Hacker course offers insights into the mind and method of bad guys

IT professionals are being offered an insight into the world of computer hackers on the UK's first hands-on ethical hacking...

IT professionals are being offered an insight into the world of computer hackers on the UK's first hands-on ethical hacking course.

The five-day intensive course is designed to help IT professionals who have a working knowledge of Windows, Linux and TCP/IP to improve the security of their companies' systems.

Roger Chapman, founder of The Training Company, said the course, which has been available for several months in the US, is the first of its kind in the UK.

"There are a multitude of supplier-specific security courses, but in terms of hands-on courses that offer people the chance to think like a hacker, this is unique," he said.

The training covers social engineering techniques, wireless network security, internal hacking and denial of service attacks, and penetration testing.

Chapman denied that the training course would attract unethical hackers. "A hacker is not going to spend thousands of pounds on a course. There a plenty of websites they can look at for free," he said.

As a safeguard, applicants are asked to sign a legally binding document promising not to use their skills for illegal hacking.

The course, which costs £2,950 for 12 to 14 hours tuition a day, has attracted interest from financial services companies, banks and IT contractors who are keen to improve their portfolio of skills.

Applicants need to have a working knowledge of Linux, which is used as a launchpad by most hackers. Those without Linux skills can sign up for a longer version of the course which includes training in Linux.

This was first published in March 2004



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...