Complete Cybersecurity Bootcamp
Starting From $99.99
Chat on WhatsApp
Citichoice Institute · CCA Certification

Complete Cybersecurity Bootcamp : Fundamentals, Networking, Ethical Hacking, Penetration Testing and Security Operations

From zero to job-ready SOC Analyst or Pentester in 5 months. Master ethical hacking, network security, SIEM, and incident response through hands-on labs and real-world scenarios.

4.8 (1,240 reviews) 300+ 4 Months
Last updated: 13 March 2026 Available in: English
Complete Cybersecurity Bootcamp
Self-Paced Save $10.00
$99.99 $109.99

Starting price — see more plans below

7-Day Money-Back Guarantee Try the course risk-free. If it's not right for you, get a full refund within 7 days.

Business

Cybersecurity Training for Teams

Enrol multiple staff members and get tailored training with reporting, certificates, and flexible scheduling.

Dedicated account manager
Team progress dashboard
Volume discounts
Custom scheduling available
Request a Quote Chat on WhatsApp
Your Destination

Launch Your Career as a Cybersecurity Engineer

The Complete Cybersecurity Bootcamp at Citichoice Institute takes you from absolute beginner to a confident security professional through structured labs, real attack simulations, and guided career preparation. You will work hands-on with the same tools used by penetration testers, SOC analysts, and incident responders at top firms.

Complete Cybersecurity Bootcamp

What's included on this platform

Live Classes
Real-time instruction via Microsoft Teams with Q&A
Course Groups
Private peer communities with expert moderation
Social Feed
Progress sharing and achievement recognition
Direct Messages
Instructor & peer messaging with quick support
Project Library
Realistic datasets and personalised feedback
Certificates
Verified, employer-recognised digital badges

Start Dates & Learning Options Flexible Learning Options

Available Now
Self-Paced
Enrolling Now

Start immediately on enrolment

Start immediately and learn at your own pace. No deadlines or fixed schedule.

Most Popular
Live Online
Enrolling Now

Starts 16 March 2026

Enrolment closes 30 March 2026

Only 50 seats remaining

On Campus
Opening Soon

Starts 16 March 2026

Lagos, Nigeria

Only 9 seats remaining

Not ready yet? Get updates on upcoming cohorts and available spots. One email when it matters. No spam.

What You'll Gain 3 Benefits

Expert Instructors
Learn from certified security professionals with 8+ years of experience at firms including Deloitte, PwC, and leading financial institutions. Real practitioners, not just educators.
Hands-On Labs
Build a job-ready portfolio with 12+ graded projects across penetration testing, SOC analysis, forensics, and incident response using real-world threat scenarios and enterprise datasets.
Job Placement
Resume workshops tailored for SOC Analyst and Pentester roles, 1:1 mock technical interviews, and access to our exclusive 500+ partner cybersecurity job board.

Tools You'll Master 6 Tools

Kali Linux & Nmap
Set up and operate Kali Linux as your attack platform. Master Nmap for host discovery, port scanning, OS fingerprinting, and scripting engine automation.
Metasploit & Burp Suite
Use Metasploit to find, configure, and deploy exploits against vulnerable targets. Intercept and manipulate web traffic with Burp Suite to discover OWASP Top 10 vulnerabilities.
Wireshark & Zeek
Capture and dissect network traffic to detect cleartext credentials, malware beacons, C2 communications, and anomalies across enterprise network environments.
Splunk & Elastic
Ingest logs, write SPL queries, build real-time dashboards, and create alerting rules to detect brute-force attacks, privilege escalation, and suspicious behaviour.
Volatility & Autopsy
Acquire and analyse memory dumps and disk images. Extract running processes, artefacts, and IOCs from compromised systems following a legally defensible chain of custody.
Nessus & OpenVAS
Run authenticated vulnerability scans, interpret CVSS scores, eliminate false positives, and produce professional assessment reports with prioritised remediation guidance.

Course Curriculum 30 Modules · 167 Lessons · 23 Tests · 35 Assignments

8–12 hrs/week / week 4 Months Lifetime Access
Section Welcome & Orientation
1 Module 1: Welcome to the Course
Navigating the Citichoice Learning Platform
Understanding the CCA Certification Path and Bootcamp Structure
The Mindset of a Successful Cybersecurity Professional
Ethics, Legality, and the Hacker’s Code of Conduct
Define Your Cybersecurity Career Goals and Learning Schedule
Sign the Citichoice Ethical Hacking Agreement
Bootcamp Orientation and Expectations Knowledge Check
Introduction to Virtualization: Type 1 vs Type 2 Hypervisors
Installing and Configuring VirtualBox and VMware Workstation
Downloading and Installing Kali Linux
Setting Up an Exploitable Windows Target Virtual Machine
Configuring Virtual Networks for Safe Testing
Joining the Citichoice Discord Community and Networking with Peers
Verify Connectivity Between Your Attacker and Target Virtual Machines
Section Cybersecurity Fundamentals
The CIA Triad: Confidentiality, Integrity, and Availability
Authentication, Authorization, and Non-Repudiation
Introduction to Governance, Risk, and Compliance (GRC)
Understanding Security Policies, Standards, and Procedures
The Role of Security Awareness Training in Enterprise Defense
Classify Enterprise Assets Based on the CIA Triad
Information Security Core Concepts Quiz
Categorizing Threat Actors: Script Kiddies, Hacktivists, and APTs
Understanding Malware Types: Viruses, Worms, Trojans, and Ransomware
Social Engineering Tactics: Phishing, Vishing, and Baiting
Insider Threats and Accidental Data Breaches
The Cyber Kill Chain and MITRE ATT&CK Framework Overview
Analyze a Recent Major Data Breach and Identify the Threat Actor
Threat Landscape and Malware Identification Quiz
The History and Evolution of Cryptography
Symmetric vs Asymmetric Encryption Algorithms
Hashing Algorithms and Data Integrity (MD5, SHA-1, SHA-256)
Public Key Infrastructure (PKI) and Digital Certificates
Securing Data at Rest, in Transit, and in Use
Generate and Verify File Hashes Using Command Line Tools
Create a PGP Key Pair and Encrypt a Secret Message
Cryptography and Encryption Fundamentals Checkpoint
Section Computer Networking and Security
The OSI Model: Understanding the 7 Layers of Networking
The TCP/IP Suite and Data Encapsulation
IPv4 vs IPv6 Addressing Structures
Subnetting and Classless Inter-Domain Routing (CIDR)
MAC Addresses, Switches, and Address Resolution Protocol (ARP)
Routing Concepts and Default Gateways
Calculate Network Boundaries and Usable Hosts for a Given Subnet
OSI Model and Subnetting Mastery Quiz
Domain Name System (DNS) Architecture and Security
Dynamic Host Configuration Protocol (DHCP) Operations
Web Protocols: HTTP and HTTPS
File Transfer Protocols: FTP, SFTP, and TFTP
Remote Access Protocols: Telnet, SSH, and RDP
Email Protocols: SMTP, POP3, and IMAP
Capture and Analyze DNS Traffic Using Command Line Utilities
Network Protocols and Ports Identification Quiz
Firewall Architectures: Packet Filtering, Stateful, and Next-Gen
Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS)
Virtual Private Networks (VPNs) and IPsec
Network Address Translation (NAT) and Port Forwarding
Demilitarized Zones (DMZ) and Network Segmentation
Securing Wireless Networks: WPA2, WPA3, and Rogue Access Points
Design a Secure Network Topology Diagram for a Small Business
Network Defense Architecture Checkpoint
🧩 Project: Configure a Virtual pfSense Firewall and Establish Secure Routing Zones
Section Operating System Security
Navigating the Linux File System Hierarchy
Essential Linux Command Line Utilities (ls, cd, grep, awk)
Understanding Linux User and Group Permissions
Managing Processes and Services in Linux
Package Management and Software Updates
Basic Bash Scripting for Automation
Write a Bash Script to Automate System Log Archiving
Linux Command Line Proficiency Quiz
Linux Hardening Best Practices and CIS Benchmarks
Configuring Uncomplicated Firewall (UFW) and iptables
Securing SSH Configurations and Implementing Key-Based Authentication
Managing Sudo Privileges to Prevent Privilege Escalation
Auditing File Integrity with AIDE
Perform a Security Audit on a Vulnerable Linux Server
Linux Hardening and Security Administration Quiz
Windows OS Architecture and the Windows Registry
Windows Command Line and PowerShell Basics
Introduction to Windows Server and Domain Environments
Active Directory Core Concepts: Forests, Domains, and OUs
Managing Users, Groups, and Computers in Active Directory
Group Policy Objects (GPO) for Centralized Management
Deploy a Windows Server Virtual Machine and Promote it to a Domain Controller
Windows Architecture and Active Directory Quiz
Windows Hardening Techniques and Attack Surface Reduction
Configuring Windows Defender Firewall with Advanced Security
Implementing Least Privilege and User Account Control (UAC)
Securing Active Directory: Password Policies and LAPS
Analyzing Windows Event Logs for Suspicious Activity
Create and Enforce a Strict Password Policy using Group Policy
Windows Security and Log Analysis Checkpoint
🧩 Project: Deploy and Secure a Multi-Tier Active Directory Environment
Section Ethical Hacking and Penetration Testing
Understanding the Penetration Testing Execution Standard (PTES)
Rules of Engagement and Scoping a Penetration Test
Black Box, White Box, and Grey Box Testing Strategies
Legal Documentation: NDAs, MSAs, and SOWs
Draft a Rules of Engagement Document for a Fictional Client
Penetration Testing Frameworks and Legalities Quiz
Passive vs Active Reconnaissance Techniques
Open Source Intelligence (OSINT) Gathering
Querying WHOIS, DNS Records, and Certificate Transparency Logs
Search Engine Dorking and Discovering Exposed Assets
Harvesting Employee Information from Social Media and LinkedIn
Perform Passive Reconnaissance on a Public Company and Compile Findings
OSINT and Footprinting Checkpoint
Introduction to Network Scanning and Port States
Mastering Nmap: Host Discovery and Port Scanning Techniques
Nmap OS Fingerprinting and Service Version Detection
Using the Nmap Scripting Engine (NSE) for Vulnerability Detection
Enumerating SMB, FTP, and SSH Services
Web Directory Brute-Forcing with Gobuster and Dirb
Execute a Comprehensive Nmap Scan and Interpret the Output
Network Scanning and Nmap Mastery Quiz
Understanding the Common Vulnerability Scoring System (CVSS)
Navigating the National Vulnerability Database (NVD) and CVEs
Automated Vulnerability Scanning with Nessus and OpenVAS
Analyzing Vulnerability Scan Reports and Removing False Positives
Manual Vulnerability Verification Techniques
Run an Authenticated Nessus Scan on a Target VM and Export the Report
Vulnerability Management and CVSS Quiz
Introduction to Exploitation Frameworks: Metasploit Basics
Searching for Exploits Using SearchSploit and Exploit-DB
Understanding Bind Shells vs Reverse Shells
Exploiting Common Network Services and Misconfigurations
Windows Privilege Escalation Techniques
Linux Privilege Escalation Techniques
Post-Exploitation: Dumping Hashes and Establishing Persistence
Compromise a Vulnerable Machine and Obtain a Reverse Shell
Escalate Privileges from a Standard User to Root/SYSTEM
Exploitation and Privilege Escalation Knowledge Check
🧩 Project: End-to-End Box Compromise: Boot-to-Root Penetration Test
Understanding Web Application Architecture and HTTP Methods
Introduction to the OWASP Top 10 Security Risks
Intercepting Web Traffic with Burp Suite Community Edition
Exploiting SQL Injection (SQLi) Vulnerabilities
Cross-Site Scripting (XSS): Reflected, Stored, and DOM-based
Exploiting Broken Authentication and Session Management
Insecure Direct Object References (IDOR) and API Vulnerabilities
Configure Burp Suite Proxy and Intercept a Login Request
Extract Database Credentials Using Manual SQL Injection
OWASP Top 10 and Web Vulnerabilities Quiz
🧩 Project: Perform a Web Application Security Assessment on a Vulnerable Web App
Section Security Operations and Incident Response
The Role of a SOC Analyst (Tier 1, Tier 2, Tier 3)
Understanding SOC Metrics: MTTD and MTTR
Security Information and Event Management (SIEM) Concepts
Endpoint Detection and Response (EDR) Solutions
Threat Intelligence Platforms and Indicators of Compromise (IoCs)
Extract and Investigate IoCs from a Threat Intelligence Report
SOC Operations and Threat Intelligence Quiz
Introduction to Packet Capture Analysis
Navigating and Filtering Traffic in Wireshark
Analyzing TCP Handshakes and Connection Terminations
Detecting Cleartext Passwords and Unencrypted Protocols in PCAPs
Identifying Malware Beacons and Command & Control (C2) Traffic
Using Zeek and Suricata for Network Security Monitoring
Analyze a PCAP File to Determine the Source of a Malware Infection
Wireshark and Network Forensics Checkpoint
Installing and Configuring Splunk Enterprise
Ingesting Windows Event Logs and Syslog Data into Splunk
Mastering Splunk Search Processing Language (SPL) Basics
Writing Advanced SPL Queries to Detect Anomalous Activity
Creating Alerts for Failed Logins and Privilege Escalation
Building Real-Time Threat Monitoring Dashboards
Write SPL Queries to Identify Brute Force Attack Attempts
Splunk SPL and Log Analysis Mastery Quiz
🧩 Project: Design a Comprehensive Security Monitoring Dashboard in Splunk
The NIST Incident Response Lifecycle (Preparation, Detection, Containment, Recovery)
Creating an Incident Response Plan (IRP) and Playbooks
Triage: Assessing the Scope and Impact of an Incident
Containment Strategies: Network Isolation and Account Suspension
Eradication and Recovery Best Practices
Conducting Post-Incident Activities and Lessons Learned
Develop an Incident Response Playbook for a Ransomware Attack
Incident Response Lifecycle and Protocols Quiz
Introduction to Digital Forensics and the Chain of Custody
Order of Volatility in Evidence Collection
Acquiring Memory Dumps and Disk Images
Analyzing Memory Artifacts with Volatility Framework
Investigating Browser History, Prefetch Files, and Registry Keys
Extract Malicious Processes from a Memory Dump using Volatility
Digital Forensics and Evidence Handling Checkpoint
🧩 Project: Conduct a Forensic Investigation on a Compromised Workstation Image
Section Bringing It All Together
Reviewing the Client Scope and Rules of Engagement
Executing the Reconnaissance and Scanning Phases
Identifying and Exploiting Key Vulnerabilities
Pivoting Through the Network to Reach the Objective
Writing a Professional Penetration Test Report (Executive and Technical Summaries)
Draft the Executive Summary for Your Penetration Test Scenario
Setting Up the Blue Team Defense Environment
Monitoring the Network During an Active Red Team Attack
Detecting the Breach and Initiating the Incident Response Plan
Containing the Threat and Eradicating the Persistence Mechanisms
Generating the Incident Incident Report
Compile a Timeline of Attack Events Based on SIEM Logs
🧩 Project: Purple Team Exercise: Attack, Detect, and Defend
Section Building Your Professional Portfolio
Why a Portfolio is Crucial for Landing a Cybersecurity Job
Structuring a Case Study: Problem, Methodology, and Resolution
Sanitizing Data and Redacting Sensitive Information in Reports
Translating Technical Jargon into Business Value
Format Three Bootcamp Projects into Professional Case Studies
Setting Up a Professional GitHub Repository for Security Scripts
Writing Excellent README Files for Your Projects
Starting a Cybersecurity Blog to Share Your Journey
Publishing CTF Walkthroughs and Vulnerability Analyses
Publish Your First Technical Blog Post or Detailed GitHub Gist
🧩 Project: Deploy a Personal Cybersecurity Portfolio Website
Section Career Launch & Job Preparation
Tailoring Your Resume for SOC Analyst and Penetration Tester Roles
Highlighting Bootcamp Projects and Certifications on Your Resume
Optimizing Your LinkedIn Profile for Cybersecurity Recruiters
Networking Strategies and Attending Security Conferences (DefCon, BSides)
Submit Your Cybersecurity Resume for Peer and Instructor Review
Update Your LinkedIn Profile and Connect with 10 Industry Professionals
Understanding the Interview Process: HR Screening to Technical Rounds
Answering Common Security Fundamentals Questions
Navigating Scenario-Based Questions (e.g., ‘How would you handle a ransomware outbreak?’)
Demonstrating Your Thought Process During Whiteboard Sessions
Questions You Should Ask the Interviewer
Record a Video Answering Three Common Technical Interview Questions
Technical Interview Prep: Rapid Fire Knowledge Check
Understanding the Final Capstone Requirements and Deliverables
Planning Your Attack and Defense Strategy
Executing the Capstone Tasks Independently
Writing the Final Executive Summary and Presentation
Submit Final Capstone Proposal and Infrastructure Plan
🧩 Project: CCA Capstone: Full-Scale Enterprise Security Audit, Penetration Test, and Remediation Report
$99.99
From — 3 plan options

Real Projects You'll Build 6 Projects

Mentor Reviewed Portfolio
Vulnerability Assessment Report
Perform a comprehensive Nmap and Nessus scan on a simulated enterprise network and produce a prioritised remediation report with CVSS scores.
NMAP NESSUS CVSS
Boot-to-Root Penetration Test
Compromise a fully vulnerable target machine — from initial recon through exploitation to root flag capture — and document all findings professionally.
METASPLOIT PRIVESC REPORTING
Web Application Security Audit
Identify and exploit SQL Injection, XSS, IDOR, and broken authentication vulnerabilities on a purpose-built vulnerable web application using Burp Suite.
BURP SUITE OWASP SQLI
Splunk Security Dashboard
Ingest Windows Event Logs and Syslog data, write SPL queries to detect brute-force and privilege escalation, and build a real-time threat monitoring dashboard.
SPLUNK SPL SOC
Ransomware Incident Investigation
Investigate a simulated ransomware outbreak — analyse logs, identify IOCs, trace the attack timeline, and produce a full incident response report with remediation steps.
FORENSICS IR VOLATILITY
CCA Capstone: Enterprise Security Audit
An end-to-end challenge spanning reconnaissance, exploitation, detection, and incident response on a fully simulated enterprise environment. Your flagship portfolio piece.
CCA CERT ALL TOOLS FULL REPORT

Career Paths After This Programme 7 Roles

SOC Analyst (Tier 1–2)
$55,000 – $85,000 / year
SPLUNK SIEM IR
Junior Penetration Tester
$65,000 – $100,000 / year
METASPLOIT BURP NMAP
Cybersecurity Analyst
$60,000 – $95,000 / year
GRC NETWORK FORENSICS
Incident Responder
$60,000 – $95,000 / year
GRC NETWORK FORENSICS
Incident Responder
$70,000 – $110,000 / year
FORENSICS IR THREAT HUNT
Vulnerability Analyst
$60,000 – $90,000 / year
NESSUS CVSS NVD
Cloud Security Engineer
$90,000 – $140,000 / year
AWS AZURE IAM

Your Instructors

Justice Akorede
Lead Instructor
Justice Akorede
Lead Cybersecurity Instructor · CEH · OSCP
4.1 Rating
45 Reviews
3,526 Students
39 Courses

Justice  is a certified ethical hacker and offensive security practitioner with over 9 years of experience conducting penetration tests and building security programmes for financial institutions, telecom operators, and government agencies across West Africa. He holds CEH, OSCP, and CompTIA Security+ certifications and has trained over 2,000 security professionals. His teaching emphasises real attack-and-defense simulations over passive theory.

Student Success Stories 1 Stories

I had zero IT background when I enrolled. Six months later I was fielding offers from two banks for SOC Analyst roles. The Metasploit and Splunk labs were exactly what the interviewers tested me on — it was like I had seen the exam questions before."

AO
Adaeze Okonkwo
SOC Analyst · Access Bank · CCA Graduate
Professional (CCP)
Citichoice Certified Professional in Cybersecurity

Earn an industry-recognised, blockchain-verified certificate upon completing all requirements. Share it on LinkedIn with one click.

Blockchain Verified LinkedIn Ready Globally Recognised
Certificate Preview
Click to preview full certificate

Choose Your Plan

Intentionally Priced for Access, Not Exclusivity

Our conviction is simple: the biggest barrier to progress is not talent, it is access. These prices are deliberately set so that geography and income are never the reason someone misses a career opportunity.

Comparable programmes cost
$300.00 $1,500.00
We price our programs 60–80% lower
to make high-quality training more accessible.
Flex
Self-paced
Start anytime and learn at your own pace with lifetime access to all course materials.
$99.99 $109.99
SAVE $10.00

One-time payment · best value

Best For: Working professionals with irregular schedules who need maximum flexibility.
Lifetime access to pre-recorded content
Downloadable resources & datasets
Access to community forums
Direct messaging with instructors
Industry-recognised certificate
Campus
Self-paced + on campus
Face-to-face learning at our Lagos Tech Hub with hands-on instruction and peer networking.
$319.99 $359.99
SAVE $40.00

One-time payment · best value

Best For: Students who prefer the classroom and want in-person mentorship and peer networking.
Everything in Flex
Also included
Face-to-face instruction at Lagos Hub
Networking with campus peers
Computer & software provided
Lagos Tech Hub access
Job placement assistance
7-Day Money-Back Guarantee
Not satisfied with the online content within the first 7 days? We'll issue a full refund, no questions asked. Campus plan: refund applies before your first in-person session. Once physical facilities have been accessed, the seat reservation is non-refundable.

Learn in a Real Classroom Environment

See what your learning experience looks like at Citichoice.

Citichoice Campus
Business Training
Cybersecurity Training for Teams

Enrol multiple staff members at discounted rates with dedicated account management and custom scheduling.

Request a Quote
Business Training at Citichoice

Scholarship Opportunities 5 Available

We believe cost should never be the reason someone misses a career opportunity. That's why we offer a range of scholarships and funding options for qualified applicants.

Closed
Sponsored by Citichoice Foundation

Early Bird Scholarship

Apply early and secure discounted tuition for the upcoming cohort. Limited-time offer for fast action takers.

Up to 40% Tuition
Expired

All 50 seats claimed

Open
Sponsored by Citichoice Foundation

Tech Talent Scholarship

Awarded to high-performing applicants who demonstrate strong problem-solving ability in our entrance assessment.

Up to 100% Tuition
Ongoing

14 of 15 seats remaining

Open
Sponsored by Aviyah Foundation

Women in Tech Scholarship

Supporting more women to enter and thrive in tech. Get access to structured training, mentorship, and career opportunities.

Up to 100% Tuition
30 July 2026

28 of 50 seats remaining

Open
Sponsored by Citichoice Foundation

NYSC Tech Transition Scholarship

For corps members and recent graduates ready to pivot into tech. Gain practical, job-ready skills while preparing for your next career move.

Up to 60% Tuition
15 July 2026

10 of 25 seats remaining

Open
Sponsored by Citichoice Foundation

JAMB Excellence Scholarship

High-performing JAMB candidates can fast-track into tech with subsidised tuition. Start building in-demand skills without waiting for university admission.

Up to 70% Tuition
30 June 2026

19 of 30 seats remaining

Referral Programme

Know Someone Ready to Break Into Tech?

If you've been through this programme, or you just believe in accessible tech education, share it with someone who'd benefit. When they enrol, you earn a commission. No follower count needed. No sales experience required. Just a genuine recommendation.

Up to 30% commission per enrolment
30-day tracking : credited even if they enrol weeks later
Ready-made assets : banners, social posts, videos, course descriptions
Real-time dashboard showing your referrals and earnings
Multi-currency payouts : bank, mobile money, crypto, PayPal
Join the Referral Programme
Commission Tiers
15%
Starter
0–10 referrals
20%
Growth
11–50 referrals
Max
30%
Partner
50+ referrals
You start at 15% and tier up automatically as your referrals grow.
Still have questions? Our team is available Mon–Fri 9am–6pm WAT

Want to receive push notifications for all major on-site activities?