• Customized Curriculum
    Customized Curriculum

    We are a one stop answer to  make you part of the  ever growing  ICT industry  with our customized   Curriculum.

  • Knowledgeable Facilitators
    Knowledgeable Facilitators

    We have a team of brilliant and experienced trainers  and consultants able to deliver to your satisfaction.

  • We Understand, Advise and Deliver
    We Understand, Advise and Deliver

    We understand the growing need for accredited training  in the corporate industry and towards this end we provide you with necessary Skills .

IT Security and Ethical Hacking Training Course

This is a unique, authoritative, high-value, hands-on practical course which will provide participants with essential understanding of the tools, methodologies and vulnerabilities that fraudsters could employ to exploit IT systems. Most organisations now realise that in order to defend themselves against the threat of attack by fraudsters and indeed any individual intent on causing disruption to their IT systems, IT staff must have an informed and current understanding of the present-day methodologies, tools, and vulnerabilities which allow these exploits to happen. For the banking sector, this course will be very useful in preventing revenue leakages through fraudulent activities. This IT Security course is designed to educate IT professionals in order to allow them to defend systems against hacking and fraudsters attacks. During this course, participants will learn about the fraudster mindset and become familiar with the tools and methodologies that are used to attack systems. Using state-of-the-art classroom setups, delegates work with Microsoft Windows and LINUX/UNIX systems, and associated server software. A wide range of security and auditing tools will be used during the course


Course Objectives

This course fulfils two vital objectives for anyone working in IT systems administration, IT security or IT support roles:

  • The course builds a strong awareness of the wide range of risks and threats now faced even by organisations which believe they have strong security solutions in place.
  • The course provides delegates with a solid understanding of the control measures that need to be put in place in order to limit an organisation's vulnerabilities and risk of attack.
  • The course exposes participants to various forms of electronic frauds highlighting how they are perpetrated and how they can be prevented.

By the end of this course, the participant will have learnt about:

  • The tools, techniques and methodologies employed by fraudsters in a dedicated lab environment.
  • How fraudsters can collect and assimilate information about an organisations infrastructure whilst avoiding detection.
  • How information may be used to assess your IT systems weaknesses and subsequently launch an attack against target systems.
  • The techniques that are typically used to gain access into a system.
  • The types of tools that are used to elevate access on a system.
  • The techniques used by fraudsters to conceal their tracks and the methods via which access to a target system may be maintained.
  • The limitations of security firewall systems and the tools used to bypass them including how to bypass Intrusion Detection Systems (IDS)
  • Measures that you can employ to secure and protect information against hacker attacks.
  • Common electronic frauds and data analysis methodologies that are used to detect and prevent such acts

Course Special Features


  • Targeted Tracks: You will benefit from the expertise of industry front-runners, learn from real-world case studies and leave with everything you need to know to safeguard your IT Environment
  • Tangible Take-Aways will be given to you including useful documents, guidelines and checklists that you can use as a springboard to your own initiatives.

Optimum networking opportunities are available through breaks, receptions, and luncheons. You will have the opportunity to talk shop with information security professionals and you will return to the office with new ideas and fresh contacts.

Obtain materials in 2 easy ways:

  • At the training you will receive bound volumes of the training materials
  • After the training: download the materials you want from the web with a special access code.

Who Should Attend

  • Information Security Officers, Directors and Managers
  • Internal Auditors, Finance Managers, Risk Managers
  • Information Technology Auditors, Managers and Staff
  • Network Security Managers and Administrators
  • Security Managers
  • Local Area Network Administrators
  • Technical Support Staff
  • System Administrators
  • Others charged with various security responsibilities


Download Brochure