Popular posts

Cybersecurity threats looming over Nigerian skyline

The Price of Security and the Consequence of Cyber Attacks in Nigeria

0
Unveiling the Hidden Costs of Digital Vulnerability in Africa's Largest Economy Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and...

I suspect someone is monitoring my Calls and SMS, Use these codes to STOP...

0
How To Cancel Call Divert/Forwarding On Android Phones Looking for how to cancel call divert or forwarding on Android phones? It is as simple as...

Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum

0
Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum { "@context": "https://schema.org", ...
The talk surrounding a "Tesla Pi Phone" or similar devices is mostly based on speculation

Tesla Pi Phone Speculation; Take with a Pinch of Salt

0
IMPORTANT INFORMATION Tesla has yet to make any formal announcements regarding the development of a smartphone. The talk surrounding a "Tesla Pi Phone" or similar...
Samson Dauda posing with Mr Olympia 2024 trophy

Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia Winner

0
Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia...
NITDA has partnered with Coursera, a leading online learning platform, to deliver high-quality cybersecurity education to participants

NITDA Launches Free Cybersecurity Training Program for Nigerian Youth

0
NITDA Launches Free Cybersecurity Training Program for Nigerian Youth ...
AI-powered cybersecurity threats overwhelming unprepared organisations

Many Organisations Unprepared for AI Cybersecurity Threats

0
Many Organisations Unprepared for AI Cybersecurity Threats ...
GRC

GRC Role: Some Interview Questions You Should Know

0
GRC in cyber security ensures there are clear rules (Governance), proactive identification and mitigation of risks (Risk Management), and adherence to regulations and standards (Compliance)
Aliko Dangote's wealth reaches unprecedented heights, soaring by N24 trillion in just 24 hours.

Aliko Dangote’s Wealth Skyrockets to Record-Breaking Heights

0
Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance - NIST, ISO 27001, SP 800-53 | Risk Management...
List of Schools and Departments at Federal University of Technology, Ikot Abasi, Akwa Ibom State

List of Schools and Departments at Federal University of Technology, Ikot Abasi, Akwa Ibom...

0
FUTIA is one of the Federal Universities of Technology in Nigeria that serves the South south region. Each geo-political zone in Nigeria has one of such universities.

Building Tomorrow’s Skills: A Strategic Approach to Future-Proof Career Learning in Nigeria

0
Navigating the Digital Landscape: Preparing for Nigeria's Tech-Driven Future Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance -...
N10 Billion Stolen from Hope PSBank

Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank

0
Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank { "@context": "https://schema.org", "@type":...
University of Uyo Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

Trends

NITDA has partnered with Coursera, a leading online learning platform, to deliver high-quality cybersecurity education to participants

NITDA Launches Free Cybersecurity Training Program for Nigerian Youth

0
NITDA Launches Free Cybersecurity Training Program for Nigerian Youth ...
Aliko Dangote's wealth reaches unprecedented heights, soaring by N24 trillion in just 24 hours.

Aliko Dangote’s Wealth Skyrockets to Record-Breaking Heights

0
Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance - NIST, ISO 27001, SP 800-53 | Risk Management...

Building Tomorrow’s Skills: A Strategic Approach to Future-Proof Career Learning in Nigeria

0
Navigating the Digital Landscape: Preparing for Nigeria's Tech-Driven Future Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance -...
Cybersecurity threats looming over Nigerian skyline

The Price of Security and the Consequence of Cyber Attacks in Nigeria

0
Unveiling the Hidden Costs of Digital Vulnerability in Africa's Largest Economy Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and...
AI-powered cybersecurity threats overwhelming unprepared organisations

Many Organisations Unprepared for AI Cybersecurity Threats

0
Many Organisations Unprepared for AI Cybersecurity Threats ...
Microsoft security expert presenting AI security challenges at ISC2 conference

Navigating the AI Security Landscape: Insights from Microsoft’s Expert

0
Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance – NIST, ISO 27001, SP 800-53 | Risk Management | Threat...
N10 Billion Stolen from Hope PSBank

Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank

0
Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank { "@context": "https://schema.org", "@type":...

Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum

0
Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum { "@context": "https://schema.org", ...
Samson Dauda posing with Mr Olympia 2024 trophy

Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia Winner

0
Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia...
QR code with warning symbol illustrating cybersecurity threat

QR Code Scams: A Growing Cybersecurity Threat in 2024

0
QR Code Scams: A Growing Cybersecurity Threat in 2024 ...
Tech professional engaged in continuous learning and skill development

Tech Career Success: Passion and Continuous Learning as the Foundation

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Tech Career Success: Passion and Continuous Learning as the Foundation", "author": { "@type": "Person", "name": "Destiny...
Education in Today's Digital Age: Leveraging AI-Powered Tools for Enhanced Learning

Education in Today’s Digital Age: Leveraging AI-Powered Tools for Enhanced Learning

0
Education in Today's Digital Age: Leveraging AI-Powered Tools for Enhanced Learning ...
How Bloggers Can Earn Payout From Facebook

Meta Monetisation: How Bloggers Can Earn Payout From Facebook

1
Bloggers earn more money from Meta than content creators What is Meta Audience Network? Meta Audience Network allows publishers and bloggers to monetize their content by...
Smartphone displaying app update notification

App Updates: Your Secret Weapon for Security and Peak Performance

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Keeping Your Apps Sharp: Why Regular Updates Matter for Security and Performance", "author": { ...
XDR - A Comprehensive Security Solution

XDR: The Essential Tool for Securing Your Enterprise Network

0
In today's rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated, leaving many organisations struggling to keep pace. Enter Extended Detection and Response...
Hidden Dangers of 'Free' Digital Services

The Hidden Dangers of ‘Free’ Digital Services: What You Need to Know

0
The Hidden Dangers of 'Free' Digital Services: What You Need to Know ...
Why Saving Emergency Contacts Could Save a Life

Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide

0
Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide ...

Insights

Cybersecurity threats looming over Nigerian skyline

The Price of Security and the Consequence of Cyber Attacks in Nigeria

0
Unveiling the Hidden Costs of Digital Vulnerability in Africa's Largest Economy Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and...

I suspect someone is monitoring my Calls and SMS, Use these codes to STOP...

0
How To Cancel Call Divert/Forwarding On Android Phones Looking for how to cancel call divert or forwarding on Android phones? It is as simple as...

Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum

0
Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum { "@context": "https://schema.org", ...
The talk surrounding a "Tesla Pi Phone" or similar devices is mostly based on speculation

Tesla Pi Phone Speculation; Take with a Pinch of Salt

0
IMPORTANT INFORMATION Tesla has yet to make any formal announcements regarding the development of a smartphone. The talk surrounding a "Tesla Pi Phone" or similar...
Samson Dauda posing with Mr Olympia 2024 trophy

Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia Winner

0
Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia...
NITDA has partnered with Coursera, a leading online learning platform, to deliver high-quality cybersecurity education to participants

NITDA Launches Free Cybersecurity Training Program for Nigerian Youth

0
NITDA Launches Free Cybersecurity Training Program for Nigerian Youth ...
AI-powered cybersecurity threats overwhelming unprepared organisations

Many Organisations Unprepared for AI Cybersecurity Threats

0
Many Organisations Unprepared for AI Cybersecurity Threats ...
GRC

GRC Role: Some Interview Questions You Should Know

0
GRC in cyber security ensures there are clear rules (Governance), proactive identification and mitigation of risks (Risk Management), and adherence to regulations and standards (Compliance)
Aliko Dangote's wealth reaches unprecedented heights, soaring by N24 trillion in just 24 hours.

Aliko Dangote’s Wealth Skyrockets to Record-Breaking Heights

0
Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance - NIST, ISO 27001, SP 800-53 | Risk Management...
List of Schools and Departments at Federal University of Technology, Ikot Abasi, Akwa Ibom State

List of Schools and Departments at Federal University of Technology, Ikot Abasi, Akwa Ibom...

0
FUTIA is one of the Federal Universities of Technology in Nigeria that serves the South south region. Each geo-political zone in Nigeria has one of such universities.

Building Tomorrow’s Skills: A Strategic Approach to Future-Proof Career Learning in Nigeria

0
Navigating the Digital Landscape: Preparing for Nigeria's Tech-Driven Future Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance -...
N10 Billion Stolen from Hope PSBank

Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank

0
Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank { "@context": "https://schema.org", "@type":...
University of Uyo Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

Trends

NITDA has partnered with Coursera, a leading online learning platform, to deliver high-quality cybersecurity education to participants

NITDA Launches Free Cybersecurity Training Program for Nigerian Youth

0
NITDA Launches Free Cybersecurity Training Program for Nigerian Youth ...
Aliko Dangote's wealth reaches unprecedented heights, soaring by N24 trillion in just 24 hours.

Aliko Dangote’s Wealth Skyrockets to Record-Breaking Heights

0
Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance - NIST, ISO 27001, SP 800-53 | Risk Management...

Building Tomorrow’s Skills: A Strategic Approach to Future-Proof Career Learning in Nigeria

0
Navigating the Digital Landscape: Preparing for Nigeria's Tech-Driven Future Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance -...
Cybersecurity threats looming over Nigerian skyline

The Price of Security and the Consequence of Cyber Attacks in Nigeria

0
Unveiling the Hidden Costs of Digital Vulnerability in Africa's Largest Economy Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and...
AI-powered cybersecurity threats overwhelming unprepared organisations

Many Organisations Unprepared for AI Cybersecurity Threats

0
Many Organisations Unprepared for AI Cybersecurity Threats ...
Microsoft security expert presenting AI security challenges at ISC2 conference

Navigating the AI Security Landscape: Insights from Microsoft’s Expert

0
Author: Destiny Young, Tech Infrastructure, IT Operations & Cybersecurity Engineer | Privacy Compliance and Governance – NIST, ISO 27001, SP 800-53 | Risk Management | Threat...
N10 Billion Stolen from Hope PSBank

Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank

0
Cyber Heist Rocks Nigerian Banking: N10 Billion Stolen from Hope PSBank { "@context": "https://schema.org", "@type":...

Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum

0
Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum { "@context": "https://schema.org", ...
Samson Dauda posing with Mr Olympia 2024 trophy

Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia Winner

0
Who is Samson Dauda? The Inspiring Journey of the 2024 Mr Olympia...
QR code with warning symbol illustrating cybersecurity threat

QR Code Scams: A Growing Cybersecurity Threat in 2024

0
QR Code Scams: A Growing Cybersecurity Threat in 2024 ...
Tech professional engaged in continuous learning and skill development

Tech Career Success: Passion and Continuous Learning as the Foundation

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Tech Career Success: Passion and Continuous Learning as the Foundation", "author": { "@type": "Person", "name": "Destiny...
Education in Today's Digital Age: Leveraging AI-Powered Tools for Enhanced Learning

Education in Today’s Digital Age: Leveraging AI-Powered Tools for Enhanced Learning

0
Education in Today's Digital Age: Leveraging AI-Powered Tools for Enhanced Learning ...
How Bloggers Can Earn Payout From Facebook

Meta Monetisation: How Bloggers Can Earn Payout From Facebook

1
Bloggers earn more money from Meta than content creators What is Meta Audience Network? Meta Audience Network allows publishers and bloggers to monetize their content by...
Smartphone displaying app update notification

App Updates: Your Secret Weapon for Security and Peak Performance

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Keeping Your Apps Sharp: Why Regular Updates Matter for Security and Performance", "author": { ...
XDR - A Comprehensive Security Solution

XDR: The Essential Tool for Securing Your Enterprise Network

0
In today's rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated, leaving many organisations struggling to keep pace. Enter Extended Detection and Response...
Hidden Dangers of 'Free' Digital Services

The Hidden Dangers of ‘Free’ Digital Services: What You Need to Know

0
The Hidden Dangers of 'Free' Digital Services: What You Need to Know ...
Why Saving Emergency Contacts Could Save a Life

Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide

0
Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide ...

Tech Career Success: Passion and Continuous Learning as the Foundation

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Tech Career Success: Passion and Continuous Learning as the Foundation", "author": { "@type": "Person", "name": "Destiny...

App Updates: Your Secret Weapon for Security and Peak Performance

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Keeping Your Apps Sharp: Why Regular Updates Matter for Security and Performance", "author": { ...

The Hidden Dangers of ‘Free’ Digital Services: What You Need to...

0
The Hidden Dangers of 'Free' Digital Services: What You Need to Know ...

Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide

0
Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide ...

Samsung Galaxy S24 Ultra: The Ultimate Flagship Smartphone

0
Samsung Galaxy S24 Ultra: The Ultimate Flagship Smartphone | Destiny Young { "@context": "https://schema.org", "@type": "BlogPosting", "headline":...

Apple iPhone 16 Pro Max: The Ultimate Flagship Smartphone

0
Apple iPhone 16 Pro Max: The Ultimate Flagship Smartphone ...

Google Pixel 9 Pro XL: The Ultimate Flagship Smartphone

2
{ "@context": "https://schema.org", "@type": "Article", "headline": "Google Pixel 9 Pro XL: The Ultimate Flagship Smartphone", "author": { ...

iOS 18’s Satellite Messaging: A Communication Revolution

0
iOS 18's Satellite Messaging: A Communication Revolution ...

Crafting a Robust Cybersecurity Incident Strategy for Your Business

0
Crafting a Robust Cybersecurity Incident Strategy for Your Business ...

How Digital Infrastructure Can Transition Small Businesses Through The Challenges of...

0
Author: Destiny Young, Cybersecurity Leader | Tech Infrastructure & IT Operations Engineer | Digital Innovation Strategist | Tech Mentor | Author | Chartered Manager and...

NITDA Launches Free Cybersecurity Training Program for Nigerian Youth

0
NITDA Launches Free Cybersecurity Training Program for Nigerian Youth ...

Nigerian Government Introduces 15 New Mandatory Skills For Students In New...

0
Nigerian Government Introduces 15 New Mandatory Skills For Students In New Educational Curriculum { "@context": "https://schema.org", ...

The Changing Landscape of Privacy and Data Protection: New Laws and...

0
The Changing Landscape of Privacy and Data Protection: New Laws and Evolving User Expectations By Destiny Young, a Tech Infrastructure, IT Operations and  Cybersecurity Engineer United States: A...

The Hidden Danger of Malicious USB Cables: Protecting Yourself from Data...

0
In a recent incident in Nigeria, government organisations were targeted with USB drives containing the PlugX malware, a tool typically used by Chinese government hackers.

Meta Monetisation: How Bloggers Can Earn Payout From Facebook

1
Bloggers earn more money from Meta than content creators What is Meta Audience Network? Meta Audience Network allows publishers and bloggers to monetize their content by...

Nigerian content creators to earn through Facebook, Instagram June 2024

1
Clegg expressed gratitude to President Tinubu for facilitating an executive order crucial to the landing of Meta-backed deep-sea cable infrastructure in Nigeria.

How to share high-quality photos on WhatsApp

0
Keep in mind that selecting HD before sending a photo won't change the settings for WhatsApp, so subsequent images you send will default to standard quality. You have to select HD each time you want to send a high-quality photo. 

X lowers the condition to pay Twitter users, it is now...

1
X’s owner, Elon Musk, added a condition to the new policy, saying that only impressions from verified accounts would count for the ad revenue-sharing program. He said that this was to prevent scammers from using bots to inflate their views. 
Tech professional engaged in continuous learning and skill development

Tech Career Success: Passion and Continuous Learning as the Foundation

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Tech Career Success: Passion and Continuous Learning as the Foundation", "author": { "@type": "Person", "name": "Destiny...
Smartphone displaying app update notification

App Updates: Your Secret Weapon for Security and Peak Performance

0
{ "@context": "https://schema.org", "@type": "Article", "headline": "Keeping Your Apps Sharp: Why Regular Updates Matter for Security and Performance", "author": { ...
Hidden Dangers of 'Free' Digital Services

The Hidden Dangers of ‘Free’ Digital Services: What You Need to Know

0
The Hidden Dangers of 'Free' Digital Services: What You Need to Know ...
Why Saving Emergency Contacts Could Save a Life

Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide

0
Why Saving Emergency Contacts Could Save a Life: A Must-Read Guide ...
Smartphone with tracking map and location pin

In Case of Theft: How to Track and Recover Your Phone

0
By: Destiny Young, Cybersecurity Leader | Tech Infrastructure & IT Operations Engineer | Digital Innovation Strategist | Tech Mentor | Author | Chartered Manager and Administrator Losing...

Latest articles

NITDA has partnered with Coursera, a leading online learning platform, to deliver high-quality cybersecurity education to participants

NITDA Launches Free Cybersecurity Training Program for Nigerian Youth

0
NITDA Launches Free Cybersecurity Training Program for Nigerian Youth ...
Smartphone with tracking map and location pin

In Case of Theft: How to Track and Recover Your Phone

0
By: Destiny Young, Cybersecurity Leader | Tech Infrastructure & IT Operations Engineer | Digital Innovation Strategist | Tech Mentor | Author | Chartered Manager and Administrator Losing...
Small business owner using digital devices amidst holographic projections of global networks, data streams, and business icons, symbolizing digital transformation and global connectivity for small enterprises.

How Digital Infrastructure Can Transition Small Businesses Through The Challenges of a Complex Business...

0
Author: Destiny Young, Cybersecurity Leader | Tech Infrastructure & IT Operations Engineer | Digital Innovation Strategist | Tech Mentor | Author | Chartered Manager and...
XDR - A Comprehensive Security Solution

XDR: The Essential Tool for Securing Your Enterprise Network

0
In today's rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated, leaving many organisations struggling to keep pace. Enter Extended Detection and Response...
How Bloggers Can Earn Payout From Facebook

Meta Monetisation: How Bloggers Can Earn Payout From Facebook

1
Bloggers earn more money from Meta than content creators What is Meta Audience Network? Meta Audience Network allows publishers and bloggers to monetize their content by...
The fraudulent ChatGPT application is designed to deceive users whilst concealing its malicious intent.

Cyber Criminals ‘Using Fake ChatGPT app to activate trojan attacks on Victim’s machine’

0
Author: Destiny Young, Cybersecurity Leader | Tech Infrastructure & IT Operations Engineer | Digital Innovation Strategist | Tech Mentor | Author | Chartered Manager and...
Smart TVs and ACR: Privacy and the Hidden Cost of Convenience

Smart TVs and ACR: Privacy and the Hidden Cost of Convenience

0
By: Destiny Young, Cybersecurity Leader | Tech Infrastructure & IT Operations Engineer | Digital Innovation Strategist | Tech Mentor | Author | Chartered Manager and Administrator In...
QR code with warning symbol illustrating cybersecurity threat

QR Code Scams: A Growing Cybersecurity Threat in 2024

0
QR Code Scams: A Growing Cybersecurity Threat in 2024 ...
Samsung Galaxy S24 Ultra: The Ultimate Flagship Smartphone

Samsung Galaxy S24 Ultra: The Ultimate Flagship Smartphone

0
Samsung Galaxy S24 Ultra: The Ultimate Flagship Smartphone | Destiny Young { "@context": "https://schema.org", "@type": "BlogPosting", "headline":...

Education trends

National Universities Commission

BREAKING: NUC Restructures Nigerian Universities Computing Programme into Distinct Disciplines; Cybersecurity, 6 Others

0
Quite notable is the splitting of Computing into Cybersecurity, Software Engineering, Data Science, Information and Communication Technology, Information Technology, Information Systems, and Computer Science
University of Uyo Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.
NBTE (HND to BSC) one-year top-up degree

Convert your HND certificate to BSc through NBTE’s one-year programme using the following steps

0
The National Board for Technical Education (NBTE) has commenced a one-year HND to BSc top-up degree programme in Nigeria. This is following the official launching of an online portal for application into the programme.
NBTE (HND to BSC) one-year top-up degree

BREAKING: NBTE (HND to BSC) one-year top-up degree commences officially in Nigeria

2
With your HND, do a one-year top-up to a BSc degree from a global university at the comfort of your home.
FUTIA

AN OPEN LETTER TO THE AUTHORITY OF FEDERAL UNIVERSITY OF TECHNOLOGY (FUTIA), IKOT ABASI

1
RE: BSc (Hons) in Cybersecurity I would like the Authorities of Federal University of Technology Ikot Abasi (FUTIA) to apply for approval from National University...
List of Schools and Departments at Federal University of Technology, Ikot Abasi, Akwa Ibom State

List of Schools and Departments at Federal University of Technology, Ikot Abasi, Akwa Ibom...

0
FUTIA is one of the Federal Universities of Technology in Nigeria that serves the South south region. Each geo-political zone in Nigeria has one of such universities.
NBTE Workshop on Computer Science unbundling

NBTE Unbundles Computer Science Curriculum into Cybersecurity, AI, Cloud computing, and Networking

0
NBTE curriculum workshops for the unbundling of the HND Computer Science programme, offered by Nigerian Polytechnics and similar Institutions

HND/BSc dichotomy: NBTE, Mewar International University, on HND “top-up” online programme

0
The Executive Secretary, NBTE, Prof. Idris Bugaje disclosed this in Abuja on Wednesday at meeting between the board, Mewar Group and Rectors of Polytechnics.
Interview scene

Preparing for Interview: The Star Method

0
The STAR Method allows candidates to structure their responses in a way that showcases their skills and experiences clearly.

Topfaith University set to commence medical science programmes

0
It already has a full-fledged Faculty of Law, Faculty of Engineering, Faculty of Management and Social Sciences, and Faculty of Computing and Applied Sciences.

TINUBU’s Education Policy, a Novel Introduction in Nigeria’s History

0
TINUBU’s Education Policy, a Novel Introduction in Nigeria’s History Destiny Young, Uyo One of TINUBU’s most inviting policy in his Manifesto is the provision for Nigerian...