How to protect yourself in the post-Snowden era? Just say no to intrusion and breaches
According to Forrester at least 60% of enterprises will discover a breach of sensitive data this year. By 2018, Gartner predicts even the first cyber-murder through the remote hacking of a wireless medical device. In five days we teach you how to say no to hacking. We’ll explain different concepts (MiTM, Botnets, DDoS ...) and guide you through classic attack scenarios and tools. The course comes with extensive labs and a detailed handout, which is available in electronic format.
Participants who complete the course will receive a certificate of completion allowing them to gain Continuing Professional Credits (CPEs). Those credits can be submitted for GIAC or ISC2 certification renewal. The most well-known ISC2 certification is the CISSP certification (Certified Information Systems Security Professional).
If you are unfamiliar with Linux command line essentials and/or security concepts, it is advised to attend at least the "PIA Linux in a nutshell (1d.)" and/or one of our cyber security introduction security classes in order to benefit from the HEXID class.
Why you need hacking and Wi-Fi cracking training? Comment by Stijn Huyghe and An Coremans, both experts at the Proximus ICT Academy. Stijn Huyghe and An Coremans (video - EN)
Check out other customer testimonials why this training is a must for you. The testimonial of Antoine Levaque or Stany Bussels (videos in EN).
Duration: 35.00 hour(s)