• No results found

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

N/A
N/A
Protected

Academic year: 2021

Share "The International Certification in IT Security Training Program. fcch. foresec certified computer hacking"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

(1)

The International Certification in

IT Security Training Program

fc

ch

(2)

BACKGROUND

Information Technology Security is important thing to your business because you’re financial data’s, your customer data’s, your company data’s are your valuable asset. The reasons why security are important as follows:

• If your organization has an Internet connection or one or two disgruntled employees, your computer systems will get attacked. In fact, Internet usage is increasing

• 90% of large companies & govt. agencies had computer security breaches in 2001; Three-quarters suffered financial losses

• Transacting over the web is inevitable. Financial fraud losses were $10,186,400. If this happened in Banking or any internet selling, it would make customer un-trusty and make company income going down.

• Based on Symantec report 2007, email SPAM was increasing.

• Hackers did their activities for fun as a game and some of them working with an organization.

• Every one can download Hacking Tools with FREE and easy to use.

• Technology is growing very fast and the resource should be followed. Hacking technologies also growing.

By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, the in-depth information in this course helps you turn the tables on computer attackers. This course addresses the latest cutting-edge insidious attack vectors and the "oldie-but-goodie" attacks that are still so prevalent, and everything in between.

W

W

E

E

T

T

R

R

A

A

I

I

N

N

Y

Y

O

O

U

U

T

T

O

O

H

H

A

A

C

C

K

K

Y

Y

O

O

U

U

R

R

N

N

E

E

T

T

W

W

O

O

R

R

K

K

S

S

B

(3)

REAL PRESENCE OF CYBERCRIME

BANK ATTACKED: Be aware, e-banking crime is

growing faster 2010.

Bank Customers feared online thieves.

International Bank Customers can be collapse too in Indonesia.

Bank Customers money are missing every 20 seconds.

Cyber criminal breaking the bank USD 110 Million

World War III could occur in a virtual world.

Israel Syria broke the computers before bombing.

Cyber Attacks most dangerous after nuclear.

South Korea Request to U.S. to prevent the Cyber Attack to North

Korea.

American Power System invaded China and Russia Cracker

Police site victim by Cyber Crime.

Department of Health sites infected bad programs.

Jabar site collapse, Cyber crime threatens KPU.

A big Software House company has groped by cyber criminals

'Lesbian'.

Gambling Sites on the PT Pos Web

BlackBerry now is the target of criminals in virtual world.

Tens of thousands Hotmail Password Leaks on the Internet.

ASEAN Hackers gather Indonesia Dominant.

Ten thousand new bad or worse programs appear everyday.

(4)

PROVIDERS

Multimatics Professional Development Centre (MPDC) was born from Informatics Professional Development Centre (IPDC). Where IPDC is a subsidiary of Informatics Education Ltd (IEL), a multinational corporation listed on the Mainboard of the Stock Exchange of Singapore. IEL is an international franchisor with a network of over 100 centers in 22 countries.

MPDC is focused on IT Security, E Business, Supply Chain Management, and General IT with the international certifications from EC Council, PASAS, FORESEC, Achieve Global, Microsoft, Informatics and others. MPDC has conducted training in IT Security for Ethical Hacking, Hacking Forensic and Investigation, Security Analyst, Penetration Testing, IT Security Audit, and IT Security Management from six (6) years ago. MPDC is also one of the first Training center whose provide IT Security Training and Certification in Indonesia.

MPDC provides both professionals and corporations with the latest concepts, skills and techniques for striving in the ever increasingly complex and competitive global marketplace. Using a flexible blended solution where training and development are conducted face-to-face session or a combination of both elements of learning. Out of the close to 500 graduates in this high-end certification courses, most of them had already been certified from the top 500 corporations in Indonesia.

FORESEC was founded by the Industries leading Cyber Warfare specialists. Its mission is to create an informative Information Security Awareness crowd amongst all where learning security should be accessible by everyone. FORESEC maintains a continuous and strong focus in R&D, resulting in the increase in the capability of offering a wide range of ICT Security products, services and certifications. FORESEC also collaborates with various universities and organization in R&D.

(5)

INTERNATIONAL CERTIFICATION AND

TRAINING PROGRAM

fc

ch

foresec certified computer hAcker

DESCRIPTION

FCCH is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. The FCCH presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to “Hack” -- the norm with the classes that have been available until now. Our course is developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets.

MODULES DETAIL

Module 1: Hacking Overview and Methodology

ƒ Problem Definition -Why Security? ƒ Essential Terminologies

ƒ Elements of Security

ƒ What does a Malicious Hacker do? ƒ What is Vulnerability Research ƒ How Do They Go About It

ƒ Computer Crimes and Implications

Module 2: The Hacking Stages

• Reconnaissance: Footprinting and Social Engineering

(6)

• Creating Backdoors

• Denial of Service

Module 3: The Hacking Techniques: • Phishing

• Evading IDS, Firewalls and detecting Honey Pots • Session Hijacking

• Web Application Security • Physical Security

• Buffer overflows

Module 4: System Hacking • System Hacking Life Cycle • Password Cracking

• Escalating Privileges • Executing Applications • Hiding Files

• Covering Attacks

Module 5: Trojans and Backdoors

ƒ What is a Trojan? ƒ Type of Trojans Attack

ƒ Indications of a Trojan Attack ƒ Trojan Horse Construction Kit ƒ How to Detect Trojans?

ƒ Anti-Trojan Software ƒ Trojan Remover

ƒ Backdoor Countermeasures ƒ How to Avoid a Trojan Infection

Module 6: Sniffers

ƒ Definition - Sniffing

ƒ Protocols Vulnerable to Sniffing ƒ Wireshark and Tcpdump

ƒ Types of Sniffing

ƒ Windows and Linux Sniffing ƒ Interactive Replay Attacks ƒ Raw Sniffing Tools

(7)

Module 7: Web Hacking

• Web Based Password Cracking Techniques • Hacking Web Servers

Module 8: SQL Injection

ƒ SQL injection Techniques and Performing ƒ How to Test for SQL Injection Vulnerability ƒ How Does It Work in SQL Data and Database ƒ SQL Injection Tools and others

ƒ Attacking Against SQL Servers

Module 9: Hacking Email accounts

ƒ Ways for Getting Email Account Information ƒ How to Hack Email Accounts

ƒ Vulnerabilities

ƒ Email Finder Pro and Email Spider Easy ƒ Hack Passwords

ƒ Creating Strong Passwords

Module 10: Hacking Wireless Networks • Wireless Essentials

ƒ Attacks and Hacking Tools ƒ Hacking Wireless Networks ƒ Wireless Security and Tools

Module 11: Windows Hacking • Windows Technique

• Windows Hacking Process • Windows Tools

• Windows Security

Module 12: Linux Hacking • Linux Essentials

• Linux Hacking Process • Linux Tools

• Rootkit

(8)

Module 13: Cryptography

• Introduction to Cryptography

• Classical Cryptographic Techniques Cryptography Algorithms

• Advanced File Encryptor • Cryptanalysis

• Cryptography Attacks Module 14: Penetration Testing

• Introduction to Penetration Testing (PT) • Categories of security assessments • Vulnerability Assessment

• Penetration Testing

• Types of Penetration Testing • Risk Management

• Project Scope

• Pentest Service Level Agreements Penetration Testing Tools

Module 15: Computer Forensic and Incident Handling • Forensic Data and Collection Tools

• Stages of Forensic Investigation in Tracking Cyber Criminals • Key Steps in Forensic Investigations

• List of Computer Forensics Tools • Incident Handling

• Incident Management Self Study:

Module 16: The Other Ways for Hacker • Google Hacking

• Hacking Routers, cable Modems and Firewalls • Hacking Mobile Phones, PDA and Handheld devices • Bluetooth Hacking

• VoIP Hacking • Spamming

• Hacking USB Devices • Hacking Database Servers • Insider Hacking

• Hacking Web Browsers (Firefox, IE) • Viruses and Worms

(9)

Module 17: Hacking Technologies:

• Internet Content Filtering Techniques • Proxy Server Technologies

• Spying Technologies • Firewall Technologies • Covert Hacking

• Exploit Writing • Writing Virus Code • Credit Card Frauds

• Hacking and Cheating Online Games

Module 18: Security Management • Privacy on the internet

• Securing Laptop Computers • Creating Security Policies • How to Steal Passwords • Threat and Countermeasures • Patch Management

(10)

SCHEDULE AND FACILITIES

SCHEDULE AND PRICE

Date : 08–12 March 2010 Time : 09:00 – 17:00

Place : STIKOM BALI, Jl Teungku Umar 222, Denpasar Bali

Price :

Early Bird (Before 15 February

2010) Normal (After 15 February 2010)

Rp. 10.000.000 Rp. 12.000.000.000

The facilities :

1. foresec certified computer hAcker – Original Training Materials

2. CD – Hacking Tools

3. Meeting Packages (Breakfast, Lunch and Coffee Break) 4. Certificate of Attendance from foresec

5. Certificate of Achievement from foreSEC

Exam will be conducted on the last day of training. Students need to pass exam to receive fCCH certification

6. FREE One (1) Day Forensic Workshop 7. 3-4 Stars Hotel in Bali from 8 – 13 March 2010 8. Flight Jakarta – Bali – Jakarta

9. Transportation Hotel – Training Place – Hotel 10. City Tour

TRAINER

Dr. Desmond Devendran Alexander

(11)

Certifications in:

• Bachelor of Computer Engineering, Nan yang University Singapore. • PHD in Computer Security Science ( George Mason University) • Certified Bank Auditor

• Certified Risk Assessment Associate

• Certified Information Systems Security Professionals • Certified Information Security Auditor

• ISO 17799 Security Auditor

• Microsoft Certified System Engineer + Security • Global Information Assurance Certification • Certified Ethical Hacking Instructor

• Certified Wireless Network Architect • Certified Hacking Forensics Investigator

• Certified E-business Associates ( Network Security) • Certified Cisco Network Associate

• Certified Cisco Network Professional • Cisco Certified Internet Expert

• GIAC Certified Penetration tester

• Mile2 Certified Disaster Recovery Specialist • Cisco Certified Security Specialist

• Disaster Recovery and Management Training • Certified FISMA implementation Consultant • LPT - Licenced Penetration Tester

• GIAC - Global Internet Assurance Consultant • Certified Wimax Engineer

• Certified Hyperman Engineer

• Certified Management Training, The American Management Association • Exploring Leadership from a Systems Perspective/Complex Problem

Solving, City University

• CHS-II - Certified in Homeland Security Level II, American College of Forensic Examiners International

BENEFIT

References

Related documents

on the study of the acceleration of the body is considered to be valid and reliable for predicting the risk of falling or for discriminating between population groups with

training” [59]. The title encompasses the content of the session. Clearly, public health deficiencies in veterinary education are recognized by the AAVMC and ASPH. Should the

We hypothesized that: (1) learning goals would have stronger relations with DT applications (both personal use and classroom application) than would performance goals, and (2)

maximum leaf unigenes with known metabolic pathways, we used the KAAS server to assign sequences with KEGG orthology (KO) terms and their respective KEGG maps.. Highly

Park et al, 1999 ). The two maize genes are compared to their shared single orthologs in the Sorghum, fox- tail millet, rice and Brachypodium genomes. The conserved

“Monday to Friday (classes are not held on weekends and holidays” and the class schedule is “9:30 am to 3:30 pm”. In her written complaint XXXXX stated “course does not

Anyone who want to make a carrier in web penetration testing Penetration testers who want to take their skills to next level Anyone who wants to learn about web hacking and security

Before playing this piece, your teacher will clap a rhythm pattern.. Echo this pattern for