AIT6 Foiling the System Hackers

Seminar Objectives

Computer penetration is fast becoming one of today’s greatest opportunities for fraud, industrial espionage and malicious damage.

This two-day course addresses the issue of protecting our essential computer systems from this hazard. We believe that there is no organisation in Southern Africa who could not benefit from this workshop.

Protecting increasingly sensitive information on Networks is becoming more difficult by the day. This course will allow delegates benefit from an experienced-based, real-world approach to security. The course is designed to leave delegates with numerous checklists and software, and "how-to" reference materials that will increase their effectiveness and decrease the effectiveness of attacks on their networks. Among the topics to be discussed are:

  • Ingredients for a security approach
  • What is needed for the hacker to succeed and to fail
  • Protecting your Network from Hackers, Viruses and Other Attacks
  • Protecting your information via cryptography
  • Novell Netware Security
  • UNIX security and audit
  • Cruising the Internet Securely
  • The use of Security and Productivity Tools

Who Should Attend

The workshop is designed to be of particular benefit to:

  • Information Systems Management
  • Information Security Professionals
  • Network Administrators
  • Information Systems Auditors
  • Internal and External Auditors

To register, please send us your details on the:

  Registration Form  

mail to: