Whatsapp(+237) 58066982

LocationDouala Bali, Opposite Hotel Serena, CM


9 Questions You Should Ask Before Taking IT Security Training in Cameroon

You asked. We listened.

In this post, find answers to nine frequently asked questions we’ve received from prospective students about studying IT Security at Seven Academy in Cameroon.

9 FAQ About Our IT Security Certifications

1. Which IT Security certifications can I take today at Seven Academy?

We train and certify a total of 40 certifications through our partnership with EC-Council

Why a lot of demand for the Certified Ethical Hacking (CEH) training?

Based on research, CEH which is a prerequisite into CHFI and ECIH was the most popular vendor neutral cyber security certification among employers in 2019.

CertificationSimply HiredIndeedLinkedIn JobsTechCareersTotal
CEH (EC-Council)2,1002,8494,4711,36010,780
CISM (ISACA)3,0884,0496,6636,40920,209
CISSP [(ISC)2]9,76012,96720,1296,87549,731
GSEC (SANS GIAC)1,5521,9833,1879207,642
Security+ (CompTIA)2,4373,1454,34841510,345

2. Which organization backs Seven Academy’s IT Security training in Cameroon?

Our certifications are backed by EC-Council. Both as a training and a testing center. 

We partnered with EC-Council because individuals who have achieved EC-Council certifications work with organizations like the US Army, the FBI, Microsoft, IBM, and the United Nations.

Their certifications have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS).

Moreover, the United States Department of Defense has included the CEH program into its Directive 8570 making it one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP).

3. What are the entry requirements?

There is no predefined eligibility criteria for those interested in this training. However, computer networking knowledge (N+) is preferred. For this reason, the admission committee will review applications on an individual basis.

Clause: Age Requirements and Policies Concerning Minors

The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 18 years old.

4. What’s the difference between online and in-person training at Seven Academy? 

Studying with classmates under the guidance of a certified EC-Council tutor will push you to work harder.

Moreover, sharing from your instructors experiences in IT Security in Cameroon and out of Cameroon is a plus. 

5. Who is the Lead IT Instructor?

Mr. Clifford Tambe is the IT Security instructor at Seven Academy. He is a cybersecurity expert by profession holding several internationally recognized certifications from EC-Council. He studied at one of the best training institutes in New Delhi-India.

Talk to the instructor on WhatsApp.

6. What makes this cyber security training different from others in the market? 

Our EC-Council curriculum starting with CEH focuses on hacking techniques and technologies from an offensive perspective.

This advanced security hacking training is regularly updated. So, you can be sure it reflects the latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field.

7. What jobs can a hacker get?

Here is a list of some of the positions you’ll be able to apply for after your training. 

  • Information Security Analyst.
  • Security Analyst.
  • Certified Ethical Hacker (CEH)
  • Ethical Hacker.
  • Security Consultant, (Computing / Networking / Information Technology)
  • Information Security Manager.
  • Penetration Tester.

8. What hacking techniques and technologies can you expect to master with CEH at Seven Academy?

Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. As you begin your training, you’ll come to understand that these techniques extend beyond the technology domain and can be applied to test security policies and procedures.

Hacking technologies on the other hand are used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. Even Though Python is celebrated, you’ll learn how to use a variety of languages to hack. 

9. Does Seven Academy have the right infrastructure in Cameroon for an IT Security Training?

One reason the EC-Council partnered with us to offer IT Security certifications is because of the infrastructure in place.

Visit our labs in person at Bali, opposite Hotel Serena, and discuss with your instructor. You can equally pass by at Tradex Bonamoussadi to visit our incubation center (Seven GPS).