Fantastic!! You bring your own laptop and they boot you into a virtual
machine using Linux from which they train you.
It is a week's course for a whole day with excellent trainers. It is
interactive, hands on and they make sure that by day five,
YOU KNOW YOUR STUFF!! They also certify you with themselves and can even
prep you for and examine you for CEH.

 

I strongly recommend these guys. If you want to "go it alone", there is a
CEH centre in Uganda but I don't recall it off
the top of my head.

 

From: [email protected] [mailto:[email protected]] On Behalf Of
Robert Muwanga
Sent: 13 December 2011 21:09
To: Uganda Linux User Group
Subject: Re: [LUG] Computer Security

 

Hi,

Thanks Jake. Sounds like a good option. I will check them out and if they
are good, recommend them to my employer. How was the training experience?
Hands-on or mostly textbook? I am more of a hands-on person and would love
to have a "capture the flag" kind of exam at the end that tests learning
outcome rather than a paper-based test.

On Tue, Dec 13, 2011 at 9:02 PM, Jake Markhus <[email protected]> wrote:

Hi Robert,

When I felt the urge, I went to silensec. A company based out of Nairobi
that comes to Uganda to train corporates in
computer security. It costs about $1900 for a week's course thus it is
always a good idea to get a company to pay for your
course or subsidise it in some way.

Look up their website and/or talk to their regional training consultant Paul
Yago on email [email protected] 

Good luck.

Jake.

 

From: [email protected] [mailto:[email protected]] On Behalf Of
Robert Muwanga
Sent: 13 December 2011 20:48
To: [email protected]
Subject: [LUG] Computer Security

 

Hi,

I am not sure whether this is the correct place to put my concerns but I
wanted to find out whether there are any courses that are held in Kampala
that deal in computer security, particularly Pen Testing, something similar
to the SANS GIAC or Offensive Security courses. CEH seems to be something
similar learning on how to use tools without learning to understanding the
vulnerability or underlying security architectural flaw that causes that
vulnerability to exist. I wish to expand my knowledge towards Network
Penetration testing. Any ideas?


_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM:
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including
attachments if any). The mailing list host is not responsible for them in
any way.

 

_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to