Security System Design and Installation

Basic | Intermediate | Advanced

Course Overview

How vulnerable are your applications to security risks and threats? This course will help you identify vulnerabilities and monitor the health of your applications and systems. You’ll examine and implement secure code practices to prevent events like data breaches and leaks, and discover how practices like monitoring and observability can keep systems safe and secure. You will gain extensive knowledge on various practices, concepts, and processes for maintaining a secure environment, including DevSecOps practices that automate security integration across the software development lifecycle (SDLC), Static Application Security Testing (SAST) for identifying security flaws, Dynamic Analysis, and Dynamic Testing. You’ll also learn about creating a Secure Development Environment, both on-premise and in the cloud. You’ll explore the Open Web Application Security Project (OWASP) top application security risks, including broken access controls and SQL injections. Additionally, you will learn how monitoring, observability, and evaluation ensure secure applications and systems. You’ll discover the essential components of a monitoring system and how application performance monitoring (APM) tools aid in measuring app performance and efficiency. You’ll analyze the Golden Signals of monitoring, explore visualization and logging tools, and learn about the different metrics and alerting systems that help you understand your applications and systems. Through videos, hands-on labs, peer discussion, and the practice and graded assessments in this course, you will develop and demonstrate your skills and knowledge for creating and maintaining a secure development environment.

Course Outcome

After completing this course, students will know how to/have:

  • An understanding of top web application vulnerabilities
  • Defend against top web application vulnerabilities
  • Store passwords securely
  • Implement injection mitigation techniques
  • Understanding the limits of HTTPS and mitigation
  • Build modern access controls for multi-tenancy
  • Build a secure authentication mechanism
  • Implement modern security headers
  • Implement modern symmetric cryptographic storage
  • Implement modern asymmetric cryptography
  • Injection-safe user interface
  • Injection-safe server-side applications
  • Implement input validation and output encoding
  • Implement multi-layered CSRF and clickjacking defense

Learning Peeks

Course Duration

12 Weeks

Course Structure



Available Online/Offline

Recognized Certification

Earn a certification on completion

Flexible Schedules

Flexible study schedules


English Language

Training Days

Monday, Wednesday and Friday

Course Prerequisite

The following are required

ICT Fundamentals

Recommended course available: view course


₦150,000.00 ***installmental payment available for this course

Not so sure about this course? Book a free consultation

You may also like