Computer Courses

 

Career Courses

 

Cisco

CCNA

CCNP

 

CompTIA

A+

Linux +

Security +

Server +

Network +

 

Graphic Design

Corel Draw

Flash/Fireworks

Graphic Design

Illustrator

InDesign

Joomla

Photoshop

 

Linux

LP101 and LP102

LP201 and LP202

 

Microsoft

Exchange Server

MCITP Server Admin

Office

SQL

 

Oracle

 

Platinum

 

Programming

C#

MCPD-ASP.Net

MCPD-Windows Developer

 

Six Sigma

Green Belt

Black Belt

Lean

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  

 

Computer Hacking Courses in Cape Town South Africa

Course Duration: 5 Days

This Ethical Hacking course is aimed at IT Security Officers, IT auditors, security professionals, site administrators, and anyone responsible for the integrity of the network infrastructure, 2KO's computer hacking course aims at developing a network security policy and discipline from a vendor-neutral perspective.

2KO is a VUE and Prometric testing centre. Although 2KO is not an ECC partner, certification from EC Council is possible through our authorised testing centre. Students can enrol for exam 312-50 which covers the standards and language involved in common exploits, vulnerabilities and countermeasures.
 

You must also show knowledge of the hacking tools used by hackers in exposing common vulnerabilities as well as the tools used by security professionals for implementing countermeasures.


Computer Hacking Course Objectives
2KO International's hacking course takes participants through the process of scanning, testing, hacking, and securing their own systems. Our course will enable participants to gain an in-depth knowledge and practical experience of essential security systems.

Students begin by understanding how perimeter defences work, followed by training on how to scan and hack their own networks (no live network is damaged). Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Also included in the training are topics such as Intrusion Detection, Policy Creation, Social Engineering, Open Source Intelligence, Incident Handling and Log Interpretation. Students will leave this class with hands on understanding and experience in internet security.

Duration : 5 days

Who should attend: The computer hacker course is a must for networking professionals, IT managers and anyone that needs to understand the security risks to networks. Organizations interested in developing greater e-commerce capability need people knowledgeable people in information security. This class provides a solid foundation in the security technologies that will pave the way for organizations that are truly interested in reaping the benefits and tapping into the potential of the Internet.

Prerequisites: Participants of the computer hacking course must have a working knowledge with TCP/IP, Linux & Windows.

Topics Covered:


Introduction to computer hacking
Foot printing
Scanning
Enumeration
System Hacking
Trojans & Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web based Password Cracking Techniques
SQL Injection

Hacking Wireless Networks
Viruses & Worms
Physical Security
Linux Hacking
Evading Firewalls, IDSs & Honeypots
Buffer Overflows
Cryptography
Penetration Testing

 

For full course outline please complete the form below

 

 

 

 

 

 

 

 

All rights reserved 1999 - 2013 2KO International Certification Training