Cybersecurity & Networking – Study Programs

  • Network Security: Protecting the infrastructure of a network from unauthorized access, misuse, or theft.
  • Information Security: Ensuring the confidentiality, integrity, and availability of data.
  • Application Security: Protecting software applications from vulnerabilities and attacks.
  • Physical Security: Protecting hardware and physical facilities from physical threats.
  • LAN (Local Area Network): A network that connects computers within a limited area such as a residence, school, or office building.
  • WAN (Wide Area Network): A network that extends over a large geographical area.
  • PAN (Personal Area Network): A network for interconnecting devices centered around an individual person’s workspace.
  • Confidentiality: Ensuring that information is not accessed by unauthorized individuals.
  • Integrity: Ensuring that information is not altered by unauthorized individuals.
  • Availability: Ensuring that information and resources are available to authorized users when needed.
  • Malware: Software designed to disrupt, damage, or gain unauthorized access to systems.
  • Phishing: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
  • Denial of Service (DoS): Attacks that aim to make a machine or network resource unavailable to its intended users.
  • Man-in-the-Middle (MitM): Attacks where the attacker intercepts and potentially alters communication between two parties.
  • Firewalls: Systems designed to prevent unauthorized access to or from a private network.
  • Encryption: The process of encoding data to prevent unauthorized access.
  • Intrusion Detection Systems (IDS): Devices or software that monitor network traffic for suspicious activity.
  • Multi-Factor Authentication (MFA): Using two or more verification methods to gain access to a resource.

1. Cyber Security Fundamentals:

  • Definition: Cybersecurity involves protecting internet-connected systems, including hardware, software, and data, from cyberattacks.
  • Importance: Safeguards sensitive information, maintains privacy, and ensures the integrity and availability of data.

2. Key Concepts in Cyber Security:

  • Threats and Vulnerabilities:
    • Malware: Software designed to harm or exploit any programmable device or network.
      • Types include viruses, worms, Trojans, ransomware, spyware, and adware.
    • Phishing: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
    • Social Engineering: Manipulating individuals into divulging confidential information.
    • Denial of Service (DoS): Attacks that overwhelm systems, making services unavailable to users.
    • Man-in-the-Middle (MitM): Eavesdropping attacks where the attacker intercepts and relays messages between two parties.

  • Security Measures:
    • Firewalls: Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
    • Antivirus Software: Programs designed to detect and destroy malware.
    • Encryption: The process of converting information into a code to prevent unauthorized access.
    • Multi-Factor Authentication (MFA): Requires two or more verification methods to gain access to a resource.
    • Intrusion Detection Systems (IDS): Monitors network traffic for suspicious activity and issues alerts.
    • Intrusion Prevention Systems (IPS): Identifies and blocks potential threats in real-time.
  • Best Practices:
    • Regular software updates and patch management.
    • Strong, unique passwords and regular password changes.
    • Educating users on recognizing phishing attempts and other social engineering tactics.
    • Backing up data regularly.
  • Star: All nodes are connected to a central hub.
  • Bus: All nodes are connected to a single central cable.
  • Ring: Each node is connected to exactly two other nodes, forming a single continuous pathway.
  • TCP/IP (Transmission Control Protocol/Internet Protocol): The fundamental suite of protocols for internet communication.
  • HTTP/HTTPS (Hypertext Transfer Protocol/Secure): Protocols for transferring web pages.
  • FTP (File Transfer Protocol): Protocol for transferring files between systems.
  • SMTP (Simple Mail Transfer Protocol): Protocol for sending emails.
  • Router: A device that forwards data packets between computer networks.
  • Switch: A device that connects devices within a network and uses packet switching to forward data to its destination.
  • Hub: A basic networking device that connects multiple computers in a network but does not manage traffic.
  • Wi-Fi: A technology for wireless local area networking with devices based on the IEEE 802.11 standards.
  • Bluetooth: A technology for exchanging data over short distances.
  • VPN (Virtual Private Network): Extends a private network across a public network and enables users to send and receive data as if their devices were directly connected to the private network.
  • Network Segmentation: Dividing a network into multiple segments or subnets to improve security and performance.
  • Secure Socket Layer (SSL)/Transport Layer Security (TLS): Protocols for encrypting information over the internet.

1. Networking Fundamentals:

  • Definition: Networking refers to the interconnection of computing devices to share data and resources.
  • Components:
    • Devices: Routers, switches, hubs, modems, and network interface cards (NICs).
    • Media: Physical cables (e.g., Ethernet) and wireless technologies (e.g., Wi-Fi, Bluetooth).
    • Protocols: Rules and conventions for communication between network devices.
      • TCP/IP: The fundamental suite of protocols for the internet, includes protocols like HTTP, FTP, and SMTP.
      • DNS: Domain Name System, translates domain names to IP addresses.
      • DHCP: Dynamic Host Configuration Protocol, assigns IP addresses to devices on a network.
      • HTTP/HTTPS: Protocols for transferring web pages. HTTPS includes encryption for security.

2. Network Types:

  • Local Area Network (LAN): A network that spans a small geographic area, like a home or office.
  • Wide Area Network (WAN): A network that covers a large geographic area, such as a city, country, or global connections.
  • Personal Area Network (PAN): A network for personal devices, usually within a range of a few meters.
  • Metropolitan Area Network (MAN): A network that spans a city or large campus.

3. Network Topologies:

  • Star Topology: All devices connect to a central hub. If the hub fails, the network is inoperable.
  • Bus Topology: All devices share a common communication line. A failure in the line disrupts the entire network.
  • Ring Topology: Devices are connected in a circular format. Data travels in one direction.
  • Mesh Topology: Devices are interconnected, providing multiple pathways for data to travel.

4. Key Network Concepts:

  • IP Addressing: Unique identifiers for devices on a network.
    • IPv4: Uses 32-bit addresses, e.g., 192.168.1.1.
    • IPv6: Uses 128-bit addresses, designed to accommodate the growing number of devices, e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
  • Subnets: Divisions of an IP network, improving efficiency and security.
  • Routing: The process of forwarding data packets from one network to another using routers.
  • Switching: The process of moving data within a network using switches.

5. Securing Networks:

  • Firewalls: Both hardware and software firewalls monitor and control network traffic based on security rules.
  • Virtual Private Networks (VPNs): Secure connections over the internet, providing privacy and security.
  • Network Access Control (NAC): Policies to control which devices can connect to the network.
  • Security Information and Event Management (SIEM): Tools that provide real-time analysis of security alerts.

A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead verify anything and everything trying to connect to its systems before granting access.

A set of procedures an organization uses to detect, respond to, and recover from network security incidents.

The use of tools and technologies to continuously observe a network for performance issues, failures, and security breaches.

  • IoT Security: With the proliferation of Internet of Things devices, securing these devices has become critical.
  • Cloud Security: As more organizations move to cloud-based services, ensuring the security of data and applications in the cloud is vital.
  • AI and Machine Learning in Security: Leveraging AI and ML to detect anomalies and potential threats more effectively.

Emerging Trends in Cybersecurity and Networking:

  • Cloud Security: Protecting data and systems in cloud environments.
  • Internet of Things (IoT) Security: Addressing vulnerabilities in interconnected devices.
  • Artificial Intelligence (AI) in Security: Using AI for threat detection and response.
  • 5G Networks: Addressing security challenges and opportunities with next-generation wireless technology.

Cybersecurity and networking are foundational elements in modern technology. Cybersecurity protects systems and data from threats, while networking enables the connectivity and communication essential for the functioning of IT systems. Understanding these fundamentals is crucial for maintaining secure and efficient technological environments.


Awareness Lane

Below are the study programs and courses under this skill track. To proceed, tap on a study program below to apply to study at DevWorld Tech Academy.
1 session in DWTA is equal to 3 months.

Information Technology & Cybersecurity Fundamentals

Academic Certificate
1 session

Information Technology Fundamentals

This area covers the basic principles and concepts underlying information technology, including hardware, software, networks, and the internet.

Key Areas:

  • Hardware: Understanding the physical components of computers and other digital devices (e.g., CPU, memory, storage, peripherals).
  • Software: Knowledge of different types of software (system software, application software), and how they interact with hardware.
  • Networks: Basics of networking, including types of networks (LAN, WAN), protocols (TCP/IP), and internet infrastructure.
  • Cybersecurity: Understanding threats (e.g., viruses, malware), and protection methods (e.g., firewalls, encryption).

This is a comprehensive Information Technology and Cybersecurity course designed for a beginner student, spread over 3 months with classes 3 days per week for 2 hours each time.

The course is structured to cover fundamental concepts and practical skills necessary for an academic certificate.

Course Outline: Information Technology and Cybersecurity Fundamentals

  • Total Duration: 3 months
  • Weekly Schedule: 3 days per week
  • Class Duration: 2 hours per session

Week 1-2: Introduction to Information Technology

  • Day 1:
    • Introduction to IT
    • Overview of computer hardware and software
  • Day 2:
    • Operating Systems: Windows, Mac, and Linux
    • Basic computer maintenance and troubleshooting
  • Day 3:
    • Networking basics: LAN, WAN, and internet
    • Introduction to IP addresses and DNS

Week 3-4: Introduction to Cybersecurity

  • Day 1:
    • What is Cybersecurity?
    • Importance of cybersecurity in today’s world
  • Day 2:
    • Common cyber threats: viruses, malware, phishing, and ransomware
    • Case studies of major cybersecurity breaches
  • Day 3:
    • Basic cybersecurity practices: creating strong passwords, using antivirus software
    • Overview of cybersecurity tools

Week 5-6: Computer Networks and Security

  • Day 1:
    • Understanding network protocols and models (TCP/IP, OSI)
    • Network devices: routers, switches, firewalls
  • Day 2:
    • Network security concepts: firewalls, VPNs, IDS/IPS
    • Hands-on lab: setting up a simple network and configuring a firewall
  • Day 3:
    • Wireless network security
    • Securing home and small business networks

Week 7-8: Operating System Security

  • Day 1:
    • Securing Windows OS: User accounts, permissions, and updates
  • Day 2:
    • Securing Linux OS: File permissions, user management, and updates
    • Introduction to shell scripting for security automation
  • Day 3:
    • Securing Mac OS: System preferences, updates, and backups
    • Hands-on lab: Configuring security settings on different OS

Week 9-10: Web Security

  • Day 1:
    • Understanding web application security: OWASP Top 10
    • Introduction to HTTPS and SSL/TLS
  • Day 2:
    • Common web vulnerabilities: SQL injection, XSS, CSRF
    • Basic web security practices for users and developers
  • Day 3:
    • Hands-on lab: Analyzing web traffic with tools like Wireshark
    • Implementing basic web security measures

Week 11-12: Data Protection and Privacy

  • Day 1:
    • Importance of data protection and privacy
    • Introduction to data encryption
  • Day 2:
    • Data backup and recovery strategies
    • Hands-on lab: Implementing data encryption and backups
  • Day 3:
    • Overview of privacy laws and regulations (GDPR, CCPA)
    • Best practices for ensuring data privacy

Week 13-14: Ethical Hacking and Penetration Testing

  • Day 1:
    • Introduction to ethical hacking
    • Phases of penetration testing
  • Day 2:
    • Tools of the trade: Nmap, Metasploit, Burp Suite
    • Hands-on lab: Conducting a simple penetration test
  • Day 3:
    • Reporting and mitigating vulnerabilities
    • Ethical considerations and legal implications

Week 15-16: Capstone Project and Review

  • Day 1:
    • Introduction to the capstone project
    • Defining the project scope and objectives
  • Day 2:
    • Work on the capstone project (e.g., setting up a secure network, conducting a security audit)
  • Day 3:
    • Completing and presenting the capstone project
    • Review of key concepts and preparation for the final assessment

Course Materials

  • Textbooks:
    • “CompTIA IT Fundamentals+ (ITF+) Certification All-in-One Exam Guide”
    • “The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy”
  • Online Resources:
    • Cybersecurity courses on platforms like DWTA Online course platform.
    • Documentation and tutorials from Cisco, Microsoft, and Linux distributions

Assessment and Certification

  • Quizzes: Weekly quizzes to reinforce learning
  • Assignments: Hands-on labs and practical assignments
  • Capstone Project: Final project to apply the learned skills
  • Final Exam: Comprehensive exam covering all course topics

Upon successful completion of the course, students will receive an academic certificate in Information Technology and Cybersecurity.

This course structure ensures a balance between theoretical knowledge and practical skills, essential for beginners in the field of IT and cybersecurity.

1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)

  • – Premium Plan: Ghc 1500 per session (offline & online)
  • – Core Plan: Ghc 1500 per session (online only)

Tuition & Guidance Fees (billed per month)

  • – Premium Plan: Ghc 600 per month (offline & online)
  • – Core Plan: Ghc 600 per month (online only)

Information Technology and Cybersecurity Fundamentals


  • Class Duration: 2 hours per day
  • Total Duration: 3 months
  • Weekly Schedule: 3 days per week
  • Monday > 1:00 pm – 3:00 pm
  • Tuesday > 1:00 pm – 3:00 pm
  • Wednesday > 1:00 pm – 3:00 pm

or

  • Thursday > 3:10 pm – 5:10 pm
  • Friday > 3:10 pm – 5:10 pm
  • Saturday > 3:10 pm – 5:10 pm

Webmaster Security Administrator

Network Security, Database & Computer Programming

Professional Certificate
2 sessions

Tuition & Guidance Fees (billed per session)

  • – Premium Plan: Ghc 1890 per session (offline & online)
  • – Core Plan: Ghc 1890 per session (online only)

Tuition & Guidance Fees (billed per month)

  • – Core Plan: Ghc 700 per month (online only)
  • – Premium Plan: Ghc 700 per month (offline & online)
  • Class Duration: 2 hours per day
  • Weekly Schedule: 3 days per week
  • Monday > 3:10 pm – 5:10 pm
  • Tuesday > 3:10 pm – 5:10 pm
  • Wednesday > 3:10 pm – 5:10 pm

or

  • Thursday > 1:00 pm – 3:00 pm
  • Friday > 1:00 pm – 3:00 pm
  • Saturday > 1:00 pm – 3:00 pm

Expert Lane

Below are the study programs and courses under this skill track. To proceed, tap on a study program below to apply to study at DevWorld Tech Academy.
1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)

  • – Premium Plan: Ghc 2560 per session (offline & online)
  • – Core Plan: Ghc 2560 per session (online only)

Tuition & Guidance Fees (billed per month)

  • – Premium Plan: Ghc 860 per month (offline & online)
  • – Core Plan: Ghc 860 per month (online only)

Regular & Intensive Learning Option

  • Class Schedule:
    Morning Students – Monday to Thursday, 09:00 am – 03:00 pm
    Afternoon Students – Monday to Thursday, 03:30 pm – 08:00 pm
  • Teaching Method: Online & Offline / Online only (eg. Google meet video call)
  • Session Length: 1 session = 3 months
  • DWTA Qualification: Academic Certificate
  • CTVET’s National TVET Qualification Framework (NTVETQF): National Certificate II or Higher National Diploma (HND)
  • Tuition & Guidance Fees:
    • Ghc 2560 per session or
    • Ghc 860 per month

Slow-Paced & Relaxed Learning Option

  • Class Schedule:
    Weekend Evening Students – Friday to Sunday, 06:00 pm – 08:00 pm
  • Teaching Method: Online & Offline / Online only (eg. Google meet video call)
  • Session Length: 1 session = 3 months
  • CTVET’s National TVET Qualification Framework (NTVETQF): National Certificate II or Higher National Diploma (HND)
  • Tuition & Guidance Fees:
    • Ghc 2560 per session or
    • Ghc 860 per month

Cybersecurity Technician

Academic Certificate
1 sessions

Information Security Administrator

Academic Certificate
1 sessions

Information Security Analyst

Professional Certificate
3 sessions

Cybersecurity Analyst

Professional Certificate
3 sessions

IT Security Auditor

Professional Certificate
3 sessions

Network Security Engineer

Academic Diploma
4 sessions

Cyber Security Engineer

Academic Diploma
5 sessions

Malware Analyst

Academic Diploma
6 sessions

Ethical Hacker (Penetration and Vulnerability Tester)

Academic Diploma
6 sessions

Cyber Intelligence Analyst

Academic Diploma
7 sessions

Security Architect

Academic Diploma
8 sessions



Expert Lane

Below are the study programs and courses under this skill track. To proceed, tap on a study program below to apply to study at DevWorld Tech Academy.

1 session in DWTA is equal to 3 months.

Course Duration, Class Schedule & Tuition & Guidance Fees

>> Please choose a course or study program before, to see these details about the course.


list 30 role in Cybersecurity. Order these from entry level upwards. also are they all in the same departments and field. If not, what are their various deparments and fields?

Here’s a list of 30 roles in Cybersecurity, ordered from entry-level to more advanced positions:

Ordered List of Roles
Cybersecurity Technician
IT Support Specialist (Security Focus)
Information Security Analyst
Security Operations Center (SOC) Analyst
Cybersecurity Analyst
Malware Analyst
Network Security Engineer
Penetration Tester (Ethical Hacker)
Incident Response Specialist
Vulnerability Analyst
Threat Intelligence Analyst
Cloud Security Specialist
Security Compliance Analyst
Firewall Administrator
IT Security Auditor
Security Architect
Cybersecurity Consultant
Risk Management Specialist
Security Software Developer
Identity and Access Management (IAM) Specialist
Data Protection Officer
Security Awareness Trainer
DevSecOps Engineer
Application Security Engineer
Forensic Analyst
Chief Information Security Officer (CISO)
Cybersecurity Engineer
Network Security Architect
Security Program Manager
Cyber Risk Analyst

Departments and Fields
Cybersecurity: Most roles directly focus on protecting systems and data from threats.
IT Security: Involves managing security for IT infrastructure.
Compliance and Risk Management: Focuses on ensuring adherence to regulations and assessing risks.
Incident Response: Deals with responding to and managing security breaches.
Security Architecture: Involves designing secure systems and networks.

All these roles fall under the Cybersecurity department, but they specialize in different areas within the field, such as compliance, incident response, and security architecture.

Boost Lane

Below are the study programs and courses under this skill track. To proceed, tap on a study program below to apply to study at DevWorld Tech Academy.
1 session in DWTA is equal to 3 months.

1 session in DWTA is equal to 3 months.

Looking to upgrade for a promotion or for changing your career field or industry? Returning to work after a break and wanting to refresh your knowledge? Already proficient in tech but want to learn a new skill? Our Boost Lane courses are for you.

Evening & Weekend Lectures only
Thursdays & Fridays | 7:00 pm – 10:00pm
Saturdays | 8:00 am – 2:00 pm
Weekly Online Assignments to be submitted (Thursday and Friday evenings)

The teaching schedules are most favorable to High School or University Students, Workers, recent Graduates & Non-Workers. Also, this lane is recommended for Beginner, Intermediate & Advanced learners.

1 session in DWTA is equal to 3 months.

1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)
– Gold: Ghc 1640 per session (offline & online)
– Silver: Ghc 1450 per session (online only)

Tuition & Guidance Fees (billed per month)
– Gold: Ghc 700 per month (offline & online)
– Silver: Ghc 600 per month (online only)

Tuition & Guidance Fees (FREE no billing)
– Weekday & Weekend Students
Online Video and Reading Course Only – Ghc 0 | No real-time live streaming online or offline lectures | No grading, project or assignments | You can pay for final examinations, and get a certificate or diploma if you pass

Student admission to the Boost Lane is in batches (a minimum of 10 – 15 students are required to start each batch).

1 session in DWTA is equal to 3 months.

Admission Ongoing >> Next session for courses and study programs listed below starts on 4th September 2023

Cybersecurity

Professional Certificate (at least)
2 sessions

Cybersecurity Auditing, Python Programming, Cybersecurity Policy, Framework Guidelines Foundations, Risk Assessment & Management, Operating Systems, Network & Cloud Computing Fundamentals, Windows & Linux Command Line Business Continuity Planning, Threat Modeling, Vendor Risk Management, Acquisition Strategy, Personnel Security, Legal & Regulatory Compliance, Policies, Standards & Procedures, Attack Types & Difference, Basics of Cryptography, Networking Knowledge, Network Topologies, IP Terminology


DWTA Bootcamp

Bootcamp Admission Ongoing >> Some courses and study programs listed below have already started.

Preparing for a promotion? Returning to work? Switching careers? Well, DWTA’s Fast-paced and Slow-paced bootcamps provide the perfect crash courses to teach you the most essential, industry-required knowledge to get you up and running with any skill.

Weekdays: Fast-Paced (Monday – Friday | 8:00 am – 4:00 pm)
Weekends: Slow-Paced (Saturday | 8:00 am – 2:00 pm)
Weekly Online Assignments are submitted 24 hours before lecture time.

The teaching schedules are most favorable to University Students, Workers, recent Graduates & Non-Workers. Also, this lane is recommended for Intermediate & Advanced learners.

1 session in DWTA is equal to 3 months.

1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)
– Fast-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course
– Slow-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course

Tuition & Guidance Fees (billed per month)
– Fast-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course
– Slow-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course

Student admission to the Bootcamp Lane is in batches (a minimum of 5 – 10 students are required to start each batch).

Admission Ongoing >> Next session for courses and study programs listed below starts on 4th September 2023

DesignJenius Graphic Design & Web Design

Professional Certificate | Ghc 1700
7 Weeks

BECE/JHS Students Bootcamp (50% Discount)

Academic Certificate | Ghc 700
8 Weeks

Courses under this lane are for individuals who are aware that the future belongs to digital literates, and so are willing to upgrade themselves to gain some tech skills. From Zero (total novices) to Hero (beginners and intermediates).

Weekdays: Two (2) days per week | 4 hours per class
Weekends: Saturdays | 8:00 am – 2:00 pm
Weekly Online Assignments are submitted 24 hours before lecture time.

The teaching schedules are easily favorable to Workers, High School or University Students, recent Graduates & Non-Workers. This lane is recommended for Novice, Beginners, and Intermediate learners.

1 session in DWTA is equal to 3 months.

1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)
– Weekday Students: Online & Offline – Ghc 1640 | Online Only – Ghc 1450
– Weekend Students: Online & Offline – Ghc 1700 | Online Only – Ghc 1500

Tuition & Guidance Fees (billed per month)
 Weekday Students: Online & Offline – Ghc 700 | Online Only – Ghc 600
– Weekend Students: Online & Offline – Ghc 800 | Online Only – Ghc 700′

Tuition & Guidance Fees (FREE no billing)
– Weekday & Weekend Students
Online Video and Reading Course Only – Ghc 0 | No real-time live streaming online or offline lectures | No grading, project or assignments | You can pay for final examinations, and get a certificate or diploma if you pass.

Student admission to the Awareness Lane is every month.

Web Design, Computer Programming, Security & Database

Professional Certificate (at least)
2 sessions

User Interface (UI) Design, Computer Programming, Security & Database

Professional Certificate (at least)
2 sessions

Apply Now

User Interface (UI) Design, Computer Programming, Security & Database

Professional Certificate (at least)
2 sessions
Cybersecurity Analyst Cyber Intelligence Analyst Information Security Analyst: Network Security Engineer Cybersecurity Technician Cyber Security Engineer IT Security Auditor Security Architect Information Security Administrator Penetration and Vulnerability Tester Malware Analyst

Apply Now

Expert lane intensive study programs are best for individuals who see and desire a strong career and future in the tech industry. Taking you from Zero (total novices) to Hero (intermediates and advanced) in less time but with more theoretical & practical skills than other schools.

Weekday Lectures only (no weekends)
1st Session: that is the first 3 months (Five (5) days per week | 8:00 am – 4:00 pm)
2nd Session & Beyond: Three (3) days per week | 8:00 am – 4:00 pm
Projects and Assignments submitted as per the policy of each study program

The teaching schedules are most favorable to recent High School or University Graduates & Non-Workers. Also, this lane is recommended for Novice, Beginner, Intermediate & Advanced learners.

1 session in DWTA is equal to 3 months.

1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)
 Premium: Ghc 2400 per session (offline & online)
 Core: Ghc 1900 per session (online only)
 Free Basic: Ghc 0 per session (online only)

Tuition & Guidance Fees (billed per month)
 No monthly installment payments (but you can pay half at the beginning of the session and the remaining after 3 weeks)

Tuition & Guidance Fees (FREE no billing)
– Weekday & Weekend Students
Online Video and Reading Course Only – Ghc 0 | No real-time live streaming online or offline lectures | No grading, project, or assignments | You can pay for final examinations, and get a certificate or diploma if you pass.

Student admission to the Expert Lane is every 3 months.

Cybersecurity Analyst

Professional Certificate (at least)
3 sessions

Cyber Intelligence Analyst

Professional Certificate (at least)
3 sessions

Apply Now

Information Security Analyst

Professional Certificate (at least)
3 sessions

Apply Now

Network Security Engineer

Professional Certificate (at least)
3 sessions

Cybersecurity Technician

Professional Certificate (at least)
3 sessions

Apply Now

Cyber Security Engineer

Professional Certificate (at least)
3 sessions

Apply Now

IT Security Auditor

Professional Certificate (at least)
3 sessions

Security Architect

Professional Certificate (at least)
3 sessions

Apply Now

Information Security Administrator

Professional Certificate (at least)
3 sessions

Apply Now

Penetration and Vulnerability Tester

Professional Certificate (at least)
3 sessions

Malware Analyst

Professional Certificate (at least)
3 sessions

Apply Now

1 session in DWTA is equal to 3 months.

Looking to upgrade for a promotion or for changing your career field or industry? Returning to work after a break and wanting to refresh your knowledge? Already proficient in tech but want to learn a new skill? Our Boost Lane courses are for you.

Evening & Weekend Lectures only
Thursdays & Fridays | 7:00 pm – 10:00pm
Saturdays | 8:00 am – 2:00 pm
Weekly Online Assignments to be submitted (Thursday and Friday evenings)

The teaching schedules are most favorable to High School or University Students, Workers, recent Graduates & Non-Workers. Also, this lane is recommended for Beginner, Intermediate & Advanced learners.

1 session in DWTA is equal to 3 months.

1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)
– Gold: Ghc 1640 per session (offline & online)
– Silver: Ghc 1450 per session (online only)

Tuition & Guidance Fees (billed per month)
– Gold: Ghc 700 per month (offline & online)
– Silver: Ghc 600 per month (online only)

Tuition & Guidance Fees (FREE no billing)
– Weekday & Weekend Students
Online Video and Reading Course Only – Ghc 0 | No real-time live streaming online or offline lectures | No grading, project or assignments | You can pay for final examinations, and get a certificate or diploma if you pass

Student admission to the Boost Lane is in batches (a minimum of 10 – 15 students are required to start each batch).

1 session in DWTA is equal to 3 months.

Admission Ongoing >> Next session for courses and study programs listed below starts on 4th September 2023

Cybersecurity

Professional Certificate (at least)
2 sessions

Cybersecurity Auditing, Python Programming, Cybersecurity Policy, Framework Guidelines Foundations, Risk Assessment & Management, Operating Systems, Network & Cloud Computing Fundamentals, Windows & Linux Command Line Business Continuity Planning, Threat Modeling, Vendor Risk Management, Acquisition Strategy, Personnel Security, Legal & Regulatory Compliance, Policies, Standards & Procedures, Attack Types & Difference, Basics of Cryptography, Networking Knowledge, Network Topologies, IP Terminology

Preparing for a promotion? Returning to work? Switching careers? Well, DWTA’s Fast-paced and Slow-paced bootcamps provide the perfect crash courses to teach you the most essential, industry-required knowledge to get you up and running with any skill.

Weekdays: Fast-Paced (Monday – Friday | 8:00 am – 4:00 pm)
Weekends: Slow-Paced (Saturday | 8:00 am – 2:00 pm)
Weekly Online Assignments are submitted 24 hours before lecture time.

The teaching schedules are most favorable to University Students, Workers, recent Graduates & Non-Workers. Also, this lane is recommended for Intermediate & Advanced learners.

1 session in DWTA is equal to 3 months.

1 session in DWTA is equal to 3 months.

Tuition & Guidance Fees (billed per session)
– Fast-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course
– Slow-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course

Tuition & Guidance Fees (billed per month)
– Fast-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course
– Slow-Paced Students: Online & Offline – depends on the course | Online Only – depends on the course

Student admission to the Bootcamp Lane is in batches (a minimum of 5 – 10 students are required to start each batch).

Bootcamp Admission Ongoing >> Some courses and study programs listed below have already started.

DesignJenius Graphic Design & Web Design

Professional Certificate | Ghc 1700
7 Weeks

BECE/JHS Students Bootcamp (50% Discount)

Academic Certificate | Ghc 700
8 Weeks