Training's, Seminars & Workshops

Cyforce Academy offers completely customization programs for your organization’s specific business challenges or leadership development needs.

Enroll today!

Course Bank

This Computer Programming Essentials: Web Design Techniques and Applications (1) Training Course is designed for:

  • Web Designers;
  • Senior Web Developers;
  • Junior Web Developers;
  • Desktop Publishers;
  • Web Writers;
  • Web Editors;
  • Computer Programmers;
  • Senior Web Designers;
  • Junior Web Designers;
  • Assistant Web Designers;
  • Graphic and Web Designers;
  • Front End Web Developers;
  • Front-End CSS Developers;
  • Associate Web Designer;
  • I.T Staff;
  • Those who are interested in Web Designing
  • Web Design Imperitives Introducing HTML (HyperText Markup Language)

By the conclusion of the specified learning and development activities, participants will be able to demonstrate a heightened understanding of the following concepts and issues:

Part 1: An Introduction to Web Design

  • The Internet and the Web;
  • Web Standards and Accessibility;
  • Information on the Web;
  • Web Browsers and Web Servers;
  • Internet Protocols;
  • Uniform Resource Identifiers and Domain Names;
  • HTML Overview;
  • Under the Hood of a Web Page;
  • Your First Web Page.

Part 2: Web Page Essentials: HTML Basics

  • Heading Element;
  • Paragraph Element;
  • Line Break and Horizontal Rule;
  • Block quote Element;
  • Phrase Elements;
  • Ordered List;
  • Unordered List;
  • Description List;
  • Special Entity Characters;
  • HTML Syntax Validation;
  • Structural Elements;
  • Anchor Element;
  • Practice with Hyperlinks;
  • E-Mail Hyperlinks.

Programming 3: Web Design Essentials

  • Design for Your Target Audience;
  • Website Organization;
  • Principles of Visual Design;
  • Design to Provide for Accessibility;
  • Use of Text;
  • Web Color Palette;
  • Use of Color;
  • Use of Graphics and Multimedia;
  • More Design Considerations;
  • Navigation Design;
  • Wireframes and Page Layout;
  • Fixed and Fluid Layouts;
  • Design for the Mobile Web;
  • Responsive Web Design;
  • Web Design Best Practices Checklist.

Part 4: Web Page Essentials: CSS (Cascading Style Sheets)

  • Cascading Style Sheets Overview;
  • CSS Selectors and Declarations;
  • CSS Syntax for Color Values;
  • Configure Inline CSS;
  • Configure Embedded CSS;
  • Configure External CSS;
  • CSS Selectors: Class, Id, and Descendant;
  • Span Element;
  • Practice with CSS;
  • CSS Syntax Validation.

Part 5: Web Graphics Styling Essentials

  • Web Graphics;
  • Image Element;
  • Image Hyperlinks;
  • Configure Background Images;
  • Position Background Images;
  • CSS3 Multiple Background Images;
  • The Favorites Icon;
  • Configure List Markers with CSS;
  • Image Maps.

Price Details:

N105,000.00 Only! Per Participant

Deal /Discounts

The course cost does not include living accommodation. However, delegates are treated with the following: Continuous snacks throughout the Event Days; Hot Lunch on Event Days; City Tour; Hand-outs; Stationery. We offer very attractive discount for groups of 3 and more people, from the same organisation, taking the same course. Courses are delivered in our Abuja Office


Dr. Joshua E.G

Vulnerabilities  and lack of necessary security knowledge and skills applicable to today’s technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.

Course Objectives

At the end of the course, the participants will be able to:

  • Security Investment and Measurement
  • Cyber Risk Management and Security Metrics
  • Enterprise Security Governance and Planning
  • Realistic Security
  • Effective Incident Response
  • Managing Operational Threat
  • Developing a Crisis Communications Strategy
  • Building an Insider Threat Program
  • External Dependency Management

Who Should Attend?

This course targets employees in the information technology department, managers, and all supervisors in all departments. The course also targets new start-ups that want to learn about information security to ensure their information is protected.

Course Content

Module 1: Introduction and Overview

  • Introduction
  • Significance of Information Security

Module 2: Information Security Governance

  • Information security governance
  • Significance of information security
  • Security management programs

Module 3: Risk Management

  • Introduction to information security risk management
  • Information security risk assessment
  • Information security risk analysis
  • Mitigation of information security risk
  • Continuous information security risk Monitoring

Module 4: Developing Information Security Strategy

  • Importance/significance of information security strategy
  • Factors to consider while developing Information security strategy
  • Information security Management Responsibilities

Module 5: Policies, procedures, standards and guidelines

  • Introduction and Liability
  • Policy Basics
  • Policy Lifecycle
  • Best Practices and Guidelines

Module 6: Information security technology

  • Introduction to information security technology
  • Trusted vs Untrusted technologies
  • VLANs
  • Information Encryptions

Module 7: Incident management

  • Introduction to Information Security incident management
  • Incident management response lifecycle preparation
  • Intrusion detection technologies and systems
  • Security incident response

Module 8: Business continuity and disaster recovery

  • Introduction to business continuity planning and disaster recovery
  • Business continuity phases
  • Disaster recovery
  • Recovery strategies

General Notes

This course is delivered by our seasoned trainers who have vast experience as expert professionals in the respective fields of practice. The course is taught through a mix of practical activities, theory, group works and case studies.

Training manuals and additional reference materials are provided to the participants.

Upon successful completion of this course, participants will be issued with a certificate.

We can also do this as tailor-made course to meet organization-wide needs. Contact us to find out more.


N135,000.00 Only! per Individual.


Our IT & Cyber Security Consultations

Learn how to protect and defend against cyber threats with cyber security training courses. Learning Tree’s comprehensive cyber security training curriculum includes specialized IT security training and general cyber security courses for all levels of your organization including the C-suite. With certifications.

+ Courses
error: Alert: Content is protected !!