Contact Us | 866.906.9190
Connect Online   |   

Contact Us | 866.906.9190
Connect Online   |   

FREE Info Session - Network, Security, Forensics

Email        Print

Dates:August 21, 2014
Meets:Th from 7:00 PM to 8:00 PM
Location:UT Arlington CEWF-E200F
Fee: $0.00  

Sorry, this course is inactive. Please contact our office to see if it will be reinstated, or if alternative classes are available.

Course Description

Topics Covered

What to get started in a career as a computer forensics examiner, computer technician, or a certified penetration testing engineer? CompTIA A+ certification is the preferred starting point for all of these careers. Annual expected median salary is $50,000 by CompTIA website. Not bad for a starting career in computer technology.

The CompTIA A+ certification is the starting point for a career in IT. The exams cover maintenance of PCs, mobile devices, laptops, operating systems and printers.

Love watching the show CSI? Consider getting into computer forensics. Annual expected median salary is $121,000 as of January 2014 by website.

Computer forensics, also known as computer forensic science, has more recently also come to be known as digital forensics and cyber forensics. Regardless of the name, computer forensics involves data recovery employing a legal audit trail in support of criminal and civil investigation and/or litigation. Computer forensics has also been employed for non-court purposes such as personnel actions in addition to expert confirmation of data destruction in compliance with federal privacy legislation; with regard to the latter, who is better trained than a computer forensics examiner to ensure that data cannot be recovered.

How would you like to LEGALLY get paid to hack computer systems? Annual expected median salary $93,000 as January 2014 by website.

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses’ network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. It’s very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve.