All entries by this author

Information Security Training and Certification Schedule

Oct 18th, 2013 | By | Category: Training

INFORMATION SECURITY MANAGEMENT TRACKS 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS) 20 – 25 April 2015 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training 20 – 24 April 2015 ISO 27001 Information Security Management System (ISMS) Lead Implementer Training  23 –  25 April 2015 Security Information and Event Management (SIEM) Training to be […]



ISO 27001 ISMS Lead Implementer Training, 3 Days

Dec 21st, 2010 | By | Category: Training

ISO 27001 Information Security Management System (ISMS) is a controlled approach to managing sensitive company information so that it remains secure. ISMS integrates people, processes and technology, ensures continuous improvement, and especially clearly shows management commitment. This three-day intensive training provides participants with comprehensive and practical coverage of all aspects of implementing ISO27001 for real. […]



Real Time IT Security Monitoring and Audit Using SIEM Technology, 3 Days

Dec 21st, 2010 | By | Category: Training, XSIRT

Effectively manage the security information and events produced by your network is a very important process in holistic information security strategy. It is almost impossible to ensure your information protection without doing appropriate real time log analysis. Who should attend? IT and Information Security Professional, such as: Consultant, Auditor, Manager, Engineer and Administrator. Benefits The […]



Advanced Wireless Hacking Countermeasure Training, 2 Days

Dec 15th, 2010 | By | Category: Training

As organizations provide greater mobility to their users, the risk of threats to security grows and the need for secure wireless networks becomes one of most importance concerns. Without physical boundary and solid security strategy, corporate internal network is just like a sitting duck, waiting to be owned by attacker. Who should attend? IT and […]



Advance Penetration Testing – Wireless, 2 Days

Dec 15th, 2010 | By | Category: Training

Wireless LAN is very popular because it is very easy to implement and cost effective. Those advantages are not only for good people, but also for attacker. Attacking wireless network is very easy since there is no physical boundary. There are too many real cases that sensitive information has been stolen from wireless connection. It […]



Advance Penetration Testing – Web Application, 3 Days

Dec 15th, 2010 | By | Category: Training

Web application is a critical point of vulnerabilities in organization nowadays.  Web application holes have resulted theft in many financial sectors for company, organization, enterprises even compromised browsing machines that visited web sites changed by attacker. Who should attend? IT and Information Security Professional, such as: Consultant, Auditor, Manager, Engineer and Administrator. Benefits This course […]



Advanced Web Application Hacking Countermeasure, 3 Days

Dec 15th, 2010 | By | Category: Training

Attackers are exploiting web application vulnerabilities. The vulnerabilities can be exploited to obtain confidential information and compromise organizational integrity. In consequences, organizations must  integrate strong security measures into the Web application development process. Advanced Web Application Hacking Countermeasures is a security training essential  to have secure web applications by integrating various security measures into the […]



Advance Penetration Testing, 4 Days

Dec 15th, 2010 | By | Category: Training

Advanced Penetration Testing Training



Advanced Hacking Countermeasures Training, 3 Days

Dec 15th, 2010 | By | Category: Training

Information security is a revolutionary world. Complete and in-depth understanding how malicious hackers compromising protected information is no more an option. Constant update of knowledge is one of the most important factors to secure your organization’s critical and sensitive information and IT infrastructure. Many information security strategies have been failed, because they were designed and […]



Certified Information Systems Security Professional (CISSP) Training

Dec 15th, 2010 | By | Category: Training

“Be A World Class Information Security Professional” If you plan to build a career in information security then the CISSP® credential should be your next career goal. “CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement.” ~ ISC2.org Testimonie CISSP#324472 : “Significantly improve my information security knowledge. Very useful […]