The International Certification in IT Security Training Program. fcch. foresec certified computer hacking



Similar documents
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

EC Council Certified Ethical Hacker V8

[CEH]: Ethical Hacking and Countermeasures

CEH Version8 Course Outline

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Detailed Description about course module wise:

Certified Ethical Hacker (CEH)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Certified Cyber Security Analyst VS-1160

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CYBERTRON NETWORK SOLUTIONS

EC-Council. Program Brochure. EC-Council. Page 1

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

EC-Council. Certified Ethical Hacker. Program Brochure

Ethical Hacking & Cyber Security Workshop

LINUX / INFORMATION SECURITY

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

SONDRA SCHNEIDER JOHN NUNES

Hackers are here. Where are you?

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources

CRYPTUS DIPLOMA IN IT SECURITY

Professional Penetration Testing Techniques and Vulnerability Assessment ...

A Systems Engineering Approach to Developing Cyber Security Professionals

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Certified Cyber Security Expert V Web Application Development

Certified Cyber Security Analyst VS-1160

FORBIDDEN - Ethical Hacking Workshop Duration

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Hackers are here. Where are you?

EC-Council Certified Security Analyst (ECSA)

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Loophole+ with Ethical Hacking and Penetration Testing

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

InfoSec Academy Pen Testing & Hacking Track

Ethical Hacking v7 40 H.

Information Security Services

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

FSP-201: Ethical Hacking & IT Security

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Workshop Designed & Powered by TCIL IT, Chandigarh

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Principles of Information Assurance Syllabus

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Analyze. Secure. Defend. Do you hold ECSA credential?

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Defending Against Data Beaches: Internal Controls for Cybersecurity

COB 302 Management Information System (Lesson 8)

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Presented by:!!dave Kennedy (RELIK)"!!!!!Ryan Macfarlane "

Networking: EC Council Network Security Administrator NSA

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Ethical Hacking Course Layout

Course Title: Course Description: Course Key Objective: Fee & Duration:

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

How Spyware and Anti-Spyware Work

Bellevue University Cybersecurity Programs & Courses

CompTIA Security+ (Exam SY0-410)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Penetration Testing. Presented by

Introduction to Cyber Security / Information Security

Cyber Security, Cyber Crimes and Cyber Laws

EC-Council Ethical Hacking and Countermeasures

TUSKEGEE CYBER SECURITY PATH FORWARD

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Toll Free: Official Web:

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Bachelor of Information Technology (Network Security)

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Information Security. Training

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Student Tech Security Training. ITS Security Office

Transcription:

The International Certification in IT Security Training Program fcch foresec certified computer hacking

BACKGROUND Information Technology Security is important thing to your business because you re financial data s, your customer data s, your company data s are your valuable asset. The reasons why security are important as follows: If your organization has an Internet connection or one or two disgruntled employees, your computer systems will get attacked. In fact, Internet usage is increasing 90% of large companies & govt. agencies had computer security breaches in 2001; Three-quarters suffered financial losses Transacting over the web is inevitable. Financial fraud losses were $10,186,400. If this happened in Banking or any internet selling, it would make customer un-trusty and make company income going down. Based on Symantec report 2007, email SPAM was increasing. Hackers did their activities for fun as a game and some of them working with an organization. Every one can download Hacking Tools with FREE and easy to use. Technology is growing very fast and the resource should be followed. Hacking technologies also growing. By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, the in-depth information in this course helps you turn the tables on computer attackers. This course addresses the latest cutting-edge insidious attack vectors and the "oldie-but-goodie" attacks that are still so prevalent, and everything in between. WE TRAIN YOU TO HACK YOUR NETWORKS BEFORE THE BAD GUYS HACK YOURS

REAL PRESENCE OF CYBERCRIME BANK ATTACKED: Be aware, e-banking crime is growing faster 2010. Bank Customers feared online thieves. International Bank Customers can be collapse too in Indonesia. Bank Customers money are missing every 20 seconds. Cyber criminal breaking the bank USD 110 Million World War III could occur in a virtual world. Israel Syria broke the computers before bombing. Cyber Attacks most dangerous after nuclear. South Korea Request to U.S. to prevent the Cyber Attack to North Korea. American Power System invaded China and Russia Cracker Police site victim by Cyber Crime. Department of Health sites infected bad programs. Jabar site collapse, Cyber crime threatens KPU. A big Software House company has groped by cyber criminals 'Lesbian'. Gambling Sites on the PT Pos Web BlackBerry now is the target of criminals in virtual world. Tens of thousands Hotmail Password Leaks on the Internet. ASEAN Hackers gather Indonesia Dominant. Ten thousand new bad or worse programs appear everyday. Wimax tender has disturbed by CyberCrime.

PROVIDERS Multimatics Professional Development Centre (MPDC) was born from Informatics Professional Development Centre (IPDC). Where IPDC is a subsidiary of Informatics Education Ltd (IEL), a multinational corporation listed on the Mainboard of the Stock Exchange of Singapore. IEL is an international franchisor with a network of over 100 centers in 22 countries. MPDC is focused on IT Security, E Business, Supply Chain Management, and General IT with the international certifications from EC Council, PASAS, FORESEC, Achieve Global, Microsoft, Informatics and others. MPDC has conducted training in IT Security for Ethical Hacking, Hacking Forensic and Investigation, Security Analyst, Penetration Testing, IT Security Audit, and IT Security Management from six (6) years ago. MPDC is also one of the first Training center whose provide IT Security Training and Certification in Indonesia. MPDC provides both professionals and corporations with the latest concepts, skills and techniques for striving in the ever increasingly complex and competitive global marketplace. Using a flexible blended solution where training and development are conducted face-to-face session or a combination of both elements of learning. Out of the close to 500 graduates in this high-end certification courses, most of them had already been certified from the top 500 corporations in Indonesia. FORESEC was founded by the Industries leading Cyber Warfare specialists. Its mission is to create an informative Information Security Awareness crowd amongst all where learning security should be accessible by everyone. FORESEC maintains a continuous and strong focus in R&D, resulting in the increase in the capability of offering a wide range of ICT Security products, services and certifications. FORESEC also collaborates with various universities and organization in R&D. FORESEC is premier and trusted ICT security solutions provide and also its a Multimedia Super Corridor status and with a solid track record of providing ICT security solutions and building its intellectual property, FORESEC delivers internationally recognized and enterprise-wide solutions and services. FORESEC has deliver service in some countries in the world: America (USA), Russia, Australia, German, Netherland, Great Britain (GBR), Singapore, Indonesia, Vietnam, Philippine.

INTERNATIONAL CERTIFICATION AND TRAINING PROGRAM fcch foresec certified computer hacker DESCRIPTION FCCH is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. The FCCH presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to Hack -- the norm with the classes that have been available until now. Our course is developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets. MODULES DETAIL Module 1: Hacking Overview and Methodology Problem Definition -Why Security? Essential Terminologies Elements of Security What does a Malicious Hacker do? What is Vulnerability Research How Do They Go About It Computer Crimes and Implications Module 2: The Hacking Stages Reconnaissance: Footprinting and Social Engineering Scanning Enumeration Gaining Access Escalating Privilege Pilfering Covering Tracks

Creating Backdoors Denial of Service Module 3: The Hacking Techniques: Phishing Evading IDS, Firewalls and detecting Honey Pots Session Hijacking Web Application Security Physical Security Buffer overflows Module 4: System Hacking System Hacking Life Cycle Password Cracking Escalating Privileges Executing Applications Hiding Files Covering Attacks Module 5: Trojans and Backdoors What is a Trojan? Type of Trojans Attack Indications of a Trojan Attack Trojan Horse Construction Kit How to Detect Trojans? Anti-Trojan Software Trojan Remover Backdoor Countermeasures How to Avoid a Trojan Infection Module 6: Sniffers Definition - Sniffing Protocols Vulnerable to Sniffing Wireshark and Tcpdump Types of Sniffing Windows and Linux Sniffing Interactive Replay Attacks Raw Sniffing Tools Features of Raw Sniffing Tools

Module 7: Web Hacking Web Based Password Cracking Techniques Hacking Web Servers Module 8: SQL Injection SQL injection Techniques and Performing How to Test for SQL Injection Vulnerability How Does It Work in SQL Data and Database SQL Injection Tools and others Attacking Against SQL Servers Module 9: Hacking Email accounts Ways for Getting Email Account Information How to Hack Email Accounts Vulnerabilities Email Finder Pro and Email Spider Easy Hack Passwords Creating Strong Passwords Module 10: Hacking Wireless Networks Wireless Essentials Attacks and Hacking Tools Hacking Wireless Networks Wireless Security and Tools Module 11: Windows Hacking Windows Technique Windows Hacking Process Windows Tools Windows Security Module 12: Linux Hacking Linux Essentials Linux Hacking Process Linux Tools Rootkit Linux Security

Module 13: Cryptography Introduction to Cryptography Classical Cryptographic Techniques Cryptography Algorithms Advanced File Encryptor Cryptanalysis Cryptography Attacks Module 14: Penetration Testing Introduction to Penetration Testing (PT) Categories of security assessments Vulnerability Assessment Penetration Testing Types of Penetration Testing Risk Management Project Scope Pentest Service Level Agreements Penetration Testing Tools Module 15: Computer Forensic and Incident Handling Forensic Data and Collection Tools Stages of Forensic Investigation in Tracking Cyber Criminals Key Steps in Forensic Investigations List of Computer Forensics Tools Incident Handling Incident Management Self Study: Module 16: The Other Ways for Hacker Google Hacking Hacking Routers, cable Modems and Firewalls Hacking Mobile Phones, PDA and Handheld devices Bluetooth Hacking VoIP Hacking Spamming Hacking USB Devices Hacking Database Servers Insider Hacking Hacking Web Browsers (Firefox, IE) Viruses and Worms Hacking Global Positioning System (GPS)

Module 17: Hacking Technologies: Internet Content Filtering Techniques Proxy Server Technologies Spying Technologies Firewall Technologies Covert Hacking Exploit Writing Writing Virus Code Credit Card Frauds Hacking and Cheating Online Games Module 18: Security Management Privacy on the internet Securing Laptop Computers Creating Security Policies How to Steal Passwords Threat and Countermeasures Patch Management Security Convergence Data Loss Prevention Case Studies

SCHEDULE AND FACILITIES SCHEDULE AND PRICE Date : 08 12 March 2010 Time : 09:00 17:00 Place : STIKOM BALI, Jl Teungku Umar 222, Denpasar Bali Price : Early Bird (Before 15 February Normal (After 15 February 2010) 2010) Rp. 10.000.000 Rp. 12.000.000.000 The facilities : 1. foresec certified computer hacker Original Training Materials 2. CD Hacking Tools 3. Meeting Packages (Breakfast, Lunch and Coffee Break) 4. Certificate of Attendance from foresec 5. Certificate of Achievement from foresec Exam will be conducted on the last day of training. Students need to pass exam to receive fcch certification 6. FREE One (1) Day Forensic Workshop 7. 3-4 Stars Hotel in Bali from 8 13 March 2010 8. Flight Jakarta Bali Jakarta 9. Transportation Hotel Training Place Hotel 10. City Tour TRAINER Dr. Desmond Devendran Alexander More than 12 years experience in information technology, with emphasis on information security and consulting. Key projects included security assessments, security architecture, business and systems analysis, and software design. Client base included public utilities, civilian aerospace, financial institutions, health maintenance organizations, telecommunications providers, retail, distribution, and manufacturing businesses.

Certifications in: Bachelor of Computer Engineering, Nan yang University Singapore. PHD in Computer Security Science ( George Mason University) Certified Bank Auditor Certified Risk Assessment Associate Certified Information Systems Security Professionals Certified Information Security Auditor ISO 17799 Security Auditor Microsoft Certified System Engineer + Security Global Information Assurance Certification Certified Ethical Hacking Instructor Certified Wireless Network Architect Certified Hacking Forensics Investigator Certified E-business Associates ( Network Security) Certified Cisco Network Associate Certified Cisco Network Professional Cisco Certified Internet Expert GIAC Certified Penetration tester Mile2 Certified Disaster Recovery Specialist Cisco Certified Security Specialist Disaster Recovery and Management Training Certified FISMA implementation Consultant LPT - Licenced Penetration Tester GIAC - Global Internet Assurance Consultant Certified Wimax Engineer Certified Hyperman Engineer Certified Management Training, The American Management Association Exploring Leadership from a Systems Perspective/Complex Problem Solving, City University CHS-II - Certified in Homeland Security Level II, American College of Forensic Examiners International BENEFIT This is the best special package which you will get a lot of knowledge, skill, technique and tools and the important you will the international Certification that will advance your career and also to help you to perform in your current job. In the other side, we will make you to rest in a while after working in the hectic business or project environment by surfing, rest and relax at Pantai Kuta at Bali Island, one of the most beautiful island in the world. We will cover your flight ticket, 3-4 star hotel, and also transportation from and to training center.