Category Archives: Security

SECURITY ANALYSIS UTILIZING SOFTWARE SYSCAT

EVENT

09 – 10 Oktober 2017 | Rp. 7.000.000/person di Yogyakarta
13 – 14 November 2017 | Rp. 7.000.000/person di Yogyakarta
11 – 12 Desember 2017 | Rp. 7.000.000/person di Yogyakarta

 

TRAINING INTRODUCTION SECURITY ANALYSIS:

Security incidents or crime often occur within all types of industries. It is very often that similar incidents/crimes reoccur due to inappropriate lesson learned from previous incidents/crimes, or inability to analyze the patterns or trends.

In order to prevent similar incident from recurring, an in-depth analysis is required; thus crime trend analysis and root-cause analysis is required. In this training, participants shall be guided on performing crime trend analysis, root-cause analysis, and benefit-cost analysis.

By utilizing SYSCAT, users can perform root-cause analysis systematically.

 

TRAINING MATERIAL OUTLINE SECURITY ANALYSIS:

  • Introduction to Crime Trend Analysis + Exercise
  • Introduction to Root-Cause Analysis + Exercise
  • Introduction to CPTED (Crime Prevention Through Environmental Design)

(Laptops installed with SYSCAT)

  • Introduction to Benefit-Cost Analysis
  • Explanation on how to use software SYSCAT
  • SYSCAT Operation Exercise
  • Summary

 

EXPLANATION ABOUT THE SOFTWARE TRAINING SECURITY ANALYSIS:

SYSCAT is the first and only Security Incident Cause Analysis software to assist security function in identifying not only the immediate factor, but further more to the triggering factors. The software is an assistance tool, guiding the user in identifying not only the triggering factors but also the potential recommendations.

Below table shows the comparison between manual SVA/Risk Analysia and SYSCAT.

Compared Item Manual Cause Identification SYSCAT
Immediate Cause Analysis By intuition Standardized and Systematic
Triggering Factor Analysis By intuition and subjective Guided by system
Recommendation By intuition and subjective Guided by system
Filing Paper-filing, easily lost Kept in Database

By attending this training, participants will receive:

  1. SYSCAT (Systematic Cause Analysis Tool) Software
  2. Training on how to operate SYSCAT
  3. Knowledge on Crime Trend Analysis, Root-Cause Analysis and Benefit-Cost Analysis.
  4. All future updates regarding SYSCAT (exclusively for first training batch, limited offer)

 

WHO SHOULD ATTEND THIS SECURITY ANALYSIS TRAINING?

Any employees holding security functions and/or assigned to perform root-cause analysis, which then to improve existing security system to prevent incidents or crime from reoccurring.

NOTES:

During the registration, participants are expected to bring and handover their laptops for FASRIM installation. The computer must be in Administrator log-in, which will allow us to install the software, including the following supporting software, i.e. Microsoft SQL Server and Microsoft Visual Studio. The laptop must be installed with Windows 7 or 8.

TRAINING INSTRUCTOR SECURITY ANALYSIS:   

Win Leftian Noor, SE., MM. ICPS.

Win Noor, SE., MM., ICPS is a security practitioner and an expert with an educational background Master Degree in Management, and a certified ICPS (International Crime Prevention Specialist) which supports him in developing a well-planned, systematic approach to security management.

He is well-experienced in performing various security functions, e.g.:

  • development of Security Management System, and 3 year Security Strategic Goals/Objectives,
  • development of security procedures, Security Unrest Plan, and Crisis Management Plan,
  • development of Security Work Programs and budgets, etc

He also developed security approaches such as: Crime Diamond Theory and Security Hierarchy of Risk Control. He focuses on Security Risk Management and Analysis by performing research and observation, and by adapting various analysis from other disciplines to security, e.g.: Benefit-Cost Analysis, Risk Management, Root-Cause Analysis (Ishikawa Fishbone Analysis), FMEA (Failure-Mode and Effect Analysis),  SCAT (Systematic Cause Analysis Technique), Trend Analysis, Statistical Analysis, etc. To date, he has developed concepts for two security software, i.e.: FASRIM (Facility Security Risk Management) and SYSCAT (Systematic Cause Analysis Tool).

VENUE :

Yogyakarta (Ibis Styles Hotel/ Ibis Malioboro Hotel/ Jambuluwuk Hotel/ Cavinton Hotel/ Grand Zuri Hotel, dll)

TRAINING DURATION  SECURITY ANALYSIS:

2 days

 TRAINING TIME:

  • 09 Oct 2017-10 Oct 2017
  • 13 Nov 2017-14 Nov 2017
  • 11 Dec 2017-12 Dec 2017

 

 

INVESTMENT PRICE/PERSON SECURITY ANALYSIS:

  1. Rp. 7.000.000/person (full fare) or
  2. Rp. 6.750.000/person (early bird, payment 1 week before training) or
  3. Rp. 6.500.000/person (if there are 3 persons or more from the same company)

 

FACILITIES FOR PARTICIPANTS:

  1. Modul Training
  2. Flashdisk Training berisi materi training
  3. Sertifikat
  4. ATK: NoteBook dan Ballpoint
  5. T-Shirt
  6. Ransel
  7. Foto Training
  8. Ruang Training dengan fasilitas Full AC dan multimedia
  9. Makan siang dan 2 kali coffeebreak
  10. Instruktur yang Qualified
  11. Transportasi untuk peserta dari hotel penginapan ke hotel tempat training – PP (jika peserta minimal dari satu perusahaan ada 4 peserta)

APPLIED SECURITY ANALYSIS (CRIME TREND, ROOT-CAUSE, COST-BENEFIT) UTILIZING SOFTWARE SYSCAT (SYSTEMATIC CAUSE ANALYSIS TOOL)

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

CHFI: Certified Hacking Forensics Investigator: Teknik identifikasi dan analisis Cyber Crime – CONFIRMED

EVENT

21 – 23 Agustus 2017 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta
28 – 30 Agustus 2017 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta
04 – 06 September 2017 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta
11 – 13 September 2017 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta

25 – 27 September 2017 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta – CONFIRMED

Jadwal Training 2017 Selanjutnya …

 

Deskripsi Training CHFI

EC-Council adalah sebuah institusi yang telah diakui di dunia internasional yang mengeluarkan sertifikasi di bidang e-commerce, audit sistem, jaringan serta keamanan sistem.Training ini menawarkan program pelatihan dan sekaligus ujian sertifikasi internasional CertifiedHacking Forensics Investigator (CHFI). Sertifikasi CHFI mempelajari teknik identifikasi terjadinya sebuah kejahatan yang melibatkan sistem komputer serta mengumpulkan bukti-bukti dan menganalisisnya untuk dapat dibawa dalam pengadilan. Sertifikasi CHFI ini bertujuan untuk memberikan pengetahuan bagi peserta dalam menangani Cyber crime.



Tujuan Training CHFI

Setelah mengikuti pelatihan ini, peserta diharapkan mampu untuk memahami konsep dan materi pelatihan serta lulus dalam ujian sertifikasi.



Materi Training (+ exam) CHFI

  • 01: Computer Forensics in Today’s World
  • 02: Computer Forensics Investigation Process
  • 03: Searching and Seizing of Computers
  • 04: Digital Evidence
  • 05: First Responder Procedures
  • 06: Incident Handling
  • 07: Understanding Hard Disks and File Systems
  • 08: Digital Media Devices
  • 09: Windows Forensics
  • 10: Linux Forensics
  • 11: Mac Forensics
  • 12: Data Acquisition and Duplication
  • 13: Recovering Deleted Files and Deleted Partitions
  • 14: Steganography
  • 15: Multimedia Files Forensics
  • 16: Application Password Crackers
  • 17: Network Forensics and Investigating Logs
  • 18: Investigating DoS Attacks
  • 19: Investigating virus, Trojan, spyware and Rootkit Attacks
  • 20: Investigating Internet Crimes
  • 21: Investigating Identity Theft Cases
  • 22: Cell Phone Forensics
  • 23: USB Forensics
  • 24: Computer Forensic Tools

Peserta Cocok untuk Semua staff dari berbagai lini dan departement

Lead Instruktur Training CHFI

Team Instruktur IT

Jadwal Training 2017

Hotel Ibis Malioboro ,Yogjakarta

  • 21 – 23 Agustus 2017
  • 28 – 30 Agustus 2017
  • 04 – 06 September 2017
  • 11 – 13 September 2017
  • 18 – 20 September 2017
  • 25 – 27 September 2017
  • 02 – 04 Oktober 2017
  • 09 – 11 Oktober 2017
  • 16 – 18 Oktober 2017
  • 23 – 25 Oktober 2017
  • 30 Oktober – 01 November 2017
  • 06 – 08 November 2017
  • 13 – 15 November 2017
  • 20 – 22 November 2017
  • 27 – 29 November 2017
  • 04 – 06 Desember 2017
  • 11 – 13 Desember 2017
  • 18 – 20 Desember 2017
  • 27 – 29 desember 2017

Investasi dan Fasilitas Training CHFI

  • Rp.10.900.000 (Non Residential)
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Biaya sudah termasuk untuk exam/ujian internasional
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel

 

CertifiedHacking Forensics Investigator (CHFI): Teknik identifikasi dan analisis Cyber Crime – Training dan Sertifikasi Internasional

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

Cyber Public Relations – CONFIRMED

ACARA

14 – 16 Agustus 2017 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
21 – 23 Agustus 2017 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
28 – 30 Agustus 2017 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
04 – 06 September 2017 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
11 – 13 September 2017 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta – CONFIRMED

Jadwal Training 2017 Selanjutnya …

 

Deskripsi Training Cyber Public Relations

Semakin berkembangnya teknologi,maka aktivitas Public relation tidak hanya dilakukan secara koventional dengan tatap muka, namun dilakukan melalui media online. Pemanfaatan media on line speti internet, web, sosmes untk mengefektifkan inerja PR disebut sebagai Cyber Public relation. Training ini akan memberikan pemahaman tentang Cyber Public Relation, startegi strategi sosial media dari sisi blogger dan jurnalis, Memperkenalkan berbagai macam media online dan social network dan teknik pengembangan aplikasi Cyber Public Relation pada media on-line dan social network.

Tujuan Training Cyber Public Relations

Tujuan training ini peserta memahami dan dapt mempraktekkan cyber Pr serta strategi dan pengelolaan Cyber PR yang efektif.

Materi Training Cyber Public Relations

  1. Introduction: ruang lingkup Cyber PR
  2. Menyusun dan mengembangkan strategi komunikasi online
  3. Mengelola konten Website Resmi Perusahaan dan Mengelola jejaring sosial korporat dan penggunaan tools
  4. PR Campaign di Media Sosial
  5. Metode Penulisan on line
  6. Penggunaan aplikasiCyber Public Relation pada media on-line dan social network.
  7. Studi kasus

Metode Training Cyber Public Relations

Presentasi, diskusi, tanya jawab, brainstorming, dan studi kasus

Jadwal Training Cyber Public Relations

Hotel Ibis Malioboro ,Yogjakarta

  • 14 – 16 Agustus 2017
  • 21 – 23 Agustus 2017
  • 28 – 30 Agustus 2017
  • 04 – 06 September 2017
  • 11 – 13 September 2017
  • 18 – 20 September 2017
  • 25 – 27 September 2017
  • 02 – 04 Oktober 2017
  • 09 – 11 Oktober 2017
  • 16 – 18 Oktober 2017
  • 23 – 25 Oktober 2017
  • 30 Oktober – 01 November 2017
  • 06 – 08 November 2017
  • 13 – 15 November 2017
  • 20 – 22 November 2017
  • 27 – 29 November 2017
  • 04 – 06 Desember 2017
  • 11 – 13 Desember 2017
  • 18 – 20 Desember 2017
  • 27 – 29 desember 2017

Investasi dan Fasilitas Training Cyber Public Relations

  • 5.900.000 (Non Residential, Belum Termasuk Pajak)
  • VIP training Rp 7.900.000 (4 Hari , Non Residential dengan tambahan Fasilitas Paket studi lapangan/ City tour dan Belum Termasuk Pajak)
  • Quota minimum 2 peserta
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel khusus bagi perusahaan yang mengirimkan minimal 3 orang peserta)

Lead Instruktur

Dr. Nur Wening,SE.,MSi.,CHRA and team

Teknologi PR: Cyber Public Relations

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

IT HELPDESK

EVENT

18 – 20 September 2017 | Rp. 5.950.000/peserta di Jakarta
16 – 18 Oktober 2017 | Rp. 5.950.000/peserta di Jakarta
30 – 01 November 2017 | Rp. 5.950.000/peserta di Jakarta
18 – 20 Desember 2017 | Rp. 5.950.000/peserta di Jakarta

 

TRAINING INTRODUCTION IT HELPDESK

A Help Desk is usually not a profit-generating department within a company. It is, for many organizations, a necessary expense, but it can add a significant amount of value to a company in a variety of ways.
In order for your Help Desk to add this value, it must, as follows;

  1. be established with the proper mission;
  2. offer the right set of services, and;
  3. achieve its objectives.

Furthermore, in order to run an effective Help Desk, you must know in advance what services you are going to perform; must know how to prioritize issues, and; must create realistic expectations.
All successful companies start off with a business plan, and the same rule applies to Help Desks. If your Help Desk is focused and has a clear understanding of your business, it will add a significant amount of value to the company in the form of increased productivity.

TRAINING OUTLINE IT HELPDESK

In this training, we will cover all the topics necessary regarding IT Help Desk as follows:

  • Information Technology Service Management (ITSM)
    • Overview of ISO 20000
    • Help Desk & Service Desk
  • What is a Help Desk?
    • Introduction
    • Help Desk Description
    • Non-IT Help Desk
    • 6 Functions & Benefits of the IT Help Desk
  • Positioning of the IT Help Desk Within an Organization
  • Who should use Help Desk?
    • Customers of the Help Desk
  • Features of Help Desk
  • Hierarchy of Help Desk (Level of User)
    • Help Desk Design
    • Service Levels
    • Help Desk Models
  • Flow of Help Desk (Working of Help Desk)
    • Staffing of the Help Desk
  • Role of Customer
    • 5 Rules of Customer Care
  • Role of Coordinator
  • Role of Specialist
  • Role of Agent
  • The Incident Management Process
  • Help Desk Tools & Technologies
  • Importance of Goals, Processes, and Procedures
  • Support Environment & Processes
  • Problem Management
  • Top 5 Help Desk Best Practices
  • Implementation & Project Plan
  • Top 10 Metrics to Monitor the Health of Your Help Desk
  • Case Study: Globalized IT Service Desk
  • Case Study: Centralized Support for Service Desk and Desktop

PESERTA YANG DIREKOMENDASIKAN:

Manajerdanstaf IT danmanajerataupihak-pihak yang perlu dilibatkan dalam perancangan dan operasionalisasi IT Helpdesk.

TRAINING INSTRUCTOR IT HELPDESK

Ir. Desmon Ginting, M.Tech.

Beliau telah berada di Dunia Kerja lebih dari 21 tahun. Di era tahun 90-an hingga akhir tahun 2000 berkecimpung di Dunia Perbankan dan Pasar Modal. Sejak awal tahun 2001, terjun di arena Perubahan Perilaku dan Peningkatan Produktivitas dengan fungsi utama sebagai Business Developer, Account Executive dan Liaison Officer. Peranan ini membawanya berinteraksi dengan beragam kalangan dari berbagai organisasi dan industri, mulai dari manajemen puncak hingga manajemen lini pertama! Beliau menyelesaikan pendidikan S1 (Ir.) Industrial Engineering di ITB pada tahun 1989 dan atas dasar beasiswa penuh yang diterima, S2 (M.Tech.) Manufacturing and Industrial Technology di Massey University, N.Z. pada tahun 1996. Sejak tahun 2011, beliau aktif sebagai Trainer & Coach.

 

TRAINING VENUE IT HELPDESK

Jakarta (Maxone Hotel Menteng, Balairung Hotel Matraman, Sentral Hotel, Haris Tebet, Gd Muamalat Institute, Ibis Manggadua, Little Amaroossa Residence, Cosmo Amaroossa, Zodiak MT. Haryono, Grand Tjokro)



TRAINING DURATION :  

3 hari

TRAINING TIME

  1. 18 Sep 2017-20 Sep 2017
  2. 16 Oct 2017-18 Oct 2017
  3. 30 Oct 2017-01 Nov 2017
  4. 18 Dec 2017-20 Dec 2017

INVESTMENT PRICE/PERSON IT HELPDESK

  1. Rp. 5.950.000/person (full fare) or
  2. Rp. 5.750.000/person (early bird, payment 1 week before training) or
  3. Rp. 5.500.000/person (if there are 3 persons or more from the same
    company)

FACILITIES FOR PARTICIPANTS IT HELPDESK

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor

IT HELPDESK

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

CEH (Certified Ethical Hacking): Keamanan Sistem komputer

ACARA

03 – 04 Juli 2017  | Rp. 8.900.000 Per Peserta di Yogyakarta /Semarang / Solo
03 – 04 Juli 2017 | Rp. 9.900.000 Per Peserta di Bandung / Jakarta / Surabaya
03 – 04 Juli 2017 | Rp. 10.900.000 Per Peserta di Bali / Batam /Balikpapan / Manado / Lombok

Jadwal Selanjutnya …

 

Deskripsi Pelatihan CEH (Certified Ethical Hacking)

EC-Council adalah sebuah institusi yang telah diakui di dunia internasional yang mengeluarkan sertifikasi di bidang e-commerce, audit sistem, jaringan serta keamanan sistem.Training CEH ini  menawarkan program pelatihan  dan sekaligus ujian sertifikasi internasional CEH (Certified Ethical Hacker).CEH merupakan sertifikasi dibidang keamanan sistem komputer yang bertujuan untuk menambah kemampuan seseorang untuk mencegah terjadinya hal-hal yang tidak diinginkan yang bertentangan dengan hukum yang berlaku. Setelah mendapatkan sertifikasi diharapkan peserta mengerti bagaimana cara melihat kelemahan dan kerentanan pada sistem.



Tujuan Pelatihan CEH (Certified Ethical Hacking)

Setelah mengikuti pelatihan CEH ini, peserta diharapkan mampu untuk memahami konsep dan materi pelatihan serta lulus dalam ujian sertifikasi.



Materi Training
CEH (+ exam)

  •  01:  Introduction to Ethical Hacking
  •  02:  Footprinting and Reconnaissance
  •  03:  Scanning Networks
  •  04:  Enumeration
  •  05:  System Hacking
  •  06:  Trojans and Backdoors
  •  07:  Viruses and Worms
  •  08:  Sniffers
  •  09:  Social Engineering
  • 10:  Denial of Service
  • 11:  Session Hijacking
  • 12:  Hacking Webservers
  • 13:  Hacking Web Applications
  • 14:  SQL Injection
  • 15:  Hacking Wireless Networks
  • 16:  Evading IDS, Firewalls and Honeypots
  • 17:  Buffer Overflows
  • 18:  Cryptography
  • 19:  Penetration Testing

Peserta Pelatihan CEH (Certified Ethical Hacking)

Cocok untuk Semua staff dari berbagai lini dan departement

 

Jadwal Pelatihan CEH (Certified Ethical Hacking)

Hotel Santika Kuta, Bali
Hotel Nagoya Plaza, Batam
Hotel Fave, Balikpapan
Hotel Aston, Manado
Hotel Lombok Raya, Mataram
Hotel Serela Merdeka, Bandung
Hotel Santika Pandegiling, Surabaya
Sofyan Hotel Betawi, Jakarta
Hotel Ibis Solo
Hotel Ibis Simpang Lima, Semarang
Hotel Ibis Malioboro, Yogyakarta

  • 03 – 04 Juli 2017
  • 10 – 11 Juli 2017
  • 17 – 18 Juli 2017
  • 24 – 25 Juli 2017
  • 31 Juli – 01 Agustus 2017
  • 07 – 08 Agustus 2017
  • 14 – 15 Agustus 2017
  • 21 – 22 Agustus 2017
  • 28 – 29 Agustus 2017
  • 04 – 05 September 2017
  • 11 – 12 September 2017
  • 18 – 19 September 2017
  • 25 – 26 September 2017
  • 02 – 03 Oktober 2017
  • 09 – 10 Oktober 2017
  • 16 – 17 Oktober 2017
  • 23 – 24 Oktober 2017
  • 30 – 31  Oktober 2017
  • 06 – 07 November 2017
  • 13 – 14 November 2017
  • 20 – 21 November 2017
  • 27 – 28 November 2017
  • 04 – 05 Desember 2017
  • 11 – 12 Desember 2017
  • 18 – 19 Desember 2017
  • 27 – 28 desember 2017

 

Investasi dan Fasilitas

  • Rp.10.900.000 (Non Residential) untuk lokasi di Bali, Batam, Balikpapan, Manaado atau Lombok
  • Rp.9.900.000 (Non Residential) untuk lokasi di Bandung, Jakarta atau Surabaya
  • Rp 8.900.000 (Non Residential) untuk Lokasi Solo atau Semarang
  • Rp.8.900.000 (Non Residential) untuk lokasi di Yogyakarta
  • Quota minimum 3 peserta ( Untuk Manado, Balikpapan dan Lombok Quota minimal 4 peserta)
  • Fasilitas : Certificate,Training kits, USB, Lunch, Coffee Break, Souvenir

Lead Instruktur CEH Training 

Team Instruktur IT

Sertifikasi dibidang Keamanan Sistem komputer – Certified Ethical Hacking (CEH)

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

CASP – CompTIA Advanced Security Practitioner

Event

07 – 11 August 2017 | Rp 12.000.000 at Kuningan, Jakarta Selatan

 

 

COURSE DESCRIPTION CASP (CompTIA Advanced Security Practitioner )

The CASP program is internationally targeted validation of advanced-level security skills and knowledge. It is designed to help meet the growing demand for advanced IT technical security in the enterprise.

The CASP exam will certify that the successful candidate has the technical knowledge and skills required to conceptualize, design, engineer, integrate and implement secure solutions across complex enterprise environments. The candidate will apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational enterprise drivers, while managing risk impact and response to security incidents.

 

COURSE OBJECTIVES CASP (CompTIA Advanced Security Practitioner )

At the end of the program, the participants will be able to:

  • Understand Microsoft Project Lite including Interface and Features.
  • Explain the security implications associated with enterprise storage
  • Analyze network and security components, concepts and architectures
  • Differentiate application vulnerabilities and select appropriate security controls
  • Execute risk mitigation planning, strategies and controls
  • Conduct incident response and recovery procedures
  • Apply research methods to determine industry trends and impact to the enterprise
  • Facilitate collaboration across diverse business units to achieve security goals
  • Integrate advanced authentication and authorization technologies to support enterprise objectives

 

TARGET AUDIENCE CASP (CompTIA Advanced Security Practitioner )

IT Specialist, InfoSec, Risk Manager/Analyst, Security architect, ISSO, Penetration Tester/Ethical Hacker

 

DURATION CASP (CompTIA Advanced Security Practitioner )

5 (five) full days program

 

PREREQUISITES

A minimum of 10 years experience in IT administration including at least 5 years of hands-on technical security experience is recommended.

 

 

COURSE MODULES CASP (CompTIA Advanced Security Practitioner )

Module 1: Enterprise Security

  • Select Appropriate Cryptographic Concepts and Techniques
  • Illustrate the Security Implications Associated with Enterprise Storage
  • Analyze Network and Security Components, Concepts and Architectures
  • Troubleshoot Security Controls for Hosts
  • Differentiate Application Vulnerabilities and Select Appropriate Security Controls

Module 2: Risk Management and Incident Response

  • Interpret Business and Industry Influences and Explain Associated Security Risks
  • Execute Risk Mitigation Planning, Strategies and Controls
  • Compare and Contrast Security, Privacy Policies and Procedures
  • Conduct Incident Response and Recovery Procedures

Module 3: Research, Analysis and Assessments

  • Apply Research Methods to Determine Industry Trends and Impact to the Enterprise
  • Analyze Scenarios to Secure the Enterprise
  • Select Methods or Tools Appropriate to Conduct an Assessment and Analyze Results

Module 4: Integration of Computing, Communications and Business Disciplines

  • Facilitate Collaboration Across Diverse Business Units to Achieve Security Goals
  • Select the Appropriate Control to Secure Communications and Collaboration Solutions
  • Implement Security Activities Across the Technology Life Cycle

Module 5: Technical Integration of Enterprise Components

  • Integrate Hosts, Storage, Networks and Applications into a Secure Enterprise Architecture
  • Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives

 

VENUE AND TIME

  • 06-08 February 2017
  • 24-28 April 2017
  • 07-11 August 2017
  • Time     : 09.00 AM – 05.00 PM

Venue   : AXA Tower Kuningan City, Jl. Prof. Dr. Satrio Kav. 18, Setiabudi – Kuningan, Jakarta Selatan

 

 

 

PRICING AND TRAINING PACKAGES

Price

USD 1300

 

Packages

  • Get More Special Discount if can register for minimum 3 (three) Participants
  • Original CASP Courseware from CompTIA
  • CASP Pre Assessment, Exercises and Mock Exam Simulation
  • CASP Exam Voucher
  • Certificate of Attendance from Informatics (Singapore)
  • CASP Certification from CompTIA (if pass the exam)
  • Lunch and Coffee Break
  • Stationery
  • Exclusive Souvenir

 

 

CompTIA Advanced Security Practitioner (CASP)

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

 

Digital Forensics – CONFIRMED

ACARA

03 – 05 Juli 2017 | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta
08 – 09 Juli 2017 (Weekend) | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta
10 – 12 Juli 2017 | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta
15 – 17 Juli 2017 (Weekend) | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta

17 – 19 Juli 2017 | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta – CONFIRMED

Jadwal Training 2017 Selanjutnya …

 

 



Deskripsi Training Digital Forensics

Saat ini, informasi merupakan hal yang paling dibutuhkan bagi setiap orang, kemampuan dalam mengakses dan menyediakan informasi secara cepat dan tepat menjadi sangat penting bagi organisasi atau perusahaan. Hal inilah yang menyebabkan manusia sangat ketergantungan terhadap sistem komputer dan perangkat digital, sehingga menyebabkan kejahatan yang terjadi seringkali berhubungan dengan kedua hal tersebut. Kejahatan digital memunculkan barang bukti digital. Barang bukti digital tergolong barang bukti abstrak sehingga membutuhkan perlakuan khusus untuk memproses dan memunculkan barang bukti tersebut. maka dari itu, training ini akan memberikan pengetahuan tentang bagaimana proses investigasi forensik pada barang bukti digital yang dihasilkan dari kejahatan sehingga dapat digunanakan pada persidangan ataupun digunakan untuk keperluan pembuktian lainnya.

 

Tujuan Training Digital Forensics

Dengan mengikuti training digital forensik diharapkan peserta dapat :

  1. Memahami produk hukum IT di Indonesia
  2. Memahami fase-fase yang dilalui dalam investigasi forensika digital
  3. Memahami bagaimana proses pengambilan barang bukti dan proses kloning barang bukti
  4. Mempraktekkan fase investigasi forensika digital dari mulai pengambilan barang bukti sampai proses kloning barang bukti
  5. Memahami proses recovery files
  6. Memahami analisa dan proses network forensics
  7. Memahami teknik steganography
  8. Mempraktekkan proses recovery files, analisa network forensics dan teknik steganography

 

Materi Training Digital Forensics

  1. Basic IT Security Law and Regulations
  2. Introduction to Digital Forensics and Digital Evidence
  3. Preservation, Data Acquisition and Duplication
  4. File System, Harddisk
  5. Recovery Files
  6. Network Forensics
  7. Steganography

Peserta Training Digital Forensics

    • Para akademisi yang ingin memperdalam bidang Penetration Testing, Digital Forensic,

Para praktisi TIK pada perusahaan, instansi pemerintah, institusi pendidikan yang memiliki deskripsi pekerjaan dan bertanggung jawab pada bidang forensika digital

 

Jadwal Training 2017

Hotel Ibis Malioboro ,Yogjakarta

  • 19 – 21 Juni 2017
  • 03 – 05 Juli 2017
  • 10 – 12 Juli 2017
  • 17 – 19 Juli 2017
  • 24 – 26 Juli 2017
  • 31 Juli – 01 Agustus 2017
  • 07 – 09 Agustus 2017
  • 14 – 16 Agustus 2017
  • 21 – 23 Agustus 2017
  • 28 – 30 Agustus 2017
  • 04 – 06 September 2017
  • 11 – 13 September 2017
  • 18 – 20 September 2017
  • 25 – 27 September 2017
  • 02 – 04 Oktober 2017
  • 09 – 11 Oktober 2017
  • 16 – 18 Oktober 2017
  • 23 – 25 Oktober 2017
  • 30 Oktober – 01 November 2017
  • 06 – 08 November 2017
  • 13 – 15 November 2017
  • 20 – 22 November 2017
  • 27 – 29 November 2017
  • 04 – 06 Desember 2017
  • 11 – 13 Desember 2017
  • 18 – 20 Desember 2017
  • 27 – 29 desember 2017

Jadwal Weekend

Hotel Ibis Malioboro ,Yogjakarta

  • 01 – 02 Juli 2017
  • 08 – 09 Juli 2017
  • 15 – 16 Juli 2017
  • 22 – 23 Juli 2017
  • 29 – 30 Juli 2017
  • 05 – 06 Agustus 2017
  • 12 – 13 Agustus 2017
  • 19 – 20 Agustus 2017
  • 26 –27 Agustus 2017
  • 02 – 03 September 2017
  • 09 – 10 September 2017
  • 16 – 17 September 2017
  • 23 – 24 September 2017
  • 30 September – 01 Oktober 2017
  • 07 – 08 Oktober 2017
  • 14 – 15 Oktober 2017
  • 21 – 22 Oktober 2017
  • 28 – 29 Oktober 2017
  • 04 – 05 November 2017
  • 11 – 12 November 2017
  • 18 – 19 November 2017
  • 25 – 26 November 2017
  • 02 – 03 Desember 2017
  • 09 – 10 Desember 2017
  • 16 – 17 Desember 2017
  • 23 – 24 Desember 2017
  • 30 – 31 Desember 2017



Investasi dan Fasilitas Training

  •  Rp.6.900.000 (Non Residential)
  • VIP training Rp 8.900.000 (4 Hari , Non Residential dengan tambahan Fasilitas Paket studi lapangan/ City tour dan Belum Termasuk Pajak)
  • Quota minimum 2 peserta
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel (berlaku bagi perusahaan yang mengirimkan minimal 3 peserta)

 

Instruktur Training Digital Forensics

Team Instruktur IT

 

 

Training Digital Forensics

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

Security+ CompTIA (HALF CONFIRMED)

EVENT

15 – 19 May 2017 | Rp 10.000.000 at Kuningan – HALF CONFIRMED
31 July – 04 August 2017 | Rp 10.000.000 at Kuningan
02 – 05 October 2017 | Rp 10.000.000 at Kuningan

 

 

COURSE DESCRIPTION Security+ CompTIA

The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations.

CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Security+ objectives reflect the subject areas in this edition of this exam, and result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an information security professional with two years of experience.



TARGET AUDIENCE Security+ CompTIA

IT Specialist, InfoSec, Risk Manager/Analyst, Security architect, ISSO, Penetration Tester/Ethical Hacker



DURATION Security+ CompTIA

5 (Five) full days program



PREREQUISITES Security+ CompTIA

The CompTIA Security+ Certification is aimed at an IT security professional who has:

  • A minimum of 2 years experience in IT administration with a focus on security
  • Day to day technical information security experience



C
OURSE MODULES Security+ CompTIA

Module 1:  Network Security

1.1 Explain the security function and purpose of network devices and

technologies

1.2 Apply and implement secure network administration principles

1.3 Distinguish and differentiate network design elements and components

1.4 Implement and use common protocols

1.5 Identify commonly used default network ports

1.6 Implement wireless network in a secure manner

Module 2 : Compliance and Operational Security

2.1 Explain risk related concepts

2.2 Carry out appropriate risk mitigation strategies

2.3 Execute appropriate incident response procedures

2.4 Explain the importance of security related awareness and training

2.5 Compare and contrast aspects of business continuity

2.6 Explain the impact and proper use of environmental controls

2.7 Execute disaster recovery plans and procedures

2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA)

Module 3 : Threats and Vulnerabilities

3.1 Analyze and differentiate among types of malware

3.2 Analyze and differentiate among types of attacks

3.3 Analyze and differentiate among types of social engineering attacks

3.4 Analyze and differentiate among types of wireless attacks

3.5 Analyze and differentiate among types of application attacks

3.6 Analyze and differentiate among types of mitigation and deterrent techniques

3.7 Implement assessment tools and techniques to discover security threats and

vulnerabilities

3.8 Within the realm of vulnerability assessments, explain the proper use of

penetration testing versus vulnerability scanning

Module 4 : Application, Data and Host Security

4.1 Explain the importance of application security

4.2 Carry out appropriate procedures to establish host security

4.3 Explain the importance of data security

Module 5 : Access Control and Identity Management

5.1 Explain the function and purpose of authentication services

5.2 Explain the fundamental concepts and best practices related to

authentication,authorization and access control

5.3 Implement appropriate security controls when performing account

management

Module 6 : Cryptography

6.1 Summarize general cryptography concepts

6.2 Use and apply appropriate cryptographic tools and products

6.3 Explain the core concepts of public key infrastructure

6.4 Implement PKI, certificate management and associated components

 

VENUE AND TIME

  • 15-19 May 2017
  • 31 July – 4 August 2017
  • 2-5 October 2017
  • Time                : 09.00AM – 05.00PM
  • Venue             : AXA Tower Kuningan City, Jl. Prof. Dr. Satrio Kav. 18, Setiabudi – Kuningan, Jakarta Selatan



PRICING Security+ CompTIA

IDR 10.000.000



TRAINING PACKAGES Security+ CompTIA

  • Original Courseware from CompTIA
  • Security+ Exam
  • Certificate of Attendance
  • Security+ Certification from CompTIA (if pass the exam)
  • Lunch and Coffee Break
  • Stationery
  • Exclusive Souvenir

Security+ CompTIA

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

Wireless Security Management – CONFIRMED

ACARA

10 – 12 April 2017 | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta
15 – 16 April 2017 (Weekend) | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta
17 – 19 April 2017 | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta
22 – 23 April 2017 (Weekend) | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta

02 – 04 Mei 2017 | Rp 6.900.000,- per peserta di Hotel Ibis, Yogyakarta – CONFIRMED

Jadwal Training 2017 Selanjutnya …

 

 

 

 

Deskripsi Wireless Security Management

Sebagian besar keamanan yang dibuat dalam standar wifi cenderung lemah. Keamanan untuk jaringan nirkabel dimulai dengan langkah-langkah dasar dan keamanan yang sama yang melindungi jaringan nirkabel. Akses harus dikontrol menggunakan user log in dan password untuk semua fungsi selain akses publik ke internet serta firewall dan perlindungan terhadap virus. Sistem wifi saat ini sudah memiliki beberapa fitur keamanan di tempat. Keamanan untuk sistem wifi di perusahaan sangat penting karena sistem jaringan di dalamnya menyimpan berbagai macam informasi penting dan rahasia perusahaan. Perlindungan untuk sistem wifi harus diterapkan dan dikelola dengan baik untuk menghindari hal-hal yang tidak diinginkan seperti hacking atau pencurian informasi melalui internet. Perlu dibedakan antara akses internal dan publik. Pada pelatihan kali ini membahas bagaimana memanajemen keamanan untuk sistem internet nirkabel atau wifi.

 

Tujuan Training Wireless Security Management

  1. Peserta mengetahui pentingnya keamanan untuk jaringan nirkabel
  2. Peserta mampu membangun proteksi untuk jaringan nirkabel
  3. Peserta mampu mengelola proteksi yang tepat untuk menjaga kemanan pada jaringan nirkabel
  4. Peserta mengetahui penanganan yang tepat apabila terjadi masalah dan kendala pada jaringan

 

Materi Training Wireless Security Management

  1. Wireless standard
  2. Wireless tools
  3.  Troubleshooting wireless
  4.  Advance wireless settings
  5.  Autentikasi MAC address
  6.  Autentikasi EAP PSK
  7.  Autentikasi Enkripsi
  8.  Manajemen Proteksi
  9.  Bridge WDS Mesh
  10.  Wireless Propietery

                                                        

Peserta                                           

Manager Director, Manager IT, Staff IT, dan seluruh praktisi yang ingin belajar mengenai proteksi wireless.

 

 

Jadwal Training 2017

Hotel Ibis Malioboro ,Yogjakarta

  • 10 – 12 April 2017
  • 17 – 19 April 2017
  • 25 – 27 April 2017
  • 02 – 04 Mei 2017
  • 08 – 10 Mei 2017
  • 15 – 17 Mei 2017
  • 22 – 24 Mei 2017
  • 29 – 31 Mei 2017
  • 05 – 07 Juni 2017
  • 12 – 14 Juni 2017
  • 19 – 21 Juni 2017
  • 03 – 05 Juli 2017
  • 10 – 12 Juli 2017
  • 17 – 19 Juli 2017
  • 24 – 26 Juli 2017
  • 31 Juli – 01 Agustus 2017
  • 07 – 09 Agustus 2017
  • 14 – 16 Agustus 2017
  • 21 – 23 Agustus 2017
  • 28 – 30 Agustus 2017
  • 04 – 06 September 2017
  • 11 – 13 September 2017
  • 18 – 20 September 2017
  • 25 – 27 September 2017
  • 02 – 04 Oktober 2017
  • 09 – 11 Oktober 2017
  • 16 – 18 Oktober 2017
  • 23 – 25 Oktober 2017
  • 30 Oktober – 01 November 2017
  • 06 – 08 November 2017
  • 13 – 15 November 2017
  • 20 – 22 November 2017
  • 27 – 29 November 2017
  • 04 – 06 Desember 2017
  • 11 – 13 Desember 2017
  • 18 – 20 Desember 2017
  • 27 – 29 desember 2017

Jadwal Weekend

Hotel Ibis Malioboro ,Yogjakarta

  • 08 – 09 April 2017
  • 15 – 16 April 2017
  • 22 – 23 April 2017
  • 29 – 30 April 2017
  • 06 – 07 Mei 2017
  • 13  – 14 Mei 2017
  • 20 – 21 Mei 2017
  • 27 – 28 Mei 2017
  • 03 – 04 Juni 2017
  • 10 – 11 Juni 2017
  • 17 – 18 Juni 2017
  • 01 – 02 Juli 2017
  • 08 – 09 Juli 2017
  • 15 – 16 Juli 2017
  • 22 – 23 Juli 2017
  • 29 – 30 Juli 2017
  • 05 – 06 Agustus 2017
  • 12 – 13 Agustus 2017
  • 19 – 20 Agustus 2017
  • 26 –27 Agustus 2017
  • 02 – 03 September 2017
  • 09 – 10 September 2017
  • 16 – 17 September 2017
  • 23 – 24 September 2017
  • 30 September – 01 Oktober 2017
  • 07 – 08 Oktober 2017
  • 14 – 15 Oktober 2017
  • 21 – 22 Oktober 2017
  • 28 – 29 Oktober 2017
  • 04 – 05 November 2017
  • 11 – 12 November 2017
  • 18 – 19 November 2017
  • 25 – 26 November 2017
  • 02 – 03 Desember 2017
  • 09 – 10 Desember 2017
  • 16 – 17 Desember 2017
  • 23 – 24 Desember 2017
  • 30 – 31 Desember 2017



Investasi dan Fasilitas Training

  • Rp.6.900.000 (Non Residential)
  • VIP training Rp 8.900.000 (4 Hari , Non Residential dengan tambahan Fasilitas Paket studi lapangan/ City tour dan Belum Termasuk Pajak)
  • Quota minimum 2 peserta
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel (berlaku bagi perusahaan yang mengirimkan minimal 3 peserta)

 

 

Instruktur

Hamid, S.T., M.Eng,CEH CHFI MTCNA MTCWE  and Team

 

Wireless Security Management

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

CEH: Certified Ethical Hacking – CONFIRMED

ACARA

20 – 22 Maret 2017 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta – CONFIRMED
25 – 26 Maret 2017 (Weekend) | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta
29 – 31 Maret 2017 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta
01 – 02 April 2017 (Weekend) | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta

Jadwal Training 2017 Selanjutnya …

 

 

Deskripsi Training CEH

EC-Council adalah sebuah institusi yang telah diakui di dunia internasional yang mengeluarkan sertifikasi di bidang e-commerce, audit sistem, jaringan serta keamanan sistem.Training CEH ini  menawarkan program pelatihan  dan sekaligus ujian sertifikasi internasional CEH (Certified Ethical Hacker).CEH merupakan sertifikasi dibidang keamanan sistem komputer yang bertujuan untuk menambah kemampuan seseorang untuk mencegah terjadinya hal-hal yang tidak diinginkan yang bertentangan dengan hukum yang berlaku. Setelah mendapatkan sertifikasi diharapkan peserta mengerti bagaimana cara melihat kelemahan dan kerentanan pada sistem.



Tujuan Training CEH

Setelah mengikuti pelatihan CEH ini, peserta diharapkan mampu untuk memahami konsep dan materi pelatihan serta lulus dalam ujian sertifikasi.



Materi Training
CEH (+ exam)

  •  01:  Introduction to Ethical Hacking
  •  02:  Footprinting and Reconnaissance
  •  03:  Scanning Networks
  •  04:  Enumeration
  •  05:  System Hacking
  •  06:  Trojans and Backdoors
  •  07:  Viruses and Worms
  •  08:  Sniffers
  •  09:  Social Engineering
  • 10:  Denial of Service
  • 11:  Session Hijacking
  • 12:  Hacking Webservers
  • 13:  Hacking Web Applications
  • 14:  SQL Injection
  • 15:  Hacking Wireless Networks
  • 16:  Evading IDS, Firewalls and Honeypots
  • 17:  Buffer Overflows
  • 18:  Cryptography
  • 19:  Penetration Testing

Peserta Training CEH

Cocok untuk Semua staff dari berbagai lini dan departement

 

 

Jadwal Training 2017

Hotel Ibis Malioboro ,Yogjakarta

  • 20 – 22 Maret 2017
  • 29 – 31 Maret 2017
  • 03 – 05 April 2017
  • 10 – 12 April 2017
  • 17 – 19 April 2017
  • 25 – 27 April 2017
  • 02 – 04 Mei 2017
  • 08 – 10 Mei 2017
  • 15 – 17 Mei 2017
  • 22 – 24 Mei 2017
  • 29 – 31 Mei 2017
  • 05 – 07 Juni 2017
  • 12 – 14 Juni 2017
  • 19 – 21 Juni 2017
  • 03 – 05 Juli 2017
  • 10 – 12 Juli 2017
  • 17 – 19 Juli 2017
  • 24 – 26 Juli 2017
  • 31 Juli – 01 Agustus 2017
  • 07 – 09 Agustus 2017
  • 14 – 16 Agustus 2017
  • 21 – 23 Agustus 2017
  • 28 – 30 Agustus 2017
  • 04 – 06 September 2017
  • 11 – 13 September 2017
  • 18 – 20 September 2017
  • 25 – 27 September 2017
  • 02 – 04 Oktober 2017
  • 09 – 11 Oktober 2017
  • 16 – 18 Oktober 2017
  • 23 – 25 Oktober 2017
  • 30 Oktober – 01 November 2017
  • 06 – 08 November 2017
  • 13 – 15 November 2017
  • 20 – 22 November 2017
  • 27 – 29 November 2017
  • 04 – 06 Desember 2017
  • 11 – 13 Desember 2017
  • 18 – 20 Desember 2017
  • 27 – 29 desember 2017

Jadwal Weekend

Hotel Ibis Malioboro ,Yogjakarta

  • 18 – 19 Maret 2017
  • 25 – 26 Maret 2017
  • 01 – 02  April 2017
  • 08 – 09 April 2017
  • 15 – 16 April 2017
  • 22 – 23 April 2017
  • 29 – 30 April 2017
  • 06 – 07 Mei 2017
  • 13  – 14 Mei 2017
  • 20 – 21 Mei 2017
  • 27 – 28 Mei 2017
  • 03 – 04 Juni 2017
  • 10 – 11 Juni 2017
  • 17 – 18 Juni 2017
  • 01 – 02 Juli 2017
  • 08 – 09 Juli 2017
  • 15 – 16 Juli 2017
  • 22 – 23 Juli 2017
  • 29 – 30 Juli 2017
  • 05 – 06 Agustus 2017
  • 12 – 13 Agustus 2017
  • 19 – 20 Agustus 2017
  • 26 –27 Agustus 2017
  • 02 – 03 September 2017
  • 09 – 10 September 2017
  • 16 – 17 September 2017
  • 23 – 24 September 2017
  • 30 September – 01 Oktober 2017
  • 07 – 08 Oktober 2017
  • 14 – 15 Oktober 2017
  • 21 – 22 Oktober 2017
  • 28 – 29 Oktober 2017
  • 04 – 05 November 2017
  • 11 – 12 November 2017
  • 18 – 19 November 2017
  • 25 – 26 November 2017
  • 02 – 03 Desember 2017
  • 09 – 10 Desember 2017
  • 16 – 17 Desember 2017
  • 23 – 24 Desember 2017
  • 30 – 31 Desember 2017


Investasi dan Fasilitas

  • Rp10.900.000 (Non Residential)
  • Quota minimum 2 peserta
  • Fasilitas: Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel (berlaku bagi perusahaan yang mengirimkan minimal 3 peserta)

Lead Instruktur CEH Training 

Team Instruktur IT

Sertifikasi dibidang Keamanan Sistem komputer – Certified Ethical Hacking (CEH)

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days