Network & Security professionals work in various highly rewarding roles. In this course, you’ll learn how to design and create websites.

Duration: 12 weeks

Intakes: Jan,April,July,Oct

NETWORK SECURITY

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access. Network security consists of the policies and practices
monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

At Techsavanna Institute of Technology (TIT), will be offering the below for both entry , intermediate and expert level.

  •  Ethical Hacking.
  •  Network Security.
  •  IT Network Fundamentals.
  •  Deep Web.

Cyber Security.

  •  Penetration Testing.
  •  KALI Linux.

Fees: KES 70,000

INTAKE: MONTHLY INTAKE

Course Topics for Network & Security Prep (12 Weeks)

The 12 Weeks Network & Security Program will be offering the below for both entry, intermediate and expert level.In this class you will learn:

Network Security (Duration: 12 Weeks):

NETWORK AND CYBER SECURITY -COURSE OUTLINE

1 Introduction to Computer Networking and Security:
Computer Crime, Security and Computer Viruses
Ch.1 – Introduction
2 Introduction to Computer Networking and Security:
3 Cryptography:
Ch.2 – Conventional Encryption and Message Confidentiality

4

 

5.

 

Cryptography: Types

 

Ch.3 – Public-Key Cryptography and Message Authentication

6 Network Security Applications: Ch. 4 – Authentication Applications
7 Network Security Applications: Ch.5 – Electronic Mail Security
8 Network Security Applications: Ch.6 – IP Security
9 Network Security Applications: Ch.7 – Web Security
10 Ch.8 – Network Management Security
11. System Security: Ch.9 – Intruders and Viruses
System Security: Ch.10 – Firewalls
12.                Concepts of Certified Ethical Hacking
13.              Practical Test
Fred Kairu

Fred Kairu

Experienced Application Developer and Business IT guru with a demonstrated history (10years) ofworking in the Information Technology and services industry. Skilled in Database management tools andapplications, Micro Service Based Applications,Mission Critical Applications,Enterprise-level applicationconfiguration,scalabality and re-engineering,emerging technologies such as AI,AR,Enterprise Architecture,AgileCoach,DevOps,Containerisation,Saas and Paas,with a passion for robotics development.Also have the A’s andB’s of turning around a technology enterprise. Im as Strong engineering professional with a Master of Science(MSc) focused in Software Engineering from Jommo Kenyatta University of Agriculture and Technology amongmany other professional IT certifications

PROFESSIONAL SKILLS

  • Avid php 5.x , java developer and intermediate programmer in Ruby On Rails
  • Hands on Unix administration
  • Experience with deployment and consumption of web-services like SOAP and REST,
  • Configuration and scripting services from scratch on Linux, apache, nginx, mysql, using php and java
  • Familiarity with nimble, iterative web development
  • Excited by short time frames and high-stakes tech challenges
  • Highly flexible with rapidly-shifting needs and priorities
  • Familiarity with the LAMP stack with strong Object Oriented programming skills
  • Experience working with the YII MVC framework
  • Static and dynamic websites using Joomla CMS
  • Photoshop and Gimp (Linux) Completed Projects:
  • swimafrica.net (online swimming school check-in and mobile MIS )
  • co.ke -a property gallery for the kenyan market
  • laughindustry.co.ke(online event ticketing master)
  • com (ecommerce system)
  • Flyers, labels and designs with Photoshop and Gimp (Linux) Mobile Applications:
  • Farmers market (Android app for marketing farmers produce)
  • Kenya 360 (an Android app showcasing the Kenyan culture and geography)
  • Tatoo Gallery
  • A couple of other applications on android and an e-ticketing system on windows Phone Desktop Applications:
  • *Clinic MIS
  • A java desktop application for managing a clinic pharmacy ,doctor schedule, suppliers, laboratory schedules etc *TrafficGen Pro
  • A threaded Java application for driving traffic onto websites using referrals, proxies and user agents for maximizing hits, tested using the Selenium API
Apply Now

Network & Security professionals work in various highly rewarding roles. In this course, you’ll learn how to design and create websites.

Duration: 12 weeks

Intakes: Jan,April,July,Oct

Overview

NETWORK SECURITY

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access. Network security consists of the policies and practices
monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

At Techsavanna Institute of Technology (TIT), will be offering the below for both entry , intermediate and expert level.

  •  Ethical Hacking.
  •  Network Security.
  •  IT Network Fundamentals.
  •  Deep Web.

Cyber Security.

  •  Penetration Testing.
  •  KALI Linux.

Fees: KES 70,000

INTAKE: MONTHLY INTAKE

Curriculum

Course Topics for Network & Security Prep (12 Weeks)

The 12 Weeks Network & Security Program will be offering the below for both entry, intermediate and expert level.In this class you will learn:

Network Security (Duration: 12 Weeks):

NETWORK AND CYBER SECURITY -COURSE OUTLINE

1 Introduction to Computer Networking and Security:
Computer Crime, Security and Computer Viruses
Ch.1 – Introduction
2 Introduction to Computer Networking and Security:
3 Cryptography:
Ch.2 – Conventional Encryption and Message Confidentiality

4

 

5.

 

Cryptography: Types

 

Ch.3 – Public-Key Cryptography and Message Authentication

6 Network Security Applications: Ch. 4 – Authentication Applications
7 Network Security Applications: Ch.5 – Electronic Mail Security
8 Network Security Applications: Ch.6 – IP Security
9 Network Security Applications: Ch.7 – Web Security
10 Ch.8 – Network Management Security
11. System Security: Ch.9 – Intruders and Viruses
System Security: Ch.10 – Firewalls
12.                Concepts of Certified Ethical Hacking
13.              Practical Test
Teaching Team
Fred Kairu

Fred Kairu

Experienced Application Developer and Business IT guru with a demonstrated history (10years) ofworking in the Information Technology and services industry. Skilled in Database management tools andapplications, Micro Service Based Applications,Mission Critical Applications,Enterprise-level applicationconfiguration,scalabality and re-engineering,emerging technologies such as AI,AR,Enterprise Architecture,AgileCoach,DevOps,Containerisation,Saas and Paas,with a passion for robotics development.Also have the A’s andB’s of turning around a technology enterprise. Im as Strong engineering professional with a Master of Science(MSc) focused in Software Engineering from Jommo Kenyatta University of Agriculture and Technology amongmany other professional IT certifications

PROFESSIONAL SKILLS

  • Avid php 5.x , java developer and intermediate programmer in Ruby On Rails
  • Hands on Unix administration
  • Experience with deployment and consumption of web-services like SOAP and REST,
  • Configuration and scripting services from scratch on Linux, apache, nginx, mysql, using php and java
  • Familiarity with nimble, iterative web development
  • Excited by short time frames and high-stakes tech challenges
  • Highly flexible with rapidly-shifting needs and priorities
  • Familiarity with the LAMP stack with strong Object Oriented programming skills
  • Experience working with the YII MVC framework
  • Static and dynamic websites using Joomla CMS
  • Photoshop and Gimp (Linux) Completed Projects:
  • swimafrica.net (online swimming school check-in and mobile MIS )
  • co.ke -a property gallery for the kenyan market
  • laughindustry.co.ke(online event ticketing master)
  • com (ecommerce system)
  • Flyers, labels and designs with Photoshop and Gimp (Linux) Mobile Applications:
  • Farmers market (Android app for marketing farmers produce)
  • Kenya 360 (an Android app showcasing the Kenyan culture and geography)
  • Tatoo Gallery
  • A couple of other applications on android and an e-ticketing system on windows Phone Desktop Applications:
  • *Clinic MIS
  • A java desktop application for managing a clinic pharmacy ,doctor schedule, suppliers, laboratory schedules etc *TrafficGen Pro
  • A threaded Java application for driving traffic onto websites using referrals, proxies and user agents for maximizing hits, tested using the Selenium API