Computer Courses

 

Career Courses

 

Cisco

CCNA

CCNP

 

CompTIA

A+

Linux +

Security +

Server +

Network +

 

Graphic Design

Corel Draw

Flash/Fireworks

Graphic Design

Illustrator

InDesign

Joomla

Photoshop

 

Linux

LP101 and LP102

LP201 and LP202

 

Microsoft

Exchange Server

MCITP Server Admin

Office

SQL

 

Oracle

 

Platinum

 

Programming

C#

MCPD-ASP.Net

MCPD-Windows Developer

 

Six Sigma

Green Belt

Black Belt

Lean

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  

 

Computer Hacking Courses in South Africa

 

Course Duration: Five Days in Cape Town, South Africa (not available yet)

 

Designed to benefit security officers, auditors, security professionals, site administrators, and professionals responsible for the integrity of the enterprise network infrastructure, 2KO's CEH (Certified Ethical Hacker) training course aims at certification in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

To achieve CEH certification, you must pass exam 312-50 that covers the standards and language involved in common exploits, vulnerabilities and countermeasures. You must also show knowledge of the tools used by hackers in exposing common vulnerabilities as well as the tools used by security professionals for implementing countermeasures.


Hacking course objectives
Our CEH Training Course takes participants through the process of scanning, testing, hacking, and securing their own systems. Our course will enable participants to gain an in-depth knowledge and practical experience of essential security systems.

Students begin by understanding how perimeter defences work, followed by training on how to scan and hack their own networks (no live network is damaged). Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Also included in the training are topics such as Intrusion Detection, Policy Creation, Social Engineering, Open Source Intelligence, Incident Handling and Log Interpretation. Students will leave this class with hands on understanding and experience in internet security.


Duration: 5 days


Who should attend :The Certified Ethical Hacker course is a must for networking professionals, IT managers and decision-makers that need to understand the security dangers that exist today. Companies and organizations interested in developing greater e-commerce capability need people knowledgeable people in information security. This class provides a solid foundation in the security technologies that will pave the way for organizations that are truly interested in reaping the benefits and tapping into the potential of the Internet.

Prerequisites : Participants of the Certified Ethical Hacker Training Program are required to have a working knowledge with TCP/IP, Linux & Windows.

Topics Covered:
CEH
Introduction to Ethical Hacking
Footprinting
Scanning
Enumeration
System Hacking
Trojans & Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Viruses & Worms
Physical Security
Linux Hacking
Evading Firewalls, IDSs & Honeypots
Buffer Overflows
Cryptography
Penetration Testing

 

 For full course outline please complete the form below

Or call us on +27 (0)21 418 4874 for more information or complete the enquiry form below

 

 

 

 

 

 

 

All rights reserved 1999 - 2013 2KO International Certification Training