The International Certification in IT Security Training Program fcch foresec certified computer hacking
BACKGROUND Information Technology Security is important thing to your business because you re financial data s, your customer data s, your company data s are your valuable asset. The reasons why security are important as follows: If your organization has an Internet connection or one or two disgruntled employees, your computer systems will get attacked. In fact, Internet usage is increasing 90% of large companies & govt. agencies had computer security breaches in 2001; Three-quarters suffered financial losses Transacting over the web is inevitable. Financial fraud losses were $10,186,400. If this happened in Banking or any internet selling, it would make customer un-trusty and make company income going down. Based on Symantec report 2007, email SPAM was increasing. Hackers did their activities for fun as a game and some of them working with an organization. Every one can download Hacking Tools with FREE and easy to use. Technology is growing very fast and the resource should be followed. Hacking technologies also growing. By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, the in-depth information in this course helps you turn the tables on computer attackers. This course addresses the latest cutting-edge insidious attack vectors and the "oldie-but-goodie" attacks that are still so prevalent, and everything in between. WE TRAIN YOU TO HACK YOUR NETWORKS BEFORE THE BAD GUYS HACK YOURS
REAL PRESENCE OF CYBERCRIME BANK ATTACKED: Be aware, e-banking crime is growing faster 2010. Bank Customers feared online thieves. International Bank Customers can be collapse too in Indonesia. Bank Customers money are missing every 20 seconds. Cyber criminal breaking the bank USD 110 Million World War III could occur in a virtual world. Israel Syria broke the computers before bombing. Cyber Attacks most dangerous after nuclear. South Korea Request to U.S. to prevent the Cyber Attack to North Korea. American Power System invaded China and Russia Cracker Police site victim by Cyber Crime. Department of Health sites infected bad programs. Jabar site collapse, Cyber crime threatens KPU. A big Software House company has groped by cyber criminals 'Lesbian'. Gambling Sites on the PT Pos Web BlackBerry now is the target of criminals in virtual world. Tens of thousands Hotmail Password Leaks on the Internet. ASEAN Hackers gather Indonesia Dominant. Ten thousand new bad or worse programs appear everyday. Wimax tender has disturbed by CyberCrime.
PROVIDERS Multimatics Professional Development Centre (MPDC) was born from Informatics Professional Development Centre (IPDC). Where IPDC is a subsidiary of Informatics Education Ltd (IEL), a multinational corporation listed on the Mainboard of the Stock Exchange of Singapore. IEL is an international franchisor with a network of over 100 centers in 22 countries. MPDC is focused on IT Security, E Business, Supply Chain Management, and General IT with the international certifications from EC Council, PASAS, FORESEC, Achieve Global, Microsoft, Informatics and others. MPDC has conducted training in IT Security for Ethical Hacking, Hacking Forensic and Investigation, Security Analyst, Penetration Testing, IT Security Audit, and IT Security Management from six (6) years ago. MPDC is also one of the first Training center whose provide IT Security Training and Certification in Indonesia. MPDC provides both professionals and corporations with the latest concepts, skills and techniques for striving in the ever increasingly complex and competitive global marketplace. Using a flexible blended solution where training and development are conducted face-to-face session or a combination of both elements of learning. Out of the close to 500 graduates in this high-end certification courses, most of them had already been certified from the top 500 corporations in Indonesia. FORESEC was founded by the Industries leading Cyber Warfare specialists. Its mission is to create an informative Information Security Awareness crowd amongst all where learning security should be accessible by everyone. FORESEC maintains a continuous and strong focus in R&D, resulting in the increase in the capability of offering a wide range of ICT Security products, services and certifications. FORESEC also collaborates with various universities and organization in R&D. FORESEC is premier and trusted ICT security solutions provide and also its a Multimedia Super Corridor status and with a solid track record of providing ICT security solutions and building its intellectual property, FORESEC delivers internationally recognized and enterprise-wide solutions and services. FORESEC has deliver service in some countries in the world: America (USA), Russia, Australia, German, Netherland, Great Britain (GBR), Singapore, Indonesia, Vietnam, Philippine.
INTERNATIONAL CERTIFICATION AND TRAINING PROGRAM fcch foresec certified computer hacker DESCRIPTION FCCH is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. The FCCH presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to Hack -- the norm with the classes that have been available until now. Our course is developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets. MODULES DETAIL Module 1: Hacking Overview and Methodology Problem Definition -Why Security? Essential Terminologies Elements of Security What does a Malicious Hacker do? What is Vulnerability Research How Do They Go About It Computer Crimes and Implications Module 2: The Hacking Stages Reconnaissance: Footprinting and Social Engineering Scanning Enumeration Gaining Access Escalating Privilege Pilfering Covering Tracks
Creating Backdoors Denial of Service Module 3: The Hacking Techniques: Phishing Evading IDS, Firewalls and detecting Honey Pots Session Hijacking Web Application Security Physical Security Buffer overflows Module 4: System Hacking System Hacking Life Cycle Password Cracking Escalating Privileges Executing Applications Hiding Files Covering Attacks Module 5: Trojans and Backdoors What is a Trojan? Type of Trojans Attack Indications of a Trojan Attack Trojan Horse Construction Kit How to Detect Trojans? Anti-Trojan Software Trojan Remover Backdoor Countermeasures How to Avoid a Trojan Infection Module 6: Sniffers Definition - Sniffing Protocols Vulnerable to Sniffing Wireshark and Tcpdump Types of Sniffing Windows and Linux Sniffing Interactive Replay Attacks Raw Sniffing Tools Features of Raw Sniffing Tools
Module 7: Web Hacking Web Based Password Cracking Techniques Hacking Web Servers Module 8: SQL Injection SQL injection Techniques and Performing How to Test for SQL Injection Vulnerability How Does It Work in SQL Data and Database SQL Injection Tools and others Attacking Against SQL Servers Module 9: Hacking Email accounts Ways for Getting Email Account Information How to Hack Email Accounts Vulnerabilities Email Finder Pro and Email Spider Easy Hack Passwords Creating Strong Passwords Module 10: Hacking Wireless Networks Wireless Essentials Attacks and Hacking Tools Hacking Wireless Networks Wireless Security and Tools Module 11: Windows Hacking Windows Technique Windows Hacking Process Windows Tools Windows Security Module 12: Linux Hacking Linux Essentials Linux Hacking Process Linux Tools Rootkit Linux Security
Module 13: Cryptography Introduction to Cryptography Classical Cryptographic Techniques Cryptography Algorithms Advanced File Encryptor Cryptanalysis Cryptography Attacks Module 14: Penetration Testing Introduction to Penetration Testing (PT) Categories of security assessments Vulnerability Assessment Penetration Testing Types of Penetration Testing Risk Management Project Scope Pentest Service Level Agreements Penetration Testing Tools Module 15: Computer Forensic and Incident Handling Forensic Data and Collection Tools Stages of Forensic Investigation in Tracking Cyber Criminals Key Steps in Forensic Investigations List of Computer Forensics Tools Incident Handling Incident Management Self Study: Module 16: The Other Ways for Hacker Google Hacking Hacking Routers, cable Modems and Firewalls Hacking Mobile Phones, PDA and Handheld devices Bluetooth Hacking VoIP Hacking Spamming Hacking USB Devices Hacking Database Servers Insider Hacking Hacking Web Browsers (Firefox, IE) Viruses and Worms Hacking Global Positioning System (GPS)
Module 17: Hacking Technologies: Internet Content Filtering Techniques Proxy Server Technologies Spying Technologies Firewall Technologies Covert Hacking Exploit Writing Writing Virus Code Credit Card Frauds Hacking and Cheating Online Games Module 18: Security Management Privacy on the internet Securing Laptop Computers Creating Security Policies How to Steal Passwords Threat and Countermeasures Patch Management Security Convergence Data Loss Prevention Case Studies
SCHEDULE AND FACILITIES SCHEDULE AND PRICE Date : 08 12 March 2010 Time : 09:00 17:00 Place : STIKOM BALI, Jl Teungku Umar 222, Denpasar Bali Price : Early Bird (Before 15 February Normal (After 15 February 2010) 2010) Rp. 10.000.000 Rp. 12.000.000.000 The facilities : 1. foresec certified computer hacker Original Training Materials 2. CD Hacking Tools 3. Meeting Packages (Breakfast, Lunch and Coffee Break) 4. Certificate of Attendance from foresec 5. Certificate of Achievement from foresec Exam will be conducted on the last day of training. Students need to pass exam to receive fcch certification 6. FREE One (1) Day Forensic Workshop 7. 3-4 Stars Hotel in Bali from 8 13 March 2010 8. Flight Jakarta Bali Jakarta 9. Transportation Hotel Training Place Hotel 10. City Tour TRAINER Dr. Desmond Devendran Alexander More than 12 years experience in information technology, with emphasis on information security and consulting. Key projects included security assessments, security architecture, business and systems analysis, and software design. Client base included public utilities, civilian aerospace, financial institutions, health maintenance organizations, telecommunications providers, retail, distribution, and manufacturing businesses.
Certifications in: Bachelor of Computer Engineering, Nan yang University Singapore. PHD in Computer Security Science ( George Mason University) Certified Bank Auditor Certified Risk Assessment Associate Certified Information Systems Security Professionals Certified Information Security Auditor ISO 17799 Security Auditor Microsoft Certified System Engineer + Security Global Information Assurance Certification Certified Ethical Hacking Instructor Certified Wireless Network Architect Certified Hacking Forensics Investigator Certified E-business Associates ( Network Security) Certified Cisco Network Associate Certified Cisco Network Professional Cisco Certified Internet Expert GIAC Certified Penetration tester Mile2 Certified Disaster Recovery Specialist Cisco Certified Security Specialist Disaster Recovery and Management Training Certified FISMA implementation Consultant LPT - Licenced Penetration Tester GIAC - Global Internet Assurance Consultant Certified Wimax Engineer Certified Hyperman Engineer Certified Management Training, The American Management Association Exploring Leadership from a Systems Perspective/Complex Problem Solving, City University CHS-II - Certified in Homeland Security Level II, American College of Forensic Examiners International BENEFIT This is the best special package which you will get a lot of knowledge, skill, technique and tools and the important you will the international Certification that will advance your career and also to help you to perform in your current job. In the other side, we will make you to rest in a while after working in the hectic business or project environment by surfing, rest and relax at Pantai Kuta at Bali Island, one of the most beautiful island in the world. We will cover your flight ticket, 3-4 star hotel, and also transportation from and to training center.