Computer Hacking Courses in South Africa
Intended to benefit security
officers, auditors, security professionals, site administrators, and
professionals responsible for the integrity of the enterprise network
infrastructure, 2KO's CEH (Certified Ethical Hacker) training course
aims at certification in the specific network security discipline of
Ethical Hacking from a vendor-neutral perspective.
To achieve CEH certification, it is important that you pass exam 312-50 that covers the standards and language involved in common exploits, vulnerabilities and countermeasures. You must also display knowledge of the tools utilized by hackers in exposing common vulnerabilities and the tools utilized by security professionals for implementing countermeasures.
Hacking course objectives
Our Hacking Course takes participants through the process of scanning, testing, hacking, and securing their own systems. Our course will enable participants to gain an in-depth knowledge and practical experience of essential security systems.
Students begin by understanding how perimeter defences work, followed by training on how to scan and hack their own networks (no live network is damaged). Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Also included in the training are topics such as Intrusion Detection, Policy Creation, Social Engineering, Open Source Intelligence, Incident Handling and Log Interpretation. Students will leave this class with hands on understanding and experience in internet security..
Security Course Duration: 5
Days in Cape Town
Who should attend :
The Computer Hacker course is a must for networking professionals, IT managers and decision-makers that need to understand the security dangers that exist today. Companies and organizations interested in developing greater e-commerce capability need people knowledgeable people in information security. This class provides a solid foundation in the security technologies that will pave the way for organizations that are truly interested in reaping the benefits and tapping into the potential of the Internet.
Participants of the Hacker Training Program are required to have a working knowledge with TCP/IP, Linux & Windows.
Ã‚Â· Introduction to Hacking
Ã‚Â· Foot printing
Ã‚Â· System Hacking
Ã‚Â· Trojans & Backdoors
Ã‚Â· Denial of Service
Ã‚Â· Social Engineering
Ã‚Â· Session Hijacking
Ã‚Â· Hacking Web Servers
Ã‚Â· Web Application Vulnerabilities
Ã‚Â· Web based Password Cracking Techniques
Ã‚Â· SQL Injection
Ã‚Â· Hacking Wireless Networks
Ã‚Â· Viruses & Worms
Ã‚Â· Physical Security
Ã‚Â· Linux Hacking
Ã‚Â· Evading Firewalls, IDSs & Honeypots
Ã‚Â· Buffer Overflows
Ã‚Â· Penetration Testing