Information security is a revolutionary world. Complete and in-depth
understanding how malicious hackers compromising protected information
is no more an option. Constant update of knowledges is one of the most
important factors to secure your organization's information and IT
infrastructure.

Many information security strategies have been failed. Just because they
were designed and built only based on IT point of view. In real life,
that is the biggest mistake! Unfortunately, until today many technical
security courses are focusing only to IT security.

Attend this course and you will clearly understand that take full
control of your network is not difficult. This course simulate real
world hacking step-by-step process. Only appropriate security strategy
allows you to manage that challenge. As we know there is no 100% risk
free, it means only those who have well-prepared incident handling
procedures and mechanisms can survive.

This unique course is designed with 3 primary objectives:

1. To build information security professionals who work with holistic
approach by taking into account IT security, people, proses, environment
and physical security aspects

2. To build the attendees becoming information security practitioners
who are not only know the theories, but also have hands-on experiences
to attack protected systems in various ways, to defense against the
attacks, and to properly manage the incidents

3. To build hacker's mindset among information security professionals


Who should attend?

1. Information security consultants who want to update or to improve
their security knowledges

2. Penetration testers who want to have more successes on defeating
client's security systems by developing better attack strategy and
broadening attack vectors

3. Information security managers and engineers who want to have hands-on
experiences to properly protect their organization's sensitive and
critical information and to demonstrate how easy to compromise unaware
users (for their awareness)


Topics Example

* Step-by-step approach used by malicious hackers
* Stealing CEO's, CFO's and COO's laptop
* Defeating physical access control systems and CCTV
* By passing any firewall to access a protected network over Internet
* Attacking VoIP network
* Hands-on workshop of attacking and defending systems
* Preparing for the incidents

Provided Tools
* Nasty hacker's tools
* Information security officer's tools

For more information: http://www.security-1st.net/btp4th

-- 
Gildas Deograt
_________________________________________________
Support Think Security First 2007 (TSF2007)
Indonesia Information Security Awareness Campaign
http://tsf2007.security-1st.net
_________________________________________________


-- 
www.itcenter.or.id - Komunitas Teknologi Informasi Indonesia 
Gabung, Keluar, Mode Kirim : [EMAIL PROTECTED] 

 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/ITCENTER/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/ITCENTER/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Kirim email ke