Information security is a revolutionary world. Complete and in-depth understanding how malicious hackers compromising protected information is no more an option. Constant update of knowledges is one of the most important factors to secure your organization's information and IT infrastructure.
Many information security strategies have been failed. Just because they were designed and built only based on IT point of view. In real life, that is the biggest mistake! Unfortunately, until today many technical security courses are focusing only to IT security. Attend this course and you will clearly understand that take full control of your network is not difficult. This course simulate real world hacking step-by-step process. Only appropriate security strategy allows you to manage that challenge. As we know there is no 100% risk free, it means only those who have well-prepared incident handling procedures and mechanisms can survive. This unique course is designed with 3 primary objectives: 1. To build information security professionals who work with holistic approach by taking into account IT security, people, proses, environment and physical security aspects 2. To build the attendees becoming information security practitioners who are not only know the theories, but also have hands-on experiences to attack protected systems in various ways, to defense against the attacks, and to properly manage the incidents 3. To build hacker's mindset among information security professionals Who should attend? 1. Information security consultants who want to update or to improve their security knowledges 2. Penetration testers who want to have more successes on defeating client's security systems by developing better attack strategy and broadening attack vectors 3. Information security managers and engineers who want to have hands-on experiences to properly protect their organization's sensitive and critical information and to demonstrate how easy to compromise unaware users (for their awareness) Topics Example * Step-by-step approach used by malicious hackers * Stealing CEO's, CFO's and COO's laptop * Defeating physical access control systems and CCTV * By passing any firewall to access a protected network over Internet * Attacking VoIP network * Hands-on workshop of attacking and defending systems * Preparing for the incidents Provided Tools * Nasty hacker's tools * Information security officer's tools For more information: http://www.security-1st.net/btp4th -- Gildas Deograt _________________________________________________ Support Think Security First 2007 (TSF2007) Indonesia Information Security Awareness Campaign http://tsf2007.security-1st.net _________________________________________________ -- www.itcenter.or.id - Komunitas Teknologi Informasi Indonesia Gabung, Keluar, Mode Kirim : [EMAIL PROTECTED] Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/ITCENTER/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/ITCENTER/join (Yahoo! ID required) <*> To change settings via email: mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/