online
Beginner

Cybersecurity

Cybersecurity is at the core of every digital interaction we rely on today from online banking and cloud services to mobile apps, corporate networks, and government systems. Cyber threats have surged and grown more frequent, sophisticated, and damaging. Every module emphasizes practical application, ensuring you build the skills, confidence, and experience employers look for. By the end of the program, you will have mastered essential cybersecurity domains, including network security, ethical hacking, threat analysis, incident response, and security operations, and you will also understand how to identify vulnerabilities, secure systems, and defend organizations against real cyber threats.

Duration

8 Months

Modules

8

Rating

5.0 ⭐

Format

Online

Start Date

Feb 2026

cybersecurity

Course Price

KES 75,000

Prerequisites & Requirements

Here's what you should know before starting this course to get the most out of your learning experience.

Programming Knowledge

Required

  • Basic Computer Skills
  • Understanding of Networking fundamentals
  • Willingness to Learn & Practice
Technical Background

Helpful (But Not Required)

  • Prior coding experience
  • Understanding how websites or apps work
  • A university degree or Diploma
i
Equipment
  • A high-end laptop (a basic one works)
  • Good stable internet (even part-time)
  • Commit a few hours daily (classes & Practice)

Don’t Meet All Prerequisites?

We offer foundational modules and support resources to help you catch up. Contact our admissions team to discuss your background and learning goals.

Pricing & Payment Options

Self-Paced

KES 50,000

  • Recorded lessons
  • Projects
Most Popular
Mentored

KES 75,000

  • Live sessions
  • Mentorship
Premium

KES 115,000

  • Career coaching
  • Job placement support

Curriculum Overview

Ethical Hacking Fundamentals & Legal Considerations, Pen Testing Methodology (Recon, Scanning, Exploitation), Tools: Nmap, Metasploit, Burp Suite, Wireshark, Vulnerability Scanning & Reporting.
Security Operations Center, SIEM Tools & Log Analysis, Threat Hunting & Alert Tuning, Incident Response Lifecycle, Digital Forensics Fundamentals.
Cloud Platforms (AWS, Azure), Securing Cloud Environments, Shared Responsibility, Web Application Security (OWASP Top 10), Secure Development Practices (SSDLC).
Python Foundations for Cybersecurity, Networking, Web Requests & Automation, Packet Analysis, APIs & Cryptography, Automation, Penetration Testing & OSINT, Malware Analysis, Forensics.
Risk Management & Cybersecurity Policies, Compliance Standards: ISO 27001, GDPR, HIPAA, NIST, Building a Cybersecurity Program, Capstone Project, Defense Strategy, Career Prep: Resume Review, Interview Practice, career guidance

What Our Students Say

This course completely changed my career direction. I learned how to secure systems, analyze threats, and think like a cybersecurity professional. The skills I gained are already helping me stand out when applying for internships and entry-level roles.

Asher A.

Asher A.

Cybersecurity Student

What stood out for me was how practical the course was. We didn’t just learn theory, we worked with real tools like network scanners and security frameworks. The mentorship and support made learning cybersecurity feel achievable.

Ashley N.

Ashley N.

Cybersecurity Student

Before joining the Cybersecurity program, I had zero experience in tech. The hands-on labs and real-world attack simulations helped me understand how hackers think and how to stop them. I now feel confident pursuing a career in security operations

Aria w.

Aria w.

Cybersecurity Student

Frequently Asked Questions

No prior coding experience is required. though a basic understanding of computers and how apps work and a knowledge of networking will be helpful.
You will master essential cybersecurity domains, including network security, ethical hacking, threat analysis, incident response, and security operations, and you will also understand how to identify vulnerabilities, secure systems, and defend organizations against real cyber threats. .
The course runs for 8 months with flexible learning options including live sessions, recorded lessons, and hands-on projects.
Yes! Upon successful completion of all modules and projects, you'll receive a Somakodi Certificate of Completion that you can add to your resume and LinkedIn profile.
Yes. We provide CV reviews, interview preparation, career guidance and job placement support to help you transition into data roles.
With our self-paced option, there's no falling behind. If you're in the mentored program, our instructors will work with you to create a catch-up plan. We're committed to your success.