This course is an introduction to Cybersecurity that covers a range of subjects and tools that an Ethical Hacker should know about. The course is part theory but mostly a hands-on experience that will set students up for success when they have to apply what they have learned in their jobs.
Here's a birds eye view of the contents of the course.
Hacking is illegal in the wild, but in this course, we will do hacking in a contained lab environment. Going through the acts of hacking targets yourself will help you understand how real hacks work and to get a few steps ahead of the actual hackers.
Linux is, just like Windows or MacOS, an operating system (OS). And a very common one at that! Many of the devices you use every day run Linux, starting with almost every web server on the internet and for example - closer to home - your smart TV. Kali Linux is a special distribution of Linux, packed with cybersecurity tools.
Change is necessary, but organisations, and the people in them, are often set in their ways or unaware of the necessary changes they need to make to adapt to new situations that happen around them. Change management is necessary to make people aware of the needed changes, and to help them adopt them.
You will learn about all the different attacks on the ever-growing list of common attacks to prepare you and your organisation for things that may happen to anyone. But knowing about them at least gives you a fighting chance!
Learn how computers work and how they are connected through computer networks, the largest network being the internet. Soon you will understand what things like CPU, memory, ethernet, ARP, and IP actually mean.
Penetration testers are basically hackers that are authorised to hack things. The goal is to find weaknesses in systems so they may be patched before ill-willed attackers find them.
Find a start date below, or let us know when you would like us to run a course.
Hybrid course ending on:
Lessons run from:
Our Learning Advisors are here to offer professional guidance. Please schedule a call if you need assistance choosing the right curriculum or financing option.
Schedule callThis course is for people who are familiar with using computers daily. Beginners will have to spend a bit more time learning the theory in this course, but we have seen people of all levels join this course and learn a lot. If you want to become an actual Ethical Hacker, this course is not enough (it's just an introduction), and you might consider joining our Cybersecurity traineeship instead. If you are a manager in a tech company, this course is a perfect introduction to cybersecurity.
Our teachers have multiple years of Teaching experience and work experience in their field. Knowing exactly what is going on in the field and being able to transfer their knowledge is what motivates us and our students.
Our classrooms are equipped with all the necessary tools to facilitate both on-site and online learning at the same time. Choose the format that suits you best.
Learn modern technologies and current best practices. Our curriculum is market-orientated and is updated regularly.
The course certificate shows that graduates know what Ethical Hacking is and that they are familiar with the technical concepts and common threats on a high level.
Add recognition to your development team with a certificate from Codaisseur.
Increase your team's productivity with the certified Scrum methodology.
Protect your organisation with our certified cybersecurity courses.
These other courses may interest you. Make sure to check out everything in this study pathway, though.
We cover the whole backend development process: from the database setup and modelling your data to defining endpoints to interacting with and testing your server. By the end of this boot camp, you will be able to understand the basics of databases and generating tables and know how to use these tables.
This course is a unique technical leadership program that aims to help senior IT professionals to take the ultimate next step in their careers. A Chief Technical Officer (CTO) is a senior executive responsible for the technical direction and strategy of an organisation. Technical leaders typically have a strong technical background and are responsible for overseeing the technical aspects of the organisation's products, services, and operations.
As you will notice from the experience of your teachers, the backgrounds and specific responsibilities of a CTO can vary depending on the organisation, but overall, a CTO is responsible for the technical vision, direction and execution of an organisation, they are the chief architect of the organisation's technology and are a key member of the leadership team.