+ Follow CERTIFIED ETHICAL HACKING Tag
Array
(
[results] => Array
(
[0] => Array
(
[ArticleID] => 385748
[Title] => Informatics introduces ‘Ethical Hacking’ courses
[Summary] =>
Informatics is going full swing with the recent re-launch of its Certified Ethical Hacking course and the launch of Computer Hacking Forensic Investigation course.
Informatics president Leo Riingen shared the success story of Informatics, the institution determined to fight the growing threat of cyber-crime all over the world, during the launch.
[DatePublished] => 2007-02-19 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] =>
[AuthorName] =>
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
[1] => Array
(
[ArticleID] => 382334
[Title] => Educating ethical hackers
[Summary] =>
The total rose to over 100 million records stolen in the United States, and even though lost data do not equate to identify theft, once names and social security numbers are out there, they are out there for good.
[DatePublished] => 2007-01-29 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] =>
[AuthorName] =>
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
)
)
CERTIFIED ETHICAL HACKING
Array
(
[results] => Array
(
[0] => Array
(
[ArticleID] => 385748
[Title] => Informatics introduces ‘Ethical Hacking’ courses
[Summary] =>
Informatics is going full swing with the recent re-launch of its Certified Ethical Hacking course and the launch of Computer Hacking Forensic Investigation course.
Informatics president Leo Riingen shared the success story of Informatics, the institution determined to fight the growing threat of cyber-crime all over the world, during the launch.
[DatePublished] => 2007-02-19 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] =>
[AuthorName] =>
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
[1] => Array
(
[ArticleID] => 382334
[Title] => Educating ethical hackers
[Summary] =>
The total rose to over 100 million records stolen in the United States, and even though lost data do not equate to identify theft, once names and social security numbers are out there, they are out there for good.
[DatePublished] => 2007-01-29 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] =>
[AuthorName] =>
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
)
)
abtest
February 19, 2007 - 12:00am
January 29, 2007 - 12:00am