Dr. Ali Jahangiri has just finished the second Live Hacking 2010 South Africa workshop and it has been hailed as a resounding success by all involved. Based on his book ‘Live Hacking: The Ultimate Guide to Hacking Techniques and Countermeasures for Ethical Hackers and IT Security Experts’ participants are introduced to the world of ethical hacking and information security.
Dr. Ali Jahangiri, international author and information security expert, is pleased to report that the second Live Hacking 2010 South Africa workshop was a great success. Due to the great success of these workshops Dr. Jahangiri is also pleased to announce that the Live Hacking workshop will be back in South Africa on 7 – 10 March 2011.
The second Live Hacking 2010 South Africa ethical hacking workshop was held in Pretoria, the capital of South Africa, in association with InfoCure the exclusive organizer of Live Hacking workshop series in South Africa.
During the workshop attendees are introduced to the world of hacking and information security and given the knowledge they need to thwart the criminal elements in cyberspace. The South African attendees learnt how to hack and crack using the techniques and tools of real hackers.
“The second Live Hacking 2010 South Africa workshop was a great success and we had participants from so many different areas of information technology” said Dr. Jahangiri at the end of the workshop. “I am pleased to announce that there will be another Live Hacking South Africa Workshop in March next year.” Dr. Jahangiri went on to thank InfoCure for making this workshop a success.
Places are limited for the next Live Hacking South Africa Workshop so it is recommended that potential attendees book soon. Any IT professionals interested in attending should visit the live hacking website: livehacking.com for more details.
During these workshops Dr Jahangiri reveals the “tricks of the trade” while drawing on his many years of academic, professional and practical experience to equip you and your organization with the know-how you need to defend your data against the rising tide of ubiquitous and persistent cyber criminals.