence cycle
  • Understand the application of theories and hypotheses in analytical work

  • Cyber actors
  • Cyber criminal activities
  • Nature of cyber crime
  • Threat models – Cyber Kill Chain , Diamond Model in CTIl
  • Analytical techniques for correlating nexuses of activity
  • Social Engineering
  • Physical security and importance to information and cyber security

  • Incident Response Plan
  • System Security Plan

With the increasing reliance on technology, cybersecurity skills have become critical for organizational and individual safety.

Are you equipped with the relevant skills?

Career Opportunities

Get started on your journey in Cybersecurity