Security Market Segment LS
Sunday, 11 September 2005 08:46

Computer Power teaches the art of hacking


IT training group, Computer Power Corporate Training, has introduced a new training course for IT professionals that provides them with a recognised qualification in systems hacking.

The qualification, Certified Ethical Hacker (CEH), from the International Council of Electronic Commerce Consultants (EC-Council), is designed to combat the increasing threat of cyber crime. The course teaches students how to think like hackers with the aim of beating them at their own game.

The EC-Council is a member driven international organisation promoting best practices in e-business and provides professional certifications that are globally recognised.

Computer Power is offering the EC-Council qualification of Certified Ethical Hacker to IT professionals with high level responsibility for systems and networks. A comprehensive five day course, training includes actual live hacking of a system, and teaches users how to identify vulnerable areas and secure system weaknesses before would be hackers find them.

Dean Rogers, CEO of Computer Power, said, 'companies can help protect themselves against computer crime by ensuring their top level IT staff are adequately trained in computer security.  Accreditation as a Certified Ethical Hacker is quickly becoming the expected standard qualification for network and system administrators, and should be an integral component of professional development programs.'

Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.


WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.


Stan Beer


Stan Beer co-founded iTWire in 2005. With 30 plus years of experience working in IT and Australian technology media, Beer has published articles in most of the IT publications that have mattered, including the AFR, The Australian, SMH, The Age, as well as a multitude of trade publications.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News