Cybersecurity is no longer a niche skill — it’s essential. Yet many aspiring defenders and ethical hackers in Africa face the same barriers: lack of practical labs, no guidance on safe testing, and few local training resources that match our context.
That’s why we built The Cyber Warrior Handbook at Nebitex: a weekly, hands-on curriculum that teaches offensive security from the ground up using accessible tools (Kali Linux, Metasploit, Metasploitable) — and delivers the outcomes employers actually want: reproducible reports, evidence-based deliverables, and a capstone project you can show on your portfolio.
What makes this different
Lab-first, not slide-first. Each module is a blog post with step-by-step labs you run in an isolated VM. No risky live testing — everything is performed in a safe environment you control.
Practical deliverables. Every week has concrete outputs (nmap scans, recon reports, exploit logs) that you can include in your portfolio.
African context. Examples and remediation steps consider constraints that SMEs across Nigeria and Africa face — limited budgets, legacy systems, and human factors.
Community & mentorship. Share your weekly submissions with the Cyber Warrior Africa WhatsApp group for peer review, mentor feedback, and networking.
The curriculum at a glance
The handbook is a 10-week progressive path:
Week 0 — Lab Setup & Baseline (Kali + Metasploitable)
Week 1 — Reconnaissance & Footprinting
Week 2 — Scanning & Enumeration
Week 3 — Metasploit Module Discovery & Safe Validation
Week 4 — Controlled Exploitation Concepts & Benign PoC
Week 5 — Post-Exploitation & Impact Analysis
Week 6 — Privilege Escalation Techniques
Week 7 — Web Application Testing (OWASP & Burp)
Week 8 — Reporting & Remediation
Week 9 — Mini Capstone (timed)
Week 10 — Final Capstone (graded, portfolio-ready)
Each post includes templates (ROE, report, evidence naming conventions), mentor checklists, and success criteria so you progress like a pro.
Who should follow this path?
Students and career-switchers who want practical experience.
SME owners who want to understand their risks and how to prioritize fixes.
Aspiring Red Teamers and Pen Testers who want a reproducible learning path.
Start today — how to plug in
Read the handbook (start here): https://nebitex.africa/the-cyber-warrior-handbook-entry-level-offensive-security-curriculum/
Join the Cyber Warrior Africa WhatsApp group to submit deliverables and get peer feedback: https://chat.whatsapp.com/Ht1eR2u46Ci59DnlnhpEVt?mode=ems_copy_c
Republish your capstone and best writeups to your GitHub / LinkedIn profile — we feature top projects on the Nebitex blog.
Top comments (0)