Courses we offer

College Of Continuing Education

 CPD 101: Mastering Academic & Professional Writing

Course Introduction:  

A rigorous, practice-driven certification that builds the ability to produce clear, evidence-based, audience-aware texts across academic genres (essays, literature reviews, research papers) and professional formats (emails, memos, reports, executive summaries), culminating in a mentoredcapstone and portfolio.

This couse is designed for senior undergraduates, graduate students, researchers, and working professionals seeking measurable gains in clarity, coherence, correctness, and citation integrity across contexts. This course delves into cutting-edge topics such as

  • AI-supported drafting and revision workflows,

  • Inclusive language and accessibility standards,

  • Research transparency and open science practices,

  • Data visualization in writing,

  • Ethics of authorship and citation in the age of generative tools etc.

Students will engage with collaborative drafting platforms, peer-review protocols, corpus and reference-management tools, and genre-transfer exercises that reframe the same content for scholarly and executive audiences.

 

Course Objectives: 

  • Equip learners to write with clarity, coherence, and correctness across academic and workplace genres, adapting voice, tone, and structure to varied audiences and purposes.

  • Build competency in research-driven writing, including source evaluation, ethical citation, synthesis, and argumentation within discipline-appropriate conventions.

  • Develop iterative writing processes—planning, drafting, peer review, revising, and editing—supported by feedback and reflection to achieve professional-quality documents.

  • Strengthen rhetorical decision-making by analyzing constraints and applying genre-specific conventions for memos, reports, briefs, proposals, and executive summaries.

  • Integrate quantitative and qualitative evidence into persuasive documents while maintaining accuracy, transparency, and ethical communication standards.

  • Utilize style guides and writing technologies (e.g., reference managers, collaboration tools, plain-language checkers) to improve efficiency, consistency, and compliance.

  • Cultivate reflective and collaborative practices to provide constructive feedback, edit in teams, and adapt writing for cross-disciplinary and multicultural contexts.

 

Course Learning Outcomes:

By the end of the course, learners will be able to:

  • Analyze rhetorical situations and genre conventions to determine audience, purpose, constraints, and appropriate style for academic and professional documents.

  • Plan and produce well-structured documents—including research-driven essays, proposals, memos, and executive summaries—that demonstrate clear thesis or purpose, logical organization, and reader-centered design.

  • Locate, evaluate, and synthesize sources; integrate quotations, paraphrases, data, and visuals; and document ethically using a field-appropriate citation style (e.g., APA, MLA, IEEE).

  • Apply iterative writing processes—outlining, drafting, peer review, revision, and editing—to improve clarity, coherence, and correctness at sentence and document levels.

  • Employ plain-language principles, tone control, and inclusive language to convey complex information accurately to specialist and non-specialist audiences.

  • Translate technical findings into actionable recommendations while explicitly stating assumptions, limitations, and risks to support informed decision-making.

  • Use writing technologies and collaboration platforms to manage references, version control, and document workflows; contribute effectively to team-authored documents.

  • Design reader-friendly documents with effective headings, lists, tables, and figures, ensuring alignment between visuals and narrative claims.

  • Edit for style and correctness, demonstrating command of grammar, punctuation, and mechanics consistent with professional standards.

  • Reflect on writing choices, justify rhetorical strategies, and articulate growth areas, using feedback and rubrics to set goals for continued improvement.

CPD 102 : Practical Research Methods & Data-Driven

Insights

Course Introduction:  

The Practical Research Methods & Data-Driven Insights certification course provides a comprehensive foundation in modern research methodology and analytic techniques essential for today’s evidence-based decision-making environments.

Designed for professionals and students across disciplines, the course builds expertise in designing research, collecting and analyzing data, and deriving actionable insights.

Participants will gain theoretical grounding and practical know-how, enabling them to produce reliable, insightful research findings suitable for academia, business, and industry.

This course will cover the cutting-edge topics but not limited to:

  • Advanced Research Design

  • Data Preparation & Cleaning

  • Statistical Methods & Modeling

  • Big Data Analytics & Machine Learning

  • Data Visualization & Storytelling

  • Feature Selection & Model Validation

  • Text Mining & Sentiment Analysis

  • Research Ethics & Data Integrity

  • Applied Case Studies

Students will engage in hands-on research projects, applying cutting-edge techniques to solve actual business, academic, or social problems, under the guidance of expert instructors and using industry-grade analytic tools. This applied approach ensures graduates can immediately contribute impactful, data-driven insights in their professional fields.

 

Course Objectives: 

  • Deepen understanding of diverse research designs and methodologies for robust evidence generation.

  • Enable critical appraisal and synthesis of academic literature in various fields.

  • Develop capacity to select and implement suitable quantitative, qualitative, and mixed-methods approaches.

  • Train students in crafting research questions, hypotheses, and proposals aligned with project goals.

  • Foster skills in ethically gathering, cleaning, and analyzing multiple data types.

    Teach advanced statistical, computational, and visualization methods for impactful research.

  • Build expertise in using software tools like R, Python, and specialized analytics packages.

  • Guide students to interpret and communicate insights to academic, business, and policy audiences.

  • Equip students with project management and collaborative research practices for timely project delivery.

  • Raise awareness about contemporary challenges, trends, and the impact of data-driven research in society.

 

course Learning Outcomes: 

  • Carry out independent research using advanced methodologies and tools.

  • Critically analyze existing literature and synthesize findings into actionable insights.

  • Design and execute robust research projects, including proposals and plans.

  • Select, justify, and apply appropriate sampling, data collection, and analysis methods.

  • Perform statistical and computational analysis, interpreting results accurately.

  • Construct and communicate clear narratives using data visualizations and reports.

  • Develop research findings that meet ethical standards and demonstrate data integrity.

  • Evaluate and resolve complex methodological challenges in applied settings.

  • Collaboratively manage multifaceted research projects using modern project management tools.

  • Contribute meaningful recommendations and solutions, grounded in data, to real-world problems.

CPD 103 : Ethical Hacking & Cybersecurity Practitioner Certification

Course Introduction:

The Ethical Hacking & Cybersecurity Practitioner Certification course is a comprehensive program designed to develop skilled professionals who can proactively defend organizations against emerging cyber threats by simulating real-world attack scenarios and penetration tests. Structured across a variety of modules, the course covers both foundational and advanced concepts, ranging from network security, vulnerability analysis, and system hacking, to more specialized domains such as cloud security, mobile platform exploits, and IoT vulnerabilities. A key emphasis is placed on hands-on, practical training where students engage in immersive labs, live cyber ranges, and simulated ethical hacking engagements to apply theoretical knowledge in realistic settings.

Several cutting edge topics are integrated into the curriculum to ensure learners stay ahead in a rapidly evolving threat landscape:

  • Artificial Intelligence in cyber-attacks and defense strategies

  • Advanced persistent threats (APTs), fileless malware, and post-exploitation techniques

  • Cloud computing and virtualization vulnerabilities

  • Blockchain security and next-generation cryptography methods

  • IoT device hacking and mobile platform infiltration

  • Exploitation frameworks, ransomware, and malware analysis using dynamic and behavioral techniques

By the end of the course, graduates are equipped with the expertise to assess, identify, and mitigate cyber risks, and are well-prepared for a globally recognized certification in ethical hacking and cybersecurity.

 

Course Objectives:

  • Understand and apply the principles of ethical hacking within organizational and legal frameworks.

  • Master the penetration testing process, including pre-engagement, reconnaissance, exploitation, reporting, and mitigation.

  • Identify and exploit common network, web application, and wireless vulnerabilities using industry-standard tools.

  • Demonstrate proficiency in malware analysis, including static, dynamic, and behavioral analysis.

  • Apply social engineering techniques to test organizational resilience and awareness.

  • Conduct advanced attacks using methods like SQL injection, session hijacking, DoS/DDoS, and mobile platform exploitation.

  • Assess and secure systems against advanced persistent threats (APTs) and post-exploitation tactics.

  • Utilize cryptographic methods and evaluate their effectiveness in real-world scenarios.

  • Organize and manage penetration testing engagements, including scoping, reporting, and presentation of findings.

  • Integrate AI-driven approaches and next-generation technologies to enhance cybersecurity posture.

 

Course Learning Outcomes:

  • Explain the role, scope, and ethical considerations of an ethical hacker and how it differs from malicious hacking.

  • Conduct professional vulnerability assessments of diverse environments using platforms such as Nmap, Metasploit, Wireshark, and others.

  • Identify, exploit, and recommend solutions for network, wireless, and web application flaws.

  • Analyze and interpret malware samples, recognizing and mitigating threats through appropriate security measures.

  • Apply social engineering techniques and articulate defense mechanisms against them.

  • Perform and document penetration tests, producing actionable, high-level management reports.

  • Implement secure coding practices and demonstrate security in software and database design.

  • Mitigate risks associated with mobile device and IoT vulnerabilities.

    Evaluate and improve existing cryptographic protections through practical exercises.

  • Work collaboratively on hands-on lab challenges and Capture the Flag (CTF) exercises to validate skills in a real-world environment.

QualityQuest: Excellence in Project Delivery

Course Introduction:

QualityQuest: Excellence in Project Delivery is a professional course designed for  students and industry professionals seeking mastery in delivering high-quality projects across diverse domains. In an era of complex project environments and rising stakeholder expectations, the ability to ensure excellence in every phase of project execution is a key differentiator for organizational success.

This course focuses on advanced project quality management frameworks, continuous improvement methodologies, risk-based quality planning, and effective stakeholder engagement. It integrates principles from Agile, Lean, Six Sigma, and PMI’s PMBOK to provide a holistic view of quality-driven project delivery. Participants will learn to embed quality into project lifecycles, measure performance against KPIs, and lead initiatives that consistently exceed client and organizational expectations.

.

Course Objectives:

  • Apply project quality management principles to plan, execute, and monitor high-impact projects.
  • Integrate continuous improvement and process optimization techniques such as Lean and Six Sigma.
  • Identify and mitigate quality-related risks to ensure consistent project success.
  • Lead quality assurance initiatives and foster a culture of excellence across project teams.

course Learning Outcomes: 

  • CLO1: Develop and implement project quality plans aligned with organizational and stakeholder goals.
  • CLO2: Analyze and apply continuous improvement strategies to optimize project outcomes.
  • CLO3: Assess and manage quality risks throughout the project lifecycle.

  • CLO4: Demonstrate leadership in promoting quality culture and ensuring sustainable project excellence.

Research Mastery: Methods & Best Practices

Course Introduction:

Research Mastery: Methods & Best Practices is a comprehensive course tailored for students and professionals aiming to deepen their research capabilities across academic and industry settings. This course equips learners with essential tools, frameworks, and methodologies required to conduct high-quality, ethical, and impactful research.

Participants will explore both quantitative and qualitative research methods, study design, data collection techniques, and analysis strategies. The course emphasizes critical thinking, ethical compliance, literature review synthesis, and the ability to communicate findings effectively. Whether preparing a thesis, publishing in journals, or contributing to evidence-based policy, this course helps students master the full research lifecycle with confidence and scholarly rigor.

Course Objectives:

  • Understand and apply a range of qualitative, quantitative, and mixed-method research designs.
  • Conduct literature reviews and formulate research questions grounded in existing knowledge.
  • Implement ethical research practices in study design, data collection, and reporting.
  • Analyze data using appropriate tools and communicate research findings effectively.

 course Learning Outcomes: 

  • CLO1: Design rigorous and ethical research studies aligned with disciplinary standards.
  • CLO2: Conduct critical literature reviews and articulate clear, researchable questions or hypotheses.
  • CLO3: Apply appropriate data collection and analysis methods using qualitative and/or quantitative techniques.
  • CLO4: Present and defend research findings through professional reports, presentations, or academic publications.

Network Security Architect: Building Resilient Systems

Course Introduction:

Network Security Architect: Building Resilient Systems is an advanced course tailored for postgraduate professionals aiming to specialize in the design and protection of secure network infrastructures. As cyber threats become more sophisticated, the role of network security architects is critical in ensuring system integrity, confidentiality, and availability across distributed and cloud-based environments.

This course provides in-depth knowledge of enterprise network security architecture, covering core concepts such as threat modeling, secure design principles, intrusion prevention, identity management, and zero-trust frameworks. Participants will learn to design scalable, resilient, and compliant network systems that withstand internal and external threats. The course balances theoretical understanding with hands-on experience through simulations, real-world scenarios, and architecture design projects.

Course Objectives:

  • Understand and apply the principles of secure network architecture and system hardening.
  • Design resilient, scalable network infrastructures using zero-trust and defense-in-depth models.
  • Analyze and mitigate network vulnerabilities, threats, and attacks in enterprise systems.
  • Integrate monitoring, incident response, and compliance strategies into network design.

 course Learning Outcomes: 

  • CLO1: Design secure network architectures that incorporate layered defense strategies and modern security models.
  • CLO2: Evaluate risks and implement technical controls to protect systems against evolving cyber threats.
  • CLO3: Configure and optimize security infrastructure (e.g., firewalls, IDS/IPS, VPNs) for resilience and performance.
  • CLO4: Demonstrate proficiency in aligning network security architecture with regulatory, operational, and business requirements.