---------- Forwarded message ----------
From: gogon <[EMAIL PROTECTED]>
Date: Sep 14, 2006 9:07 PM
Subject: Fwd:
To: [EMAIL PROTECTED]



---------- Forwarded message ----------
From: Yulverina <[EMAIL PROTECTED]>
Date: Sep 14, 2006 3:04 PM
Subject:
To: [EMAIL PROTECTED]

  Dear Sir/Madam,

[EMAIL PROTECTED]

Saya ingin mengundang rekan-rekan sekalian dalam acara 1 Day security
Workshop.

Sehubungan dengan banyaknya permintaan untuk topic IT Security *"Hacking
Forensic" *maka kembali kami menyelenggarakan 1 Day IT Security Workshop
seperti dibawah ini.

Terima kasih atas perhatian anda dan mohon maaf bila email ini mengganggu
anda.
 ------------------------------

*1 Day Security Workshop*

*HACKING *I* **FORENSIC WORKSHOP*

* *

*By: Desmond Alexander **(CEH, CHFI, CEA, CEP, CEC, LPT, and CISSP)** *

*(IT Security Expert)** *

* *

*Saturday, 7 October 2006*

*Informatics** Building** 2nd Floor*

*Jl. Prof. DR. Satrio 296, Karet – Kuningan*

*Jakarta** Selatan – 12940*

* *

*Investment** :*

*Professional: Rp 500.000,-*

*Students: Rp 250.000,-*

* *

*Online Registration:*

www.pspcert.com/hack_forensic.asp

* *
*
------------------------------
*

* *

*WORKSHOP OBJECTIVE*



The purpose of this workshop is to give end users hands on training on how
to access their own security posture for their organization. This workshop
will also identify weaknesses of current security products and software's
ranging from Microsoft platforms and also other operating system. There
would be also a forensic investigation training included in this workshop.
The tools that would be explained are exploit codes from major hacker
community and the vulnerabilities that are current and latest threats.



* *

*BENEFIT FOR PARTICIPANT*

* *

   1. The hacking session intensive environment gives each participant
   in-depth knowledge and practical experience with the current essential
   security systems. Students will begin by understanding how perimeter
   defenses work and then be lead into scanning and attacking their own
   networks, no real network is harmed. Students then learn how intruders
   escalate privileges and what steps can be taken to secure a system.



*2.*        The forensic session will give participants the necessary skills
to identify an intruder's footprints and to properly gather the necessary
evidence to prosecute. Many of today's top tools of the forensic trade will
be taught during the workshop, including software, and specialized
technique. If you or your organization requires the knowledge or skill to
identify, track, and prosecute the cyber-criminal, then this is the workshop
for you.

* *

*WORKSHOP OUTLINE*



*SESSION-1: Network Security *

* *

• *Developing a Security Policy:*

Focus on creating an effective security policy strategy in order to deter
threats. Sample Security Policy would be given to the participants.

• *Firewall Configuration Strategies:*

Enlightening participants on common mistakes when implementing a firewall.

• *Working with Proxy Servers and Application-Level Firewalls : *

Educate users on the configuration strategies on a proxy server and
application level firewall.

• *Authenticating Users:*

Guide users on issues of User Authentication, Client Authentication and
Session Authentication

• *Choosing a Bastion Host:*

Bastion host installation, selection and positioning and an explanation on
how to make the bastion defend independently.

• *IDS and IPS:*

Explained Vulnerabilities and Benefits of having an IDS or IPS and
configuration guidelines



*SESSION-2: Computer Hacking and Countermeasures*

* *

• *Information Gathering: *

Highlight the common places that hackers would want to look for before
hacking into your computer.

• *Scanning:*

Discuss the methods hackers would use to gain valuable information with
regards to network posture and services in the organization.

• *Vulnerability Assessment:*

Hackers would want to access your organization by identifying the
vulnerabilities in the operating system.

• *Gaining Access & Maintaining:*

Demonstration explains how web defacement is done and how bad guys gain
access with existing user name and password.

• *Clearing Evidence:*

Underline the common techniques hackers would use to clear the evidence.
Methods such as Steganography and others would be taught.



*SESSION-3: Computer Forensics*

* *

• *Computer Investigation Process:*

A clear understanding of public and private investigation would be given to
participants on what kind of procedures should be enforced to facilitate a
computer forensics.

• *Cyber Law:*

What you should know about different types of cyber crime and cyber law in
place as per International Standards.

• *Computer Forensics Tools:*

A thorough analysis tool would be introduced based and given hands on
training on real investigation standards.

* *

*THE WORKSHOP WILL BENEFIT FOR:*

* *

   1. Police, Defense and Military personnel
   2. System Administrator
   3. Legal Professional
   4. Banking and Insurance professional
   5. Security Officer
   6. Security Professional
   7. System Auditor
   8. IT Consultant
   9. University Student
   10. Anyone who is concerned about the integrity of the network
   infrastructure.

* *

* *

*THE SPEAKER*

* *

*Mr. Desmond Devendran Alexander*

More than 8 years experience in information technology, with emphasis on
information security and consulting. Key projects included security
assessments, security architecture, business and systems analysis, disaster
recovery planning and implementation project, and software design. Client
base included public utilities, civilian aerospace, financial institutions,
health maintenance organizations, telecommunications providers, retail,
distribution, and manufacturing businesses.

* *

*Desmond's Certification*

·        Certified Information Systems Security Professionals (CISSP)

·        Certified Ethical Hacker Instructor

·        Certified Ethical Hacker (CEH)

·        Certified Wireless Network Architect

·        Certified Information Security Auditor

·        Global Information Assurance Certification

·        Certified E-Business Security Associate (CEA)

·        Certified E-Business Associate (Network Security)

·        Certified Computer Hacking Forensic Investigator (CHFI)

·        Certified Cisco Network Associate (CCNA)

·        Certified Cisco Network Professional (CCNP)

·        Certified Management Training, The American Management Association

·        Exploring Leadership from a Systems Perspective/Complex Problem
Solving, City University

·        Certified in Homeland Security Level II (CHS-II)

·        Bachelor of Computer Engineering at Nan Yang University Singapore

·        Presently pursuing Masters of Security Science

* *

*Professional Membership*

·        American Society for Industrial Security

·        International Society of Crime Prevention Practitioners

·        International Crime Free Association Charter Member#6

·        International CPTED Association

·        National Apartment Association

·        Crime Prevention Coalition of America

·        California Association of Licensed Investigators

·        California Crime Prevention Officers Association

·        California Robbery Investigators Association

·        Retail Special Agent Associates

·        Australian Cyber Crime Community



* *

*NO ACCOUNT*

BCA – H.R Rasuna Said Branch

Account No. : 5700-302-689

PT Lifelong Learning



* *

*INFORMATION & REGISTRATION*

YULVERINA

Tel: (+62 21) 526 0388 Ext. 402

Fax: (+62 21) 5296 2830

HP: 0812-998-9654

[EMAIL PROTECTED]

*online registration:* www.pspcert.com/hack_forensic.asp


 ------------------------------



*REGISTRATION FORM*

*HACKING **I** FORENSIC WORKSHOP*

October 7, 2006



Please fill this form completely and send by email to [EMAIL PROTECTED]

or fax to 021-52962830

* *

*PERSONAL*



Name                    : _________________________________________________

Phone                    : _____________________ Mobile:
_____________________

Email                     :
_________________________________________________

Address                 : _________________________________________________





*COMPANY*



Company Name     : _________________________________________________

Address                 : _________________________________________________

Phone                    : _________________________________________________

Fax                       :
_________________________________________________

Job Title                 :
_________________________________________________

Registered by         : _________________________________________________

*(Company or Individual)*


 ------------------------------

*Informatics Policy*

* *

1.      In order to secure a place, all registration form and workshop fees
must be sent to Informatics by not later than one week before workshop.
Cancellation must be made in writing and must reach Informatics before one
week before workshop against which a 50% refund will be given.

2.      If Informatics cancels the workshop, for whatever reason like not
enough number of students, Informatics shall inform the participants in
writing. Payment done prior to the cancellation amount by Informatics shall
be fully refunded.

3.      If participant cancels his attendance to the workshop within one
week prior to or on the training day, the participants will still have to
pay the workshop fee as indicated in the invoice.
 ------------------------------

The undersigned fully accepts the Informatics Policy of this form.



*Name:
                                                                       *

*Date:  *





Thanks n regards,

*Yulverina*

Informatics Professional Development Center

Pusat Sertifikasi Profesi



Tel.  (62 21) 526-0388 Ext. 402

Fax. (62 21) 5296-2830

HP. 0812-998 9654

Email: [EMAIL PROTECTED]

URL: www.pspcert.com







* *


-- 


☻-9☺9☺n♫eZ-☻


-- 


☻-9☺9☺n♫eZ-☻


[Non-text portions of this message have been removed]



-- 
www.itcenter.or.id - Komunitas Teknologi Informasi Indonesia 
Info, Gabung, Keluar, Mode Kirim : [EMAIL PROTECTED] 
:: Hapus bagian yang tidak perlu (footer, dst) saat reply! :: 
## Jobs: itcenter.or.id/jobs ## Bursa: itcenter.or.id/bursa ##
$$ Iklan/promosi : www.itcenter.or.id/sponsorship $$

[@@] Jaket ITCENTER tersedia di http://shop.itcenter.or.id 

 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/ITCENTER/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/ITCENTER/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to