Hacking Brings a New Source of IT Security to Business

Hacking Brings a New Source of IT Security to Business

Greenbelt, MD (PRWEB) March 23, 2006

When one thinks of a “Hacker”, what often comes to mind is a crook, thief or rule breaker behind a PC looking to cause problems for other people’s networks or computers. The 1995 film “Hackers” helped to draw this picture in American minds. In this film a young teen writes a computer virus and is apprehended by the US Secret Service. Today, the security and networks that a hacker must work around are much more complex than they were in 1995, but our image of the hacker is still the same.

Unfortunately, hacking is still a major issue of concern in our society. Viruses, identity theft and system intrusion are more common now than ever before. Fortunately, now hackers work for both sides. What’s more, the skills possessed by the hacker are being offered to anyone with a little networking or IT experience. In classrooms all across America people are learning to hack “ethically” for the purpose of network intrusion vulnerability detection and prevention. At Academy of Computer Education (http://www.trainace.com) in Greenbelt, MD, the Certified Ethical Hacker (CEH) Hands-On training class is a huge hit. ACE, as the educational center is known, is a full service IT training facility that offers classes in Microsoft, Cisco, Linux and of course security, among others.

“Ever since we have been in business, security classes have been popular, especially being in the government contract capitol of the US. The Certified Ethical Hacker class has become more popular than any other security course because it is more exciting than any other class. It brings an element of mystery, criminality and power that no other Information Technology class can,” said owner Ralph P. Sita, Jr., CPA.

In the Certified Ethical Hacker class the student learns the method of breaking into outside systems using tools and techniques. Cracking codes, hiding / faking identity and intruding to other networks are all part of the curriculum. The EC Council (The Founder of the CEH) and the training school realize how much power they are putting into the hands of the student so each is required to sign a waiver before the class begins. The student must sign releasing both the EC Council, the training facility and trainer from any liability from illegal or unethical actions. The student also signs a statement that they will not use their new skills or tools in a wrongful manner.

Academy of Computer Education was able to realize the value of this program by the requests of local businesses to have people who can meet their security needs. In the Washington, DC area many major companies service contracts from the federal government that require the latest IT security skills. Many of the people in these classes are required by their employers to maintain security clearances.

As long as the world has people who are looking to use the power of computers and the internet for the wrong reason, there will be a need for a counter security effort. Therefore, the Certified Ethical Hacker certification course (http://www.trainace.com/courses/ceh-hacker.asp) and the schools that teach it are here to stay.

# # #

Vocus©Copyright 1997-

, Vocus PRW Holdings, LLC.
Vocus, PRWeb, and Publicity Wire are trademarks or registered trademarks of Vocus, Inc. or Vocus PRW Holdings, LLC.

Leave a Reply