This course introduces learners to the foundational principles of cybersecurity. It explores common cyber threats, attack vectors, and practical defense mechanisms. Students will gain a working knowledge of security best practices for personal, business, and organizational environments.
Single Course
Start learning with confidence.
Enjoy full access to all course content and features for 12 months.
Gold Lifetime
Enroll for free and enjoy lifetime access with the Gold Lifetime Membership.
Hitimu 365
Enjoy 1 year of full access with the Hitimu 365 Membership.
Course Objectives:
By the end of this course, learners will be able to:
- Understand the basic concepts of cybersecurity and digital threats.
- Identify different types of cyberattacks and how they work.
- Apply preventive measures to secure devices, networks, and data.
- Respond to basic security incidents and understand the importance of digital hygiene.
Kimani Mbogo
Instructor
About the instructor
Kimani wa Mbogo serves as an instructor at Hitimu Academy. As part of a diverse team of educators from across Africa and beyond, he helps deliver practical, high-quality education that empowers learners to grow, lead, and thrive in their fields.
Introduction to Cybersecurity
Lesson 1 of 3 within section Introduction to Cybersecurity.
You must enroll in this course to access course content.
Importance of Cybersecurity in the Digital Age
Lesson 2 of 3 within section Introduction to Cybersecurity.
You must enroll in this course to access course content.
Key Terms: Threats, Vulnerabilities, Exploits, and Risks
Lesson 3 of 3 within section Introduction to Cybersecurity.
You must enroll in this course to access course content.
Types of Cyber Threats
Malware: Viruses, Worms, Ransomware, and Trojans
Lesson 1 of 3 within section Types of Cyber Threats.
You must enroll in this course to access course content.
Phishing, Social Engineering, and Identity Theft
Lesson 2 of 3 within section Types of Cyber Threats.
You must enroll in this course to access course content.
DDoS Attacks and Insider Threats
Lesson 3 of 3 within section Types of Cyber Threats.
You must enroll in this course to access course content.
Cybersecurity Tools and Technologies
Firewalls and Antivirus Software
Lesson 1 of 3 within section Cybersecurity Tools and Technologies.
You must enroll in this course to access course content.
Lesson 2 of 3 within section Cybersecurity Tools and Technologies.
You must enroll in this course to access course content.
Multi-factor Authentication (MFA)
Lesson 3 of 3 within section Cybersecurity Tools and Technologies.
You must enroll in this course to access course content.
Securing Systems and Networks
Operating System Security (Windows, macOS, Linux)
Lesson 1 of 3 within section Securing Systems and Networks.
You must enroll in this course to access course content.
Lesson 2 of 3 within section Securing Systems and Networks.
You must enroll in this course to access course content.
Securing Wireless Networks
Lesson 3 of 3 within section Securing Systems and Networks.
You must enroll in this course to access course content.
Cyber Hygiene and Safe Practices
Password Management and Safe Browsing
Lesson 1 of 3 within section Cyber Hygiene and Safe Practices.
You must enroll in this course to access course content.
Software Updates and Patch Management
Lesson 2 of 3 within section Cyber Hygiene and Safe Practices.
You must enroll in this course to access course content.
Recognizing and Reporting Suspicious Activity
Lesson 3 of 3 within section Cyber Hygiene and Safe Practices.
You must enroll in this course to access course content.
Incident Response and Recovery
What to Do When You’re Hacked
Lesson 1 of 3 within section Incident Response and Recovery.
You must enroll in this course to access course content.
Steps in Incident Response
Lesson 2 of 3 within section Incident Response and Recovery.
You must enroll in this course to access course content.
Backups and Disaster Recovery Planning
Lesson 3 of 3 within section Incident Response and Recovery.
You must enroll in this course to access course content.
Cybersecurity in Organizations
Policies, Compliance, and Legal Aspects
Lesson 1 of 3 within section Cybersecurity in Organizations.
You must enroll in this course to access course content.
Role of Employees in Organizational Security
Lesson 2 of 3 within section Cybersecurity in Organizations.
You must enroll in this course to access course content.
Security Awareness Training
Lesson 3 of 3 within section Cybersecurity in Organizations.
You must enroll in this course to access course content.
Future of Cybersecurity
Emerging Threats (AI, IoT, Deepfakes)
Lesson 1 of 3 within section Future of Cybersecurity.
You must enroll in this course to access course content.
Lesson 2 of 3 within section Future of Cybersecurity.
You must enroll in this course to access course content.
Staying Up to Date in a Fast-Changing Landscape
Lesson 3 of 3 within section Future of Cybersecurity.
You must enroll in this course to access course content.