CAUNewswire – CAU Introduces PHREAK™ Certification for telephony hackers

                       ,pP""Yq,  ,pP""Yq,  ,d    b,
                      i$l    l$i $l    l$ i$l    l$i
                      $$     !$$ ,gP""Yp$$$$      $$
                      $$        i$l    l$$$$      $$
              `$$$$$  $$     !$$$$      $$$$      $$  $$$$$'
               `$$$$  i$l    l$ii$l    l$$i$l    l$i  $$$$'
                `$$$$  Y$,  ,$P  Y$,  ,$$ $Y$,  ,$P  $$$$'
                 `$$$$  `""""`    `""""`""  `""""`  $$$$'
                      computer academic underground

AUSTIN, Texas, April 05 2007 /CAUNewswire/ —

CAU announced today it’s second specialized certification offering into the Information Security Certifications market, the Phone Hacker, Researcher, Exploiter, And Konqueror (PHREAK) certification. Nearly two years since introduction of it’s extremely successful first offerings of the CAU Certified Information Systems Security Practitioner (C²ISSP) certification, as well as it’s first specialized certification, the Hacker and Xtreme 0day Researcher (HAX0R) certification, this new certification is targeted toward all hackers who specialize in vulnerability and exploit development within the scope of targeting and exploring telephony systems and technology.

In continuing the trend that CAU started with their first two certifications, the PHREAK certification process is also FREE, as in “free beer,” not as in “free speech.”

More information on CAU’s Information Security Certifications can be found at the organization’s website, under the Certifications area:

Or via email to the CAU Certifications Review Board, at


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: