Search  
in  
http://www.cce.ateneo.edu/announcements/new-executive-directors-message
FamBiz in Cebu
Achieve knowledge from noted experts in their respective fields
Mid Year Economic Briefing
Empowering of Leaders Today
Committed to Serve
WER NEW BANNER
Last Name:
First Name:
Mobile #:
Email:
""

Network and Information Security

Course Name Network and Information Security
Schedule October 6, 2017 - October 7, 2017

Friday - Saturday 

9:00 am - 5:00 pm

Price: Php 12,800
Description

Network and Information Security is designed to provide network professionals and IT managers, with a broad view of the field of ethical hacking and information security. Basic concepts to be discussed will include the hacking process, developing an IT security plan and best practices it mitigating breaches in IT security in your company.

You are given hands-on exposure to ethical hacking tools, that enable you to gain the skills and knowledge necessary to understand the technical risks related to managing an information security program within an organization. Case studies and business examples will be included in this course to complement the conceptual coverage to provide real-world context.

Objectives

After this course, you will:

1. Identify your organization’s IT security needs;

2. Develop an IT security plan, customized to the needs of your company; 

3. Plan, execute and harden your company’s IT security posture; and

4. Hack targets of evaluation to gain insight on how hackers get in

    and out of your systems.

Who should attend

Networking professionals, IT managers, and decision-makers that need and want to understand the security solutions that exist today.

Outline

I.     Introduction to Information Security

II.    Introduction to Ethical Hacking

       and how it differs from “hacking”

III.   Top Trends in Information Security 

IV.   The Hacking Process

       (Kali Linux is part of the tool-set of the course.)

       A. Gathering Information

           1. Find information about people

           2. Profile websites

           3. Retrieve lost information from websites

           4. Email Tracking

       B. Gaining Access

           1. Google Hacking

           2. Hacking Passwords

           3. Sniffers

           4. Credit Card Fraud

           5. Identity Theft

           6. Sniffers

           7. Piracy

           8. Web attacks

           9. DOS and DDOS

           10. Piracy

           11. Corporate Espionage

           12. WiFi Hacking and Wire-chalking

           13. Social Engineering

           14. Phishing

       C. Clearing Tracks

           1. How not to get caught

           2. Create Fake Identities

           3. Stay anonymous in the Web

       D. Mitigation Techniques 

V.    Consultation. Developing your IT Security

       Plan. (Templates will be provided)

 

Note: The course does not guarantee proficiency in the tools demonstrated in two days. It guarantees awareness of the hacking techniques and the knowledge of how to prevent such from happening.

Resource Speakers
Mr. Chino Antonio S. Rodriguez

is a Product Consultant at Danateq Philippines, Inc. Prior to this, he was the Manager of the Computing Services Group, Information Technology Resource Management Office, of the Ateneo de Manila University.