Monday, January 14, 2008

Globalknowledge Associates Singapore IT Security Seminar

Singapore  IT Security Seminar
Training Fee: P 59,500.00 (+VAT)
Holiday Inn Hotel, Singapore
March 13-14, 2008 | Thur-Fri  |  9am-5pm

 


Fee includes: Airfare (Roundtrip), Hotel accommodation (sharing) for 2 days and 1 night, food, 6 training manuals and 6 Global Knowledge certificates.


 


TOPICS:


 


System Forensics, Investigation & Response


- Mr. Ariel Ilumin, enCase Certified, CIDG Philippines


           


Do you know what to do if your organization's security is compromised? Threats of computer crime against an organization's infrastructure have grown substantially, but there are steps you can take. In this course, you apply the latest Windows-based computer forensic techniques to uncover illicit activity and recover lost data. Every crime leaves behind clues. With the right tools, you can effectively respond to and counteract security threats.


 


Network Penetration Testing & Ethical Hacking


- Mr. Ariel Ilumin, enCase Certified, CIDG Philippines


 


Find Security Flaws Before the Bad Guys Do


Security vulnerabilities such as weak configurations, unpatched systems, and botched architectures continue to plague organizations. Enterprises need people who can find these flaws in a professional manner to help eradicate them from our infrastructures. Lots of people claim to have penetration testing, ethical hacking, and security assessment skills, but precious few can apply these skills in a methodical regimen of professional testing to help make an organization more secure. This class covers the ingredients for successful network penetration testing to help attendees improve their enterprise's security stance.


 


Assessing and Security Wireless Networks


- Mr. Eric Macatunggal, CCNA, Wireless Technology expert


           


As organizations provide greater mobility to their users, the risk of threats to security grows and the need for secure wireless networks becomes of paramount concern. In this course, you gain the skills to defend against attacks and maintain security within your wireless network. You learn to detect weakness in your existing network and design and configure a cost-effective security solution.


 


Securing Windows


- Mr. Wilbert Ontoy, MCSE, MCSA, Oracle Certified, Certified Ethical Hacker


 


The Securing Windows course is a comprehensive curriculum for securing Windows networks. This program brings the confusing complexity of Windows security into clear focus by starting with foundational security services, such as Active Directory and Group Policy, and advancing in a logical progression to particular products or features which rely on these foundations, such as IIS and IPSec.


 


 


Securing Oracle


- Mr. Wilbert Ontoy, MCSE, MCSA, Oracle Certified, Certified Ethical Hacker


 


Experts agree that Oracle is one of the most complex software packages available today. Unfortunately, complexity often introduces an increased risk for vulnerabilities. These vulnerabilities are being increasingly targeted by attackers.


 


Throughout the course the student will be exposed to the database as seen through the eyes of an attacker, including public and unreleased techniques that are used to compromise the integrity of the database or escalate a user's privileges. In this fashion, the student gains a better understanding of how an attacker sees a database as a target, and how we can configure the database to be resistant to known and unknown attacks.


 


Securing Unix / Linux


- Mr. Mike Liguit, Linux expert, Network Security specialist


           


The courses designed to teach individuals about securing Linux and Unix. Content is obviously dictated by course duration, but a good course will instruct the student about the various threats to the *nix platform and the countermeasures that can be brought to bear to defend against them. In most cases the student would be expected to have a reasonable understanding of *nix and be able to navigate around it.


           


Experience in-depth coverage of Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems including vulnerabilities in the password authentication system, file system, virtual memory system, and in common network protocols such as NFS, NIS, and the Unix RPC mechanism. Learn the exact steps necessary to secure the two most common Unix flavors-- Solaris and Linux-- and get specific advice for securing some of the most common Internet services on the Unix platform, including Apache, WU-FTPD, Sendmail, and BIND


 


Terms: Schedules are subject to reconfirmation.


 


Register Now!


 


Global Knowledge Associates, Inc.


2502B West Tower, PSE Bldg. Exchange Road, Ortigas Center, Pasig City, Philippines


Tel. Nos. (632) 683-0969  |  637-3657


Mobile: (0921) 532-8150; (0918) 314-0542


Email: sandra@globalknowledgeph.com; sandra_medalla@yahoo.com


URL: www.globalknowledgeph.com

4 comments:

wilson chua said...

Please let Sir Ariel Ilumin know that i am in Singapore and would love to treat him to lunch or dinner when he gets here.

my singapore cp is 9101-4508

penoycentral said...

sir wilson,
i've already notified sandra of globalknowledge associates

win b. said...

bert o.,musta?contact me wnzeiz@yahoo.com.tnx

Daniel Craig said...

Hello, I was looking around for a while searching for computer security threats and I happened upon this site and your post regarding nowledge Associates Singapore IT Security Seminar | penoycentral.net, I will definitely this to my computer security threats bookmarks!