Welcome to Trust Academy
Your bridge to your dream to your professional qualification.
GZU Class of 2023 Graduation
We offer Business programs in association with Great Zimbabwe University.
MSU Class of 2023 Gradution Ceremony
We offer Business & ICT programs in association with Midlands State University.
  • 2024 ASSOCIATE/AFFLIATE GRADUATION

    Trust Academy is cordially inviting you to the 2024 graduation ceremony.

    Date:    06/12/2024.
    Venue: TBA
    Time :   0800 hours (students and guests must be seated).
    Fees :   $120 (inclusive of food for 3,gown,transcripts and certificate, and entertainment).
    Guest: Graduand plus 2 guests. 

    Deadline for payment is 26th November 2024.

    Read more: 2024 Graduation In December

  • Advance your Project Management Skills with Trust Academy

    Trust Academy is currently enrolling students for programs offered in association with Project Management Zimbabwe. The institution is offering diploma courses in Project Management to provide students with the necessary skills and knowledge to excel in the field.

     

    Read more: Project Management

  • Diploma In Applied Monitoring and Evaluation

    Elevate Your Impact with Chinhoyi University of Technology Diploma in Applied Monitoring and Evaluation

    Read more: Diploma In Applied Monitoring and Evaluation

Career Prospects

Ethical Hackers undertake tasks to investigate a network or a system to identify weak points that hackers can exploit or destroy. Thereafter, Ethical hackers collect and then analyze information to determine means and ways to strengthen the security of a company’s applications, system or network.Ethical hackers are trained hackers who are responsible to protect computer networks and systems from malicious or unethical attacks. They utilize their skills to identify the existing security issues and prevent the unethical hackers to penetrate into the organizational systems and access private and sensitive information.

A career in ethical hacking will require a person to check for any vulnerabilities within different organizations’ computer systems, formulate ways to ensure the protection of information of an organization, communicate with clients, and deliver written reports after task completion. They must possess a thorough knowledge of computer tools, programming, and networking.The job integrates high working pressure and its responsibilities range from finding a bug in the IT environment to providing a solution to making the IT environment stronger against external threats. Government organizations, IT security firms, financial institutes, and telecommunication companies are some of the most prominent recruiters of ethical hackers.

Apply Now

Background in ICT

Certified Ethical Hacker
Curriculum
.Network security
.Scanning
.Enumeration
Mobile Skills/Competences gained
.Penetration testing
.Network security
.Systems security and hacker prevention
Opportunities - most entrepreneurial
.Penetration tester
.Security analysts
.Network security support
.Ethical system testing