Unlike other training courses that just show “cool” hacking techniques that are better left for movies and television, we insist that all students not only learn the techniques to harden a network infrastructure—they will actually renovate a dilapidated representative network into a secure and self-defending information conduit of tomorrow.
When your CEO asks for ROI, there will not be a shuffling of feet and wringing of hands; rather, a demonstrable increase in the security posture of your corporate network is our students’ diploma of successful completion.
Unfortunately, it’s all too common for outside forces to saturate us with tasks that drown out our curiosity or keep us from bringing it to any productive level. Learning computer security is a bit of a conundrum in that way because if you want to become skilled, you need to feed your curiosity with theory and practice, but you can’t dedicate the time required because your job could never allow the amount of time that following one’s curiosity demands.
“In theory, there is no difference between
theory and practice. But, in practice, there is.”
This is important, for to master a skill, whether your motivation is curiosity or something else, that motivation must also be accompanied by the ability to train intensively.
Copyright © 2002-2018 All Rights Reserved.