
Ticket Price
₦300,000.00 - ₦400,000.00

Human Capital Associates Global Consult Ltd (HCA)
View AgencyHuman Capital Associates Global Consult Ltd. is a training and consultancy firm accredited by the Nigeria Council for Management Development (NCMD). A Skill, Knowledge and Attitude Development outfit, particularly reputed for providing integrated professional training and development/consultancy services under a formidable team of experts in their respective fields of operation. We are a consortium of consultants from different disciplines with a wide range of experiences in engineering, accounting and finance, general management and administration, healthcare, supply chain management, information technology, marketing and sales, human resource management, health, safety, security and environment. At Human Capital Associates Global Consult, we offer a complete package to develop an organization's human capacity and advance the business with a wide range of our open and in-plant courses. At Human Capital Associates Global Consult, we offer a complete package to develop an organization’s human capacity and advance the business with a wide range of open and in-plant courses. Our local open courses are held across three major cities in Nigeria; Lagos, Port Harcourt and Abuja while our international courses are held monthly in London UK, Accra Ghana, Banjul Gambia, Nairobi Kenya, Dubai the United Arab Emirates, Zanzibar Tanzania, Kigali Rwanda, Johannesburg South Africa, and Cairo Egypt./ We leverage the vast experiences we have accumulated over the years to provide our clients with a competitive advantage through the provision of over 500 quality training and skills development courses.
Message OrganiserCyber Security and Data Protection Workshop
Monday, April 13, 2026 - Friday, April 17, 2026
Training and Workshop
Port Harcourt
Pakiri Hotel, Okwuruola Road, off Stadium Road, Port Harcourt, Nigeria
Event Overview
Program Overview
Course Overview:
This training provides participants with a practical and business-focused understanding of cyber security principles, data protection regulations, organizational risk management, and strategies for safeguarding digital assets. With cyber threats increasing globally—ransomware, phishing, insider threats, and data breaches—professionals need strong competencies to identify vulnerabilities, implement protection measures, and ensure regulatory compliance.
The course blends technical fundamentals with policy, governance, case studies, and hands-on exercises. It equips participants to strengthen organizational cyber resilience, manage incidents effectively, and comply with data protection laws such as GDPR, NDPR (Nigeria Data Protection Regulation), and other global standards.
For Whom:
This training is designed for IT managers, network administrators, system administrators, Data protection officers (DPOs), Compliance, risk management, and audit professionals, Cybersecurity analysts and security operations staff, Business managers and department heads, Legal, HR, and records management personnel. Anyone responsible for handling sensitive information, Professionals seeking foundational cybersecurity and data protection skills will benefit from this course.
Learning Objectives
At the end of this training, participants will be able to:
· understand key cyber security concepts, threat landscapes, and attack vectors.
· identify common vulnerabilities and apply preventive security controls.
· implement best practices for network, system, and endpoint security.
· understand data protection principles and legal requirements (GDPR, NDPR, etc.).
· conduct data classification, privacy impact assessments, and risk assessments.
· implement organizational policies on access control, encryption, and secure data handling.
· detect, respond to, and report cyber incidents effectively.
· develop incident response plans, business continuity, and disaster recovery frameworks.
· promote cyber awareness and build a security-conscious organizational culture.
· apply practical cybersecurity tools and scenarios to real-world environments.
Course Outline
DAY 1: Cyber Security Foundations & Threat Landscape
Module 1: Introduction to Cyber Security
· Defining cyber security and its importance
· Current global and regional threat landscape
· Cybercrime trends: ransomware, malware, APTs, insider threats
· Understanding confidentiality, integrity, and availability (CIA triad)
Module 2: Cyber Threats and Attack Techniques
· Social engineering and phishing techniques
· Network attacks (MITM, DDoS, spoofing)
· Endpoint and mobile device attacks
· Cloud security risks
· Case studies of recent breaches
Module 1: Cyber Security Controls and Defense Mechanisms
· Preventive, detective, and corrective controls
· Firewalls, IDS/IPS, endpoint protection, access control
· Patch management and vulnerability management, Encryption basics
Day 2 Data Protection, Privacy, and Compliance
Module 4: Organizational Cyber Security Policies
· Developing and implementing cybersecurity policies
· Password and authentication policies
· Secure email and internet usage
· Best practices for staff awareness and behaviour change
Module 5: Understanding Data Protection & Privacy Laws
· Overview of GDPR, NDPR, CCPA, and global data protection standards
· Roles and responsibilities: Controllers, Processors, DPOs
· Lawful basis for processing personal data
· Cross-border data transfer requirements
Module 6: Data Protection Principles
· Purpose limitation, minimization, accuracy, storage limitation
· Data subject rights and handling requests
· Consent management
· Records of processing activities (RoPA)
Day 3 Module 7: Data Classification and Handling
· Types of data: personal, sensitive, confidential
· Data lifecycle: collection, storage, sharing, retention, deletion
· Data classification and labeling
· Secure data handling procedures and encryption at rest/in transit
Module 8: Privacy Impact Assessments (PIA) & Risk Assessments
· Risk identification: threats, vulnerabilities, consequences
· Conducting DPIA/PIA
· Identifying high-risk processing activities
· Mitigation controls and compliance reporting
Day 4: Cyber Incident Response, Business Continuity &
Hands-On Activities
Module 9: Cyber Incident Response and Reporting
· What is a cyber incident?
· Incident detection and triage
· Incident response lifecycle
· Reporting obligations (GDPR/NDPR breach requirements)
· Working with CERT and regulatory authorities
Module 10: Business Continuity, Disaster Recovery & Cyber Resilience
· Building robust continuity plans, Backup strategies
· Disaster recovery procedures and testing
· Creating a cyber-resilient organization
Day 5 Module 11: Tools, Techniques & Practical Exercises
Hands-on: Identifying phishing attempts, Basic vulnerability scanning demo
· Password security testing
· Secure configuration review
· Introductions to SOC tools (SIEM, log analysis, endpoint monitoring)
Module 12: Developing an Enterprise Cyber Security & Data Protection Strategy
· Combining cybersecurity and data protection frameworks
· Governance structures and reporting lines
· Building a security awareness program
Training Methodology: Lectures, discussions, exercises, case studies, audio-visual aids will be used to reinforce these teachings/learning methods.

