You asked. We listened.
In this post, find answers to nine frequently asked questions we’ve received from prospective students about studying IT Security at Seven Academy in Cameroon.
We train and certify a total of 40 certifications through our partnership with EC-Council.
Why a lot of demand for the Certified Ethical Hacking (CEH) training?
Based on research, CEH which is a prerequisite into CHFI and ECIH was the most popular vendor neutral cyber security certification among employers in 2019.
|Certification||Simply Hired||Indeed||LinkedIn Jobs||TechCareers||Total|
|GSEC (SANS GIAC)||1,552||1,983||3,187||920||7,642|
Our certifications are backed by EC-Council. Both as a training and a testing center.
We partnered with EC-Council because individuals who have achieved EC-Council certifications work with organizations like the US Army, the FBI, Microsoft, IBM, and the United Nations.
Their certifications have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS).
Moreover, the United States Department of Defense has included the CEH program into its Directive 8570 making it one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP).
There is no predefined eligibility criteria for those interested in this training. However, computer networking knowledge (N+) is preferred. For this reason, the admission committee will review applications on an individual basis.
Clause: Age Requirements and Policies Concerning Minors
The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 18 years old.
Studying with classmates under the guidance of a certified EC-Council tutor will push you to work harder.
Moreover, sharing from your instructors experiences in IT Security in Cameroon and out of Cameroon is a plus.
Mr. Clifford Tambe is the IT Security instructor at Seven Academy. He is a cybersecurity expert by profession holding several internationally recognized certifications from EC-Council. He studied at one of the best training institutes in New Delhi-India.
Our EC-Council curriculum starting with CEH focuses on hacking techniques and technologies from an offensive perspective.
This advanced security hacking training is regularly updated. So, you can be sure it reflects the latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field.
Here is a list of some of the positions you’ll be able to apply for after your training.
Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. As you begin your training, you’ll come to understand that these techniques extend beyond the technology domain and can be applied to test security policies and procedures.
Hacking technologies on the other hand are used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. Even Though Python is celebrated, you’ll learn how to use a variety of languages to hack.
One reason the EC-Council partnered with us to offer IT Security certifications is because of the infrastructure in place.
Visit our labs in person at Bali, opposite Hotel Serena, and discuss with your instructor. You can equally pass by at Tradex Bonamoussadi to visit our incubation center (Seven GPS).