Category Archives: Security

IT SECURITY AUDIT – Confirmed

ACARA

18 – 19 Februari 2019 | Rp. 6.900.000,- di Yogyakarta/ Semarang/ Solo
18 – 19 Februari 2019 | Rp. 7.900.000,-  di Bandung/ Jakarta/ Surabaya
18 – 19 Februari 2019 | Rp. 8.900.000,- di Bali/ Batam/ Balikpapan/ Manado/ Lombok
25 – 26 Februari 2019 | Rp. 6.900.000,- di Yogyakarta/ Semarang/ Solo

18 – 19 Maret 2019 | Rp 8.900.000 per peserta di Hotel Santika, Bali – CONFIRMED

Jadwal Training 2019 Selanjutnya …

 

 

IT Security Audit Course Background

The IT Security Audit course is designed to provide practical view in conducting IT audit and assurance in one organization. The course is designed to support professional staffs to expand their understanding of information technology (IT) audit.
The course presents a more in-depth view on the fundamentals of IT auditing by highlighting on topics such as: IT audit and control analysis, examination of control evidence in conducting IT audit, application control, Operating System and IT Infrastructure audit, and management of IT audit.
The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, participants will gain a working understanding of the process of developing audit work programs encompassing all elements of IT infrastructures.
Participants will be expected to gain a working understanding of how to identify, reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process.
IT Secuity Auditing covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Each class session will include discussion on an IT audit management, security, control or audit issues that participants should be familiar with.

 

IT Security Audit Course Objectives

• Participants shall obtain an expanded understanding on the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization, with the focus on IT infrastructures
• The partipants shall obtain the capabilityon how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, participants get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
• Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements
• Capability to build and maintain an IT audit function within the organization with maximum effectiveness and value
• Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
• Participants shall obtain the working ability to plan, conduct, and report on information technology audits with specific focus on infrastructure vulnarability assesment and assurance, and drill down upon application vulnarabilities
• Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards
• Capability to use best prractices and methodologies such as: COSO, CobiT, ITIL, ISO, and NSA INFOSEC

 

IT Security Audit Course Audience

• IT Managers
• Security Managers
• Auditing Staffs
• IT Operation Staffs

 

IT Security Audit  Course Contents

1. Audit Overview
2. Building an Effective Internal IT Audit Function
3. The Audit Process
4. Auditing Techniques
5. Auditing Entity-Level Controls
6. Auditing Data Centers and Disaster Recovery
7. Auditing Switches, Routers, and Firewalls
8. Auditing Windows Operating Systems
9. Auditing Unix and Linux Operating Systems
10. Auditing Web Servers
11. Auditing Databases
12. Auditing Applications
13. Auditing WLAN and Mobile Devices



IT Security Audit Course Methods

  • Presentation
  • Discussion
  • Case Study

 

Waktu  Dan Tempat Training 2019

  • Hotel Santika Kuta, Bali
  • Hotel Nagoya Plaza, Batam
  • Hotel Fave, Balikpapan
  • Hotel Aston, Manado
  • Hotel Lombok Raya, Mataram
  • Hotel 101 Dago , Bandung
  • Hotel Santika Pandegiling, Surabaya
  • Hotel Ibis Kemayoran , Jakarta
  • Hotel Ibis Solo
  • Hotel Ibis Simpang Lima, Semarang
  • Hotel Ibis Malioboro, Yogyakarta
  • 18 – 19 Februari 2019
  • 25 – 26 Februari 2019
  • 04 – 05 Maret 2019
  • 11 – 12 Maret 2019
  • 18 – 19 Maret 2019
  • 25 – 26 Maret 2019
  • 01 – 02 April 2019
  • 08 – 09 April 2019
  • 15 – 16 April 2019
  • 22- 23 April 2019
  • 29 – 30 Mei 2019
  • 06 – 07 Mei 2019
  • 13 – 14 Mei 2019
  • 20 – 21 Mei 2019
  • 27 – 28 Mei 2019
  • 12 – 13 Juni 2019
  • 17 – 18 Juni 2019
  • 24 – 25 Juni 2019
  • 01 – 02 Juli 2019
  • 08 – 09 Juli 2019
  • 15 – 16 Juli 2019
  • 22 -23 Juli 2019
  • 29 – 30 Juli 2019
  • 05 – 06 Agustus 2019
  • 13 – 14 Agustus 2019
  • 19 – 20 Agustus 2019
  • 26 – 27 Agustus 2019
  • 02 – 03 September 2019
  • 09 – 10 September 2019
  • 16 – 17 September 2019
  • 23 – 24 September 2019
  • 30 September – 01 Oktober 2019
  • 07 – 08 Oktober 2019
  • 14 – 15 Oktober 2019
  • 21 – 22 Oktober 2019
  • 28 – 29 Oktober 2019
  • 04 – 05 November 2019
  • 11 – 12 November 2019
  • 18 – 19 November 2019
  • 25 – 26 November 2019
  • 02 -03 Desember 2019
  • 09 – 10 Desember 2019
  • 16 – 17 Desember 2019
  • 23 – 24 Desember 2019
  • 30 – 31 Desember 2019

 

Investasi dan Fasilitas

  • Rp.8.900.000 (Non Residential) untuk lokasi di Bali, Batam, Balikpapan, Manaado atau Lombok
  • Rp. 7.900.000 (Non Residential) untuk lokasi di Bandung, Jakarta atau Surabaya
  • Rp 6.900.000 (Non Residential) untuk Lokasi Solo, Semarang  atau Yogyakarta
  • Quota minimum 2 peserta
  • Quota minimum 3 peserta ( Untuk Manado, Balikpapan dan Lombok Quota minimal 4 peserta)
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel khusus bagi perusahaan yang mengirimkan minimal 3 orang peserta)

IT Security Audit Course Lead Instruktur

Dr. Ir. Fauzi Hasan. MM, MBA, and Team

IT SECURITY AUDIT

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

IT HELPDESK

EVENT

18 – 20 Februari 2019 | Rp 6.500.000/ peserta di Jakarta
18 – 20 Maret 2019 | Rp 6.500.000/ peserta di Jakarta
22 – 24 April 2019 | Rp 6.500.000/ peserta di Jakarta
15 – 17 Mei 2019 | Rp 6.500.000/ peserta di Jakarta

Jadwal Training 2019 Selanjutnya …

 

 

IT HELPDESK TRAINING INTRODUCTION

A Help Desk is usually not a profit-generating department within a company. It is, for many organizations, a necessary expense, but it can add a significant amount of value to a company in a variety of ways.
In order for your Help Desk to add this value, it must, as follows;

  1. be established with the proper mission;
  2. offer the right set of services, and;
  3. achieve its objectives.

Furthermore, in order to run an effective Help Desk, you must know in advance what services you are going to perform; must know how to prioritize issues, and; must create realistic expectations.
All successful companies start off with a business plan, and the same rule applies to Help Desks. If your Help Desk is focused and has a clear understanding of your business, it will add a significant amount of value to the company in the form of increased productivity.

 

IT HELPDESK TRAINING OUTLINE

In this training, we will cover all the topics necessary regarding IT Help Desk as follows:

  • Information Technology Service Management (ITSM)
    • Overview of ISO 20000
    • Help Desk & Service Desk
  • What is a Help Desk?
    • Introduction
    • Help Desk Description
    • Non-IT Help Desk
    • 6 Functions & Benefits of the IT Help Desk
  • Positioning of the IT Help Desk Within an Organization
  • Who should use Help Desk?
    • Customers of the Help Desk
  • Features of Help Desk
  • Hierarchy of Help Desk (Level of User)
    • Help Desk Design
    • Service Levels
    • Help Desk Models
  • Flow of Help Desk (Working of Help Desk)
    • Staffing of the Help Desk
  • Role of Customer
    • 5 Rules of Customer Care
  • Role of Coordinator
  • Role of Specialist
  • Role of Agent
  • The Incident Management Process
  • Help Desk Tools & Technologies
  • Importance of Goals, Processes, and Procedures
  • Support Environment & Processes
  • Problem Management
  • Top 5 Help Desk Best Practices
  • Implementation & Project Plan
  • Top 10 Metrics to Monitor the Health of Your Help Desk
  • Case Study: Globalized IT Service Desk
  • Case Study: Centralized Support for Service Desk and Desktop

 

PESERTA YANG DIREKOMENDASIKAN

Manajerdanstaf IT danmanajerataupihak-pihak yang perlu dilibatkan dalam perancangan dan operasionalisasi IT Helpdesk.

 

IT HELPDESK TRAINING INSTRUCTOR

Ir. Desmon Ginting, M.Tech.

 

IT HELPDESK TRAINING VENUE

Jakarta (Maxone Hotel Menteng, Balairung Hotel Matraman, Sentral Hotel, Haris Tebet, Gd Muamalat Institute, Ibis Manggadua, Little Amaroossa Residence, Cosmo Amaroossa, Zodiak MT. Haryono, Grand Tjokro)

 

TRAINING DURATION :  

3 hari

 

JADWAL TRAINING 2019

  1. 18 Feb 2019-20 Feb 2019
  2. 18 Mar 2019-20 Mar 2019
  3. 22 Apr 2019-24 Apr 2019
  4. 15 Mei 2019-17 Mei 2019
  5. 19 Jun 2019-21 Jun 2019
  6. 15 Jul 2019-17 Jul 2019
  7. 19 Agust 2019-21 Agust 2019
  8. 16 Sep 2019-18 Sep 2019
  9. 14 Okt 2019-16 Okt 2019
  10. 18 Nop 2019-20 Nop 2019
  11. 16 Des 2019-18 Des 2019

 

INVESTMENT PRICE/PERSON IT HELPDESK

  1. Rp. 6.500.000/person (full fare) or
  2. Rp. 6.250.000/person (early bird, payment 1 week before training) or
  3. Rp. 5.950.000/person (if there are 3 persons or more from the same company

 

FACILITIES FOR PARTICIPANTS IT HELPDESK

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor

 

IT HELPDESK

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

IT RISK MANAGEMENT

Acara

18 – 22 Februari 2019 | Rp 9.500.000/ peserta di Jakarta
18 – 22 Maret 2019 | Rp 9.500.000/ peserta di Jakarta
22 – 26 April 2019 | Rp 9.500.000/ peserta di Jakarta
13 – 17 Mei 2019 | Rp 9.500.000/ peserta di Jakarta

Jadwal Training 2019 Selanjutnya …

 

 

DESCRIPTION IT RISK MANAGEMENT 

The IT risk management is the application of risk management to Information technology context in order to manage IT risk, i.e.: The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.

IT risk management can be considered a component of a wider Enterprise risk management system.

Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.

This training is built around globally accepted standards such as ISO 31000:2009 and frameworks such as ISACA’s Risk IT, and NIST and OCTAVE guidelines for risk management.

 

OBJECTIVES IT RISK MANAGEMENT

  • Identify where and how to reduce known/unknown IT risks
  • Identify areas of cost-benefit optimization and thus reduce IT expenditure
  • Understand the ISO 31000:2009 standard and its applicability to the corporate environment
  • Understand risk assessment as addressed in BASEL II, ISO 20000, ISO 27001, ITIL, COSO, COBIT, BS 25999 and its relevance to IT
  • Understand the different IT Risk Assessment Standards, Models and Methodologies – NIST’s SP-800-30, and OCTAVE™, ISO 27005
  • Insights on practical use of risk assessment and control evaluation techniques

 

IT RISK MANAGEMENT TRAINING OUTLINE

DAY 1:

  • Background:
    • Briefing on Definition of Risk and Risk in context of Information Technology
    • Discussion and recording: Known risk scenarios
    • IT Risk Management Initiative
    • Project Planning Requirements
  • Groundwork:
    • General Risk Scenarios
      • Understanding Business-specific, industry-specific, region/location-specific scenarios
      • Recording the scenarios
  • Management Buy-in
  • Degree of business dependence on information technology
  • Understanding and recording technology-specific risks
  • Tying in general risk scenarios with IT risks
  • Techniques of building business case
  • Budgeting
  • Project Planning
  • Resource Identification and Allocation
  • Understanding the Concepts and Techniques
    • IT Risk Management Cycle
    • Technology and business drivers
    • Risk Terms – Asset, Threat, Threat Agent, Threat Event, Vulnerability, Countermeasure, Risk, Residual Risk
    • Risk Assessment Methodology
    • ISO 31000:2009 Overview
  • Exercises, and Discussion

DAY 2:

  • IT Risk Assessment:
    •  IT Process Selection
    •  IT Component Selection
    • Approach Selection
    •  Risk Discussion :
      • Risks from IT Strategy adopted
      • Risks from IT Processes and Plans
      • Risks from Networks and Systems
      • Risks from Business Applications
      • Risks from Internal Application
      • Risks from Devices – Security Implementation, Disaster Recovery, Business Continuity
      •  Risks from Internal and External customers
    • Applying ISO 31000 and Risk IT for Risk Assessment
    •  Challenges and Solutions
    •  Case Study I
  • Exercises, and Discussion

DAY 3:

  • IT Risk Mitigation :
    • IT Risk Mitigation Options
    • IT Risk Mitigation Strategy
    • Controls’ Identification and Analysis
    • Cost Benefit Analysis
    • Calculating Residual Risk
    • Case Study II
    • Applying ISO 31000 and Risk IT for Risk Mitigation
  •  Evaluation IT Risk Management Cycle :
    • Project Evaluation
    • Learning from Selection and Execution techniques
  • Integrating IT Risk Management with various frameworks and standards – BASEL II, ISO 20000, ITIL, COSO, COBIT, ISO 27001, BS 25999 ,NIST’s SP-800-30,, OCTAVE™, ISO 27005
  • IT Risk Management Cycle: A Revision
  • Exercises, and Discussion

DAY 4:

  • Special Project / Case Study “ IT Risk Assessment”  (part 1)

DAY 5:

  • Special Project / Case Study “ IT Risk Assessment”  (part 2)

 

INSTRUCTOR TRAINING IT RISK MANAGEMENT

Ir. Muhammad Tavip, MPM, Cert.HR (US-Based).

  • Muhammad Tavip, Ir., MPM, Cert. HR pemegang sertifikasi internasional Project Management berdasarkan PMBOK – PMI, USA dan  Human Resource Management (US-based), Alumni of Institut Teknologi Bandung (1992) dan   Post Graduate Diploma dari University of South Australia, Adelaide (1995).  Beberapa Sertifikasi Internasional yang dipegangnya adalah: Project Management (PM)/ITPM, Software Business Analysis (SBA), Systems Analysis and Design (SAD), Software Quality Assurance (SQA), Software Testing Professional (STP),  IT Infrastructure Library (ITIL ), Disaster Recovery Planning (DRP).
  • Memiliki pengalaman lebih dari 15 tahun di bidang IT, Management and Business. Beliau Mengelola Proyek berskala Nasional dan International. Memberikan jasa konsultansi di bidang Project Management dan IT Project Management, Enterprise Project Management using Project Server 2003/2007/2010, Pelatihan dan Konsultansi Implementasi Balanced Scorecard, dan  IT Management consulting. Beliau merupakan salah satu pendesain software Balanced Scorecard MBRIO yang telah digunakan beberapa perusahaan swasta berskala UKM.
  • Beliau berpengalaman lebih dari 10 tahun memberikan pelatihan baik public maupun in-house dan Coaching untuk bidang IT Management termasuk: Project Management (PM)/ITPM, Software Business Analysis (SBA), Systems Analysis and Design (SAD), Software Quality Assurance (SQA), Software Testing Professional (STP),  IT Infrastructure Library (ITIL V2 and V3 ), Disaster Recovery Planning (DRP), IT Risk Management, Information Security Management based on PBI, , COBIT 5 Foundation, Operation Management ( supply chain management, logistics management, warehouse management, inventory management), project financing.
  • Dari tahun 2001 s/d sekarang Beliau telah membimbing lebih dari 5000 para project Manager di Indonesia mempelajari Project Management dan IT Project Management berdasarkan standard defector PMBOK – PMI, USA mulai dari versi 2000, 2004, dan PMBOK 2008.
  • Beberapa klien yang pernah mendapatkan bimbingan/ training/coaching/ konsultasi Project Management/ IT Project Management sejak 2001 s/d sekarang diantaranya adalah:
    • PEMERINTAHAN & BUMN:

Bank Indonesia, PT. Bank Mandiri (Persero) Tbk, PT. Bank Negara Indonesia (Persero) Tbk, PT. Bank Rakyat Indonesia (Persero) Tbk, Depnakertrans, Departemen Dalam Negri, Departemen PU, Departemen Agama, Departemen Keuangan, PLN, BKPM, BPKP, PT. PUSRI, Sekolah Staff Komando Angkatan Laut (SESKOAL). PT. Telkom, PT. Sigma Cipta Caraka, Komisi Pemberantasan Korupsi (KPK), PT. Antam, Tbk, PT. Laras Astra Kartika, dll.

  • PERUSAHAAN SWASTA:

PT. Bank Artha Graha International Tbk, Bank BTN, PT. Bank UOB Buana, Artha Jasa, Kabel Vision, Alcatel, PT. Hindoli (A Cargill Co), Satelindo, Excelcom, Bank Bali, Bank Permata, Tbk, Citra Sari Makmur, PT. Amway Indonesia, PT. Pabrik Kerta Tjiwi Kimia, PT. Astragraphia, Tbk, Metro TV news, PT. Intikom, PT. Bank DKI, Galenium Pharmasia Lab, PT. Unicharm Indonesia, PT. Primacom, PT. Gramedia – Majalah, Swadharma, PT. Data Script, PT. Bank Mega, PT. Astra Oto Parts, Talisman Energy Inc, PT. Berca Hardaya Perkasa, PT. Mandiri Sekuritas, PT. Arutmin, ACC, dll.

  • PERUSAHAAN ASING:

Caltex, Unocal, PWC, Chevron, BHP Billiton, Vico Indonesia, PT. Coats Indonesia, PT. Sumiko Leadframe Bintan, PT. Metlife Sejahtera, Santos Asia Pacific Pty Ltd, German Centre, PT. Thames PAM Jaya, PT. AC Nielsen Indonesia, KPC, PT. Freeport Indonesia, PT. Mattel Indonesia, PT. Bank Rabobank International Indonesia, PT. Roche Indonesia, PT. Nestle Indonesia, PT. Arun LNG, PT. Sinar Meadow International Indonesia, PT. Bank HSBC, PT. Oberthur Indonesia, PT. Bank Woori Indonesia, PT. Bank of Tokyo, PT. Atlas Copo,  PT. Bank RBS,dll.

  • UNIVERSITAS & LSM:

Universitas PETRA, STIE Perbanas, Universitas Trisakti, HIV Foundation, Universitas Maranatha, Universitas Satya Wacana, Universitas Atmajaya World Vision, dll.

 

VENUE TRAINING IT RISK MANAGEMENT 

Jakarta (Maxone Hotel Menteng, Balairung Hotel Matraman, Sentral Hotel, Haris Tebet, Gd Muamalat Institute, Ibis Manggadua, Little Amaroossa Residence, Cosmo Amaroossa, Zodiak MT. Haryono, Grand Tjokro)

 

DURATION TRAINING IT RISK MANAGEMENT

5 days

 

JADWAL TRAINING 2019

  1. 18 Feb 2019-22 Feb 2019
  2. 18 Mar 2019-22 Mar 2019
  3. 22 Apr 2019-26 Apr 2019
  4. 13 Mei 2019-17 Mei 2019
  5. 17 Jun 2019-21 Jun 2019
  6. 08 Jul 2019-12 Jul 2019
  7. 19 Agust 2019-23 Agust 2019
  8. 16 Sep 2019-20 Sep 2019
  9. 07 Okt 2019-11 Okt 2019
  10. 18 Nop 2019-22 Nop 2019
  11. 16 Des 2019-20 Des 2019

 

INVESTATION PRICE/ PERSON 

  1. Rp 9.500.000/peserta (bayar penuh)  atau
  2. Rp 9.250.000/peserta (early bird, yang membayar 1 minggu sebelum training)  atau
  3. Rp 8.950.000/peserta (untuk peserta bergroup yang terdiri dari 3 orang peserta atau lebih dari 1 perusahaan yang sama)

 

FACILITIES FOR PARTICIPANTS

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor
  11. Transportation for participants from hotel of participants to/from hotel of training – VV (if minimal participants is 4 persons from the same company)

 

IT RISK MANAGEMENT 
based on Various Frameworks, Standards, and Models: BASEL II, ISO 20000, ITIL, COSO, COBIT, ISO 27001, BS 25999 ,NIST’s SP-800-30 OCTAVE™, ISO 27005

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

ISO 27001: 2005 PEMAHAMAN & PENERAPAN SISTEM MANAJEMEN KEAMANAN INFORMASI

ACARA

19 – 20 Februari 2019 | Rp 4.500.000/ peserta di Jakarta
19 – 20 Maret 2019 | Rp 4.500.000/ peserta di Jakarta
15 – 16 April 2019 | Rp 4.500.000/ peserta di Jakarta
29 – 30 April 2019 | Rp 4.500.000/ peserta di Jakarta

Jadwal Training 2019 Selanjutnya …

 

 

PENDAHULUAN TRAINING ISO 27001: 2005

Informasi merupakan aset yang sangat penting bagi setiap organisasi. Dalam persaingan bisnis,dapat dikatakan bahwa penguasaan informasi merupakan salah satu senjata utamanya. Pernahkah Anda merasa bahwa ide brilliant Anda dicuri pesaing? Pernahkah Anda melihat pesaing Anda mendapatkan proyek yang telah Anda incar,beberapa waktu kemudian baru Anda menyadari bahwa pesaing tersebut memenangkan proyek karena mereka mengetahui informasi penting tentang bisnis Anda, yang menurut Anda telah Anda rahasiakan sebaik mungkin? Bagi organisasi pemerintahan, apakah sudah terjamin informasi kebijakan atau hasil penilaian jabatan dalam proses-prosesnya?

Pertanyaan-pertanyaan tersebut akan terjawab dari jawaban pertanyaan-pertanyaan berikut, Bagaimanakah perusahaan/organisasi Anda memperlakukan informasi sebagai asset penting? Pernahkan Anda merasa gangguan pada bisnis Anda dikarenakan pesaing memiliki informasi yang sama dengan yang Anda pegang? Bagaimana Anda mengelola asset intangible ini? Sudahkah dilindungi dengan baik sehingga berdaya guna maksimal bagi perusahaan?

ISO 27001:2005 adalah Sistem Manajemen Keamanan Informasi yang membangun kesadaran terhadap pengelolaan asset intangible ini secara menyeluruh dan meningkatkannya secara berkesinambungan.

 

TUJUAN TRAINING ISO 27001: 2005

  • Memahami prinsip-prinsip dasar sistem manajemen keamanan informasi (SMKI).
  • Memahami kesamaan persyaratan yang ada dalam Sistem Manajemen Keamanan Informasi (SMKI) ISO 27001: 2005.
  • Memahami langkah penyusunan dan penerapan sistem manajemen keamanan informasi.

 

MATERI TRAINING ISO 27001: 2005

  • Prinsip-prinsip dan Pemahaman Sistem Manajemen:
    • Keterkaitan standar sistem manajemen
    • Pengembangan sistem manajemen
  • Prinsip Dasar Keamanan Informasi
    • Konsekuensi dari pengamanan yang lemah
    • Jenis umum dari ancaman
    • Tujuan keamanan informasi
    • Definisi berdasarkan ISO 27001: 2005
    • PDCA
  • Pemahaman persyaratan sistem manajemen keamanan informasi (SMKI)
    • Persyaratan Umum
    • Penetapan dan Pengelolaan SMKI
    • Persyaratan dokumentasi
    • Tanggung jawab Pimpinan
    • Audit internal SMKI
    • Tinjauan Manajemen SMKI
    • Peningkatan Berkesinambungan SMKI
  • Pemahaman Lampiran Persyaratan Standar ISO 27001: 2005

 

SASARAN PESERTA TRAINING ISO 27001: 2005

Kandidat Wakil Manajemen, Tim Implementasi ISO, Manager, Supervisor, Engineer

 

METODE TRAINING ISO 27001: 2005

Pelatihan ini menekankan penggunaan Diskusi, Simulasi, Kasus-kasus dan Latihan

 

INSTRUCTOR TRAINING ISO 27001: 2005 :   Yuwono D. Sucipto

 

VENUE : Jakarta (Maxone Hotel Menteng, Balairung Hotel Matraman, Sentral Hotel, Haris Tebet, Gd Muamalat Institute, Ibis Manggadua, Little Amaroossa Residence, Cosmo Amaroossa, Zodiak MT. Haryono, Grand Tjokro)

 

TRAINING DURATION :   2 days

 

JADWAL TRAINING 2019

  1. 19 Feb 2019-20 Feb 2019
  2. 19 Mar 2019-20 Mar 2019
  3. 15 Apr 2019-16 Apr 2019
  4. 29 Apr 2019-30 Apr 2019
  5. 19 Jun 2019-20 Jun 2019
  6. 03 Jul 2019-04 Jul 2019
  7. 20 Agust 2019-21 Agust 2019
  8. 17 Sep 2019-18 Sep 2019
  9. 02 Okt 2019-03 Okt 2019
  10. 19 Nop 2019-20 Nop 2019
  11. 17 Des 2019-18 Des 2019

 

HARGA INVESTASI/PESERTA

  1. 4.500.000/peserta (bayar penuh) atau
  2. 4.250.000/peserta (early bird, yang membayar 1 minggu sebelum training) atau
  3. 3.950.000/peserta (peserta bergroup yang terdiri dari 3 peserta atau lebih dari 1 perusahaan yang sama)

 

FACILITIES FOR PARTICIPANTS

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor

 

PEMAHAMAN & PENERAPAN SISTEM MANAJEMEN KEAMANAN INFORMASI ISO 27001: 2005

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

SECURITY RISK ASSESSMENT WITH SOFTWARE FASRIM

EVENT

Schedule by request | Rp. 7.000.000/person at Yogyakarta

 

INTRODUCTION SECURITY RISK ASSESSMENT WITH SOFTWARE FASRIM

Security Risk Analysis is an essential security management tool, the standards for which are determined by whatever management decides it wants to accept in terms of actual loss (Broder, James F.,”Risk Analysis and the Security Survey”, Third Edition, Butterworth-Heinemann); thus, this process is highly important for management in order to prepare company against (potential) crime from occurring and to reduce security risks towards business operation, since without or with substandard Security Risk Analysis, threats may not be identified or the company is not well prepared for such threats, resulting in huge loss for the company.

As SunTzu stated in “The Art of War”, “the general who wins a battle makes many calculations in his temple ere the battle is fought. The general who loses a battle makes but few calculations beforehand”. He also stated that “The general who is not well acquainted with the configuration of the country, yet he will not be able to turn his knowledge to practical account.

 

SECURITY RISK ASSESSMENT WITH SOFTWARE FASRIM TRAINING OUTLINE

  • Introduction to Security Risk Analysis and Security Risk Management
  • Introduction to Security Risk Analysis and Security Risk Management (continued)
  • New Security Approach
  • Diamond Theory
  • Hierarchy of Risk Control for Security
  • Practice on manual Security Risk Assessment
  • (Laptops installed with FASRIM)
  • Explanation on how to use software FASRIM
  • FASRIM Exercise 1: Casework 1
  • FASRIM Exercise 2: Casework 2
  • Summary

 

EXPLANATION ABOUT THE SOFTWARE TRAINING:

To-date, Security Analysis which comprises of Security Vulnerability Assessment (SVA) and Risk Mitigation, is a complex process and often performed manually, unsystematic and mostly un-standardized. With FASRIM (Facility Security Risk Management), Security Risk Analysis are made easy, systematically, and standardized.

FASRIM is the first and only Security Risk Management software to assist company management is identifying threats, measuring risk levels, planning mitigation actions to lower risks, keeping data on all Analysis and mitigation actions performed.

By attending this training, participants will receive:

  1. FASRIM (Facility Security Risk Management) Software
  2. Training on how to operate FASRIM
  3. New risk management approach to security (crime diamond theory, security hierarchy of risk control)
  4. All future updates regarding FASRIM (exclusively for first training batch, limited offer)

 

WHO SHOULD ATTEND THIS TRAINING?

Managers holding security functions (Security Managers, Safety Managers), employees assigned to design security system, supervisors responsible for security of specific area(s), or management who is concern with the current security system and/or wishes to reduce crime or security risks within his/her area of responsibility.

 

NOTES

During the registration, participants are expected to bring and handover their laptops for FASRIM installation. The computer must be in Administrator log-in, which will allow us to install the software, including the following supporting software, i.e. Microsoft SQL Server and Microsoft Visual Studio. The laptop must be installed with Windows 7 or 8.

 

INSTRUCTOR SECURITY RISK ASSESSMENT WITH SOFTWARE FASRIM

WinLeftian Noor, SE., MM. ICPS.

Win Noor, SE., MM., ICPSis a security practitioner and an expert with an educational background Master Degree in Management, and a certified ICPS (International Crime Prevention Specialist) which supports him in developing a well-planned, systematic approach to security management.

He is well-experienced in performing various security functions, e.g.:

  • development of Security Management System, and 3 year Security Strategic Goals/Objectives,
  • development of security procedures, Security Unrest Plan, and Crisis Management Plan,
  • development of Security Work Programs and budgets,etc

He also developed security approaches such as: Crime Diamond Theory and Security Hierarchy of Risk Control. He focuses on Security Risk Management and Analysis by performing research and observation, and by adapting various analysis from other disciplines to security, e.g.: Benefit-Cost Analysis, Risk Management, Root-Cause Analysis (Ishikawa Fishbone Analysis), FMEA (Failure-Mode and Effect Analysis),  SCAT (Systematic Cause Analysis Technique), Trend Analysis, Statistical Analysis, etc. To date, he has developed concepts for two security software, i.e.: FASRIM (Facility Security Risk Management) and SYSCAT (Systematic Cause Analysis Tool).

 

TRAINING DURATION SECURITY RISK ASSESSMENT WITH SOFTWARE FASRIM

2 days

 

TRAINING TIME SECURITY RISK ASSESSMENT WITH SOFTWARE FASRIM

  • Schedule by request

 

INVESTMENT PRICE/PERSON :

  1. Rp. 7.000.000/person (full fare) or
  2. Rp. 6.750.000/person (early bird, payment 1 week before training) or
  3. Rp. 6.500.000/person (if there are 3 persons or more from the same company)

 

FACILITIES FOR PARTICIPANTS:

  1. Modul Training
  2. Flashdisk Training berisi materi training
  3. Sertifikat
  4. ATK: NoteBook dan Ballpoint
  5. T-Shirt
  6. Ransel
  7. Foto Training
  8. Ruang Training dengan fasilitas Full AC dan multimedia
  9. Makan siang dan 2 kali coffeebreak
  10. Instruktur yang Qualified
  11. Transportasi untuk peserta dari hotel penginapan ke hotel tempat training – PP (jika peserta minimal dari satu perusahaan ada 4 peserta)

 

APPLIED FACILITY SECURITY RISK ASSESSMENT WITH SOFTWARE FASRIM (FACILITY SECURITY RISK MANAGEMENT)

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

INFORMATION SECURITY SYSTEM

Acara

18 – 20 Februari 2019 | Rp 6.500.000/ peserta di Bandung
18 – 20 Maret 2019 | Rp 6.500.000/ peserta di Bandung
01 – 03 April 2019 | Rp 6.500.000/ peserta di Bandung
20 – 22 Mei 2019 | Rp 6.500.000/ peserta di Bandung

Jadwal Training 2019 Selanjutnya …

 

 

INTRODUCTION

The information you collect, store, manage and transfer is an organizational asset. It adds value to your business and consequently needs to be suitably protected. It may be the personal details of your customers or confidential financial data. Growing dependence on information systems, shared networks and distributed services like cloud computing means organizations are more now even more vulnerable to security threats. In a recent survey by the Chartered Management Institute, 72% of businesses admitted that they were worried about the financial impact of cybercrime with 1 in 3 having experienced such attacks in 2010. Poor supervision of staff and lack of proper authorization procedures are frequently highlighted as major causes of security incidents.

 

INFORMATION SECURITY SYSTEM TRAINING OBJECTIVE

  1. The training will increase the key knowledge of your information securityconcepts and trends for secure administration and management f computer systems and networking
  2. To be thoroughly understand of the challenges of network security in a global, dynamic networked systems environment
  3. To understand te wide range of vulnerabilities and threats to which an organization’s information assets may be exposed
  4. To identifty ways to improve readiness in responding and recovering from information security incidents

 

INFORMATION SECURITY SYSTEM TRAINING OUTLINE

  1. Dimension of Information Security
  2. Security Management Practices
  3. Human Resources Security
  4. Cryptography
  5. Network Security Technology
  6. Information Security Technology
  7. Access Control System
  8. Disaster Recovery Planning/ Business Continuity Planning
  9. Operation Security
  10. Physical Security

 

INSTRUCTOR

Ir. Emir Mauludi Husni, M.Sc., Ph.D. and Team

Ir. Emir Mauludi Husni, M.Sc., Ph.D. is an alumnus from Electrical Engineering, Institut Teknologi Bandung (Bachelor), Satellite Engineering University of Surrey, UK. (Master), and Telecommunication Engineering University of Surrey, UK. (Ph.D.). Now he is a permanent academic staff at School of Electrical Engineering & Informatics ITB. He have been interacting with industry for more than 15 years for training, consultancy and project implementation in field of ICT. In his expertise in ITB, he has dedicated much scientific work, such as publish to scientific journals and being speaker in national and international conferences.

 

VENUE 

Bandung (Golden Flower, Banana Inn, Serela, Gino Feruci), Amaroossa Hotel, Noor Hotel, Grand Setiabudi Hotel, dll

 

TRAINING DURATION

3 days

 

JADWAL TRAINING 2019

  1. 07 Jan 2019-09 Jan 2019
  2. 18 Feb 2019-20 Feb 2019
  3. 18 Mar 2019-20 Mar 2019
  4. 01 Apr 2019-03 Apr 2019
  5. 20 Mei 2019-22 Mei 2019
  6. 17 Jun 2019-19 Jun 2019
  7. 08 Jul 2019-10 Jul 2019
  8. 19 Agust 2019-21 Agust 2019
  9. 16 Sep 2019-18 Sep 2019
  10. 07 Okt 2019-09 Okt 2019
  11. 18 Nop 2019-20 Nop 2019
  12. 09 Des 2019-11 Des 2019

 

INVESTMENT PRICE/PERSON

  1. Rp 6.500.000/person (full fare) or
  2. Rp 6.250.000/person (early bird, payment 1 week before training) or
  3. Rp 5.950.000/person (if there are 3 or more participants from the same company)

 

FACILITIES FOR PARTICIPANTS

  1. Training Module
  2. Flashdisk contain training material
  3. Certificate
  4. NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Foto
  8. Training room with full ac facilities and multimedia
  9. Lunch and twice coffee break everyday of training
  10. Qualified Instructor
  11. Transportation from hotel of participants to hotel of training VV (if minimal participants from the same company is 4 )

 

INFORMATION SECURITY SYSTEM

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

IT HELPDESK

ACARA

26 – 28 Desember 2018 | Rp 5.950.000 di Bandung

Jadwal Training 2019

14 – 16 Januari 2019 | Rp 6.500.000/ peserta di Bandung
06 – 08 Februari 2019 | Rp 6.500.000/ peserta di Bandung
06 – 08 Maret 2019 | Rp 6.500.000/ peserta di Bandung
03 – 05 April 2019 | Rp 6.500.000/ peserta di Bandung

Jadwal Training 2019 Selanjutnya …



PENGANTAR PELATIHAN IT HELPDESK

IT Helpdesk adalah sebuah subsistem dalam implementasi IT di perusahaan. IT Helpdesk dibangun dengan pemahaman terhadap kebutuhan pengguna IT di lapangan. Pengguna bisa jadi staf internal perusahaan atau pelaggan layanan yang disediakan perusahaan. Pemahaman ini dibangun berdasarkan pengetahuan, ketrampilan dan kemampuan yang dibutuhkan dalam bisnis perusahaan. Kursus ini akan memberikan pemahaman tentang diagnosa dan solusi atas masalah-masalah yang terkait perangkat keras dan perangkat lunak IT.

 

MATERI PELATIHAN IT HELPDESK

  1. Peran IT dalam strategi bisnis perusahaan.
  2. Identifikasi dan set-up peran komputer dan jenis-jenis end users dan kebutuhan mereka beserta lisensinya.
  3. Identifikasi peran staf pendukung dengan beragam fungsi dan layanannya.
  4. Identifikasi ketrampilan layanan pelanggan untuk staf pendukung.
  5. Komunikasi efektif dengan pelanggan untuk penyelesaian masalah.
  6. Pengembangan prosedur perbaikan IT.
  7. Pengembangan strategi penyelesaian masalah IT.
  8. Pengembangan prosedur peningkatan ketrampilan IT helpdesk.
  9. Pendefinisian operasi dan manajemen IT helpdesk.
  10.  Dokumentasi dan pelacakan panggilan pelanggan berbantuan perangkat lunak.
  11. Penulisan Standard Operating Procedure dalam IT Helpdesk.
  12. IT Helpdesk Key Performance Indicator.

 

PESERTA YANG DIREKOMENDASIKAN:

Manajer dan staf IT dan manajer atau pihak-pihak yang perlu dilibatkan dalam perancangan dan operasionalisasi IT Helpdesk.

 

INSTRUCTOR PELATIHAN IT HELPDESK

Singgih Saptadi, ST. MT. and Team

Singgih Saptadi, ST.MT.  adalah Master lulusan Teknik Industri ITB yang juga merupakan dosen tetap Teknik Industri UNDIP. Pernah menjabat Kepala Laboratorium Sistem Produksi dan Kepala Laboratorium Sistem Pendukung Keputusan Universitas Diponegoro. Bidang keahlian Beliau adalah Manajemen Operasi, Analisis dan Perancangan Pabrik, Manajemen pemeliharaan, Manajemen Resiko, Analisis Keputusan, Pengambilan Keputusan Multi-Kriteria, Supply-Chain Management Pemodelan dan Simulasi Sistem Industri, E-Business, Perencanaan dan Perancangan Sistem Perusahaan serta Perencanaan Strategis Sistem Informasi. Dengan kompetensi tersebut, Beliau terlibat dalam kegiatan konsultansi di Bank Indonesia, Pertamina, BRI, BNI, Holcim, Conoco Phillips, Freeport dan beberapa industri lainnya, termasuk perguruan tinggi. Selain itu, Beliau banyak memberikan pelatihan untuk industri dalam bidang-bidang kompetensi tersebut.

 

VENUE PELATIHAN IT HELPDESK

Bandung (Golden Flower, Banana Inn, Serela, Gino Feruci), Amaroossa Hotel, Noor Hotel, Grand Setiabudi Hotel, dll

 

TRAINING DURATION IT HELPDESK

3  days

 

JADWAL TRAINING 2019

  1. 14 Jan 2019-16 Jan 2019
  2. 06 Feb 2019-08 Feb 2019
  3. 06 Mar 2019-08 Mar 2019
  4. 03 Apr 2019-05 Apr 2019
  5. 15 Mei 2019-17 Mei 2019
  6. 17 Jun 2019-19 Jun 2019
  7. 17 Jul 2019-19 Jul 2019
  8. 07 Agust 2019-09 Agust 2019
  9. 04 Sep 2019-06 Sep 2019
  10. 16 Okt 2019-18 Okt 2019
  11. 06 Nop 2019-08 Nop 2019
  12. 11 Des 2019-13 Des 2019

 

INVESTATION PRICE/PERSON

2018

  1. Rp 5.950.000/peserta (bayar penuh)  atau
  2. Rp 5.750.000/peserta (early bird, yang membayar 1 minggu sebelum training) atau
  3. Rp 5.500.000/peserta (grup, untuk 3 peserta atau lebih dari 1 perusahaan yang sama)

2019

  1. Rp. 6.500.000/person (full fare) or
  2. Rp. 6.250.000/person (early bird, payment 1 week before training) or
  3. Rp. 5.950.000/person (if there are 3 persons or more from the same company)

 

FACILITIES FOR PARTICIPANTS:

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor
  11. Transportation for participants from hotel of participants to/from hotel of training – VV (if minimal participants is 4 persons from the same company)

 

IT HELPDESK

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

Security+ CompTIA

EVENT

21 – 25 January 2019 | Rp 10.000.000 at Kuningan
22 – 26 April 2019 | Rp 10.000.000 at Kuningan
15 – 19 July 2019 | Rp 10.000.000 at Kuningan
21 – 25 October 2019 | Rp 10.000.000 at Kuningan

 

 

COURSE DESCRIPTION Security+ CompTIA

The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations.

CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Security+ objectives reflect the subject areas in this edition of this exam, and result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an information security professional with two years of experience.



TARGET AUDIENCE Security+ CompTIA

IT Specialist, InfoSec, Risk Manager/Analyst, Security architect, ISSO, Penetration Tester/Ethical Hacker



DURATION Security+ CompTIA

5 (Five) full days program



PREREQUISITES Security+ CompTIA

The CompTIA Security+ Certification is aimed at an IT security professional who has:

  • A minimum of 2 years experience in IT administration with a focus on security
  • Day to day technical information security experience



C
OURSE MODULES Security+ CompTIA

Module 1:  Network Security

1.1 Explain the security function and purpose of network devices and

technologies

1.2 Apply and implement secure network administration principles

1.3 Distinguish and differentiate network design elements and components

1.4 Implement and use common protocols

1.5 Identify commonly used default network ports

1.6 Implement wireless network in a secure manner

Module 2 : Compliance and Operational Security

2.1 Explain risk related concepts

2.2 Carry out appropriate risk mitigation strategies

2.3 Execute appropriate incident response procedures

2.4 Explain the importance of security related awareness and training

2.5 Compare and contrast aspects of business continuity

2.6 Explain the impact and proper use of environmental controls

2.7 Execute disaster recovery plans and procedures

2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA)

Module 3 : Threats and Vulnerabilities

3.1 Analyze and differentiate among types of malware

3.2 Analyze and differentiate among types of attacks

3.3 Analyze and differentiate among types of social engineering attacks

3.4 Analyze and differentiate among types of wireless attacks

3.5 Analyze and differentiate among types of application attacks

3.6 Analyze and differentiate among types of mitigation and deterrent techniques

3.7 Implement assessment tools and techniques to discover security threats and

vulnerabilities

3.8 Within the realm of vulnerability assessments, explain the proper use of

penetration testing versus vulnerability scanning

Module 4 : Application, Data and Host Security

4.1 Explain the importance of application security

4.2 Carry out appropriate procedures to establish host security

4.3 Explain the importance of data security

Module 5 : Access Control and Identity Management

5.1 Explain the function and purpose of authentication services

5.2 Explain the fundamental concepts and best practices related to

authentication,authorization and access control

5.3 Implement appropriate security controls when performing account

management

Module 6 : Cryptography

6.1 Summarize general cryptography concepts

6.2 Use and apply appropriate cryptographic tools and products

6.3 Explain the core concepts of public key infrastructure

6.4 Implement PKI, certificate management and associated components

 

VENUE AND TIME

  • 21 – 25 January 2019
  • 22 – 26 April 2019
  • 15 – 19 July 2019
  • 21 – 25 October 2019
  • Time                : 09.00AM – 05.00PM
  • Venue             : AXA Tower Kuningan City,  Jakarta Selatan



PRICING Security+ CompTIA

IDR 10.000.000



TRAINING PACKAGES Security+ CompTIA

  • Original Courseware from CompTIA
  • Security+ Exam
  • Certificate of Attendance
  • Security+ Certification from CompTIA (if pass the exam)
  • Lunch and Coffee Break
  • Stationery
  • Exclusive Souvenir

Security+ CompTIA

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

CASP – CompTIA Advanced Security Practitioner

Event

28 January – 01 February 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan
08 – 12 April 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan
22 – 26 July 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan
28 October – 01 November 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan

 

 

COURSE DESCRIPTION CASP (CompTIA Advanced Security Practitioner )

The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus at the enterprise level.

CASP meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments.

 

COURSE OBJECTIVES CASP (CompTIA Advanced Security Practitioner )

At the end of the program, the participants will be able to:

  • Apply technical knowledge and skills of Advanced IT Security
  • Conceptualize, engineer, integrate and implement secure solutions across complex environments
  • Apply critical thinking and judgment across a broad spectrum of security disciplines
  • Propose and implement sustainable security solutions that map to organizational strategies
  • Translate business needs into security requirements
  • Analyzes risk impact
  • Respond to security incidents

 

TARGET AUDIENCE CASP (CompTIA Advanced Security Practitioner )

The CASP Certification is aimed for Cyber Security / IS Professional, Information Security Analyst, Security Architect, IT Specialist INFOSEC, IT Specialist Cybersecurity.

 

DURATION CASP (CompTIA Advanced Security Practitioner )

This program is 5 days of intensive training class.

 

REQUIREMENT:

It is recommended for CASP candidates to have 10 years experience in IT administration including at least 5 years of hands-on technical security experience.

 

Assessment

At the end of the program, the participants will be assessed with 1 hour and 45 minutes of CASP Exam.

 

Award:

CASP Certification will be awarded upon successfully passing the exam from CompTIA.

 

COURSE MODULES CASP (CompTIA Advanced Security Practitioner )

Module 1: Enterprise Security

  • Select Appropriate Cryptographic Concepts and Techniques
  • Illustrate the Security Implications Associated with Enterprise Storage
  • Analyze Network and Security Components, Concepts and Architectures
  • Troubleshoot Security Controls for Hosts
  • Differentiate Application Vulnerabilities and Select Appropriate Security Controls

Module 2: Risk Management and Incident Response

  • Interpret Business and Industry Influences and Explain Associated Security Risks
  • Execute Risk Mitigation Planning, Strategies and Controls
  • Compare and Contrast Security, Privacy Policies and Procedures
  • Conduct Incident Response and Recovery Procedures

Module 3: Research, Analysis and Assessments

  • Apply Research Methods to Determine Industry Trends and Impact to the Enterprise
  • Analyze Scenarios to Secure the Enterprise
  • Select Methods or Tools Appropriate to Conduct an Assessment and Analyze Results

Module 4: Integration of Computing, Communications and Business Disciplines

  • Facilitate Collaboration Across Diverse Business Units to Achieve Security Goals
  • Select the Appropriate Control to Secure Communications and Collaboration Solutions
  • Implement Security Activities Across the Technology Life Cycle

Module 5: Technical Integration of Enterprise Components

  • Integrate Hosts, Storage, Networks and Applications into a Secure Enterprise Architecture
  • Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives

 

VENUE AND TIME

  • 11 – 15 March 2019
  • 10 – 14 June 2019
  • 02 – 06 September 2019
  • 02 – 06 December 2019

Time     : 09.00 AM – 05.00 PM

Venue   : AXA Tower Kuningan City, Jakarta Selatan

 

TRAINING PACKAGES

  • Get More Special Discount if can register for minimum 3 (three) Participants
  • Original CASP Courseware from CompTIA
  • CASP Pre Assessment, Exercises and Mock Exam Simulation
  • CASP Exam Voucher
  • Certificate of Attendance from Informatics (Singapore)
  • CASP Certification from CompTIA (if pass the exam)
  • Lunch and Coffee Break
  • Stationery
  • Exclusive Souvenir

 

CompTIA Advanced Security Practitioner (CASP)

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

 

Cyber Crime In Finance Sector

ACARA

02 – 03 Januari 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
05 – 06 Maret 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
02 – 03 Mei 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
03 – 04 Juli 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta

Jadwal Training 2019 Selanjutnya…

 

PENDAHULUAN TRAINING CYBER CRIME IN FINANCE SECTOR

Cyber crime, atau Kejahatan Dunia Maya, terutama di industri perbankan dan lembaga keuangan lainnya, dari waktu ke waktu semakin tinggi frekuensinya dan ruang lingkupnya juga semakin luas, sementara dampak negatif dan tingkat kerugian yang diderita oleh individu maupun organisasi di berbagai industri dan berbagai negara semakin tinggi dan banyak.

Oleh karenanya, dalam menghadapi fenomena ini, Cyber Resilience yaitu kemampuan untuk bertahan dan kemudian melakukan serangan balik di dunia maya sementara di sisi lain melindungi aset bisnis yang kritikal agar aktivitas bisnis bisa tetap beroperasi dan pulih ke kondisi normal, diyakini sebagai solusi tepat, ketimbang Cyber Security, yang notabene berfokus pada jenis serangan dan kejahatan, namun melupakan faktor waktu dan dampaknya terhadap aset bisnis organisasi.

 

TUJUAN AKHIR TRAINING CYBER CRIME IN FINANCE SECTOR

Pada akhir sesi pelatihan, peserta diharapkan mampu untuk:

  1. Memahami Tren Terbaru Kejahatan di Dunia Maya, Tingkat dan Skalanya.
  2. Mendalami Situasi dan Kondisi Terakhir.
  3. Memahami Masalah, Sebab dan Dampaknya Secara Bisnis.
  4. Memahami Kondisi Keamanan Saat Ini di Berbagai Organisasi.
  5. Mengenal Berbagai Jenis Resiko dan Ancaman (Threat) Kejahatan Dunia Maya.
  6. Mendalami Berbagai Jenis Kerentanan dan Kelemahan.
  7. Mengimplementasikan Strategi dan Solusi yang Efektif atas Kejahatan Dunia Maya.

 

TOPIK BAHASAN TRAINING CYBER CRIME IN FINANCE SECTOR

  1. Tren, Situasi dan Kondisi Kejahatan Dunia Maya.
  2. Masalah, Sebab dan Dampaknya Secara Bisnis.
  3. Kondisi Keamanan Saat Ini di berbagai Organisasi dan Pemerintahan.
  4. Berbagai Jenis Resiko dan Ancaman (Threat) Kejahatan Dunia Maya.
  5. Berbagai Jenis Kerentanan dan Kelemahan (Vulnerabilities).
  6. Perencanaan dan Strategi Cyber Resilience
  7. Pemahaman atas Standar ISO 27000 untuk Cyber Resilience dan Cyber Security
  8. Pemahaman atas Framework NIST untuk Cyber Resilience dan Cyber Security
  9. Tool dan Teknik sebagai Countermeasure terhadap Cyber Crime.

 

METODE TRAINING CYBER CRIME IN FINANCE SECTOR

Agar pelatihan dapat berlangsung secara efektif dan efisien, 30% waktu akan dialokasikan untuk konsep penting dan 70% untuk diskusi, latihan serta studi kasus.

 

TARGET PERSERTA TRAINING CYBER CRIME IN FINANCE SECTOR

Staff, Officer, Penyelia, Manajer, Manajer Senior`, Kepala Bagian, Kepala Divisi, Kepala Departemen, Konsultan, maupun profesional lain di bidang Teknologi Informasi, Keuangan, Akuntansi, Manajemen Resiko, Audit, Compliance (Kepatuhan), Governance (Tata Kelola), Keamanan Informasi (Information Security) di industri perbankan yang ingin memperoleh, mengetahui, memahami, menguasai, meningkatkan, memperdalam pengetahuan serta kemampuan dalam menghadapi serta mengatasi Kejahatan Dunia Maya di dalam maupun di luar organisasinya.

 

FACILITATOR TRAINING CYBER CRIME IN FINANCE SECTOR

Goutama Bachtiar

Goutama Bachtiar adalah : Advisor, Auditor, Konsultan, Trainer, Courseware Designer dan Penulis bidang Teknologi dan Sistem Informasi selama 17 tahun terakhir dengan spesialisasi di ranah IT Governance, Risk, Security, Assurance, Audit dan IT Management.

Saat ini beliau menjabat sebagai advisor beberapa perusahaan dan organisasi, Subject Matter Expert, Program Mentor, Editorial Journal Reviewer, Certification Exam (CISA, CGEIT, CISM, CRISC) dan Study Materials Developer di ISACA International Chapter, Subject Matter Expert dan Program Evaluator di PMI International Chapter, IASA, SABSA dan Open Group Global Working Group Member, Reviewer Panel di International Institute of Business Analysis (IIBA), Dosen Tamu di program pasca sarjana beberapa universitas di AS dan Indonesia (UTB, UI, IPB dan Binus), serta moderator, panelis dan pembicara di sejumlah konferensi, workshop dan seminar.

Sebagai auditor dan konsultan, telah memberikan layanan tersebut kepada 35 perusahaan dan organisasi. Puluhan sertifikasi internasional sudah diperolehnya sampai dengan saat ini.

Selain itu, beliau juga telah mengadakan dan memberikan pelatihan, perkuliahan, seminar, konferensi dan workshop sebanyak lebih dari 230 sesi dan 5500 jam lebih kepada sekitar 7500 peserta di Indonesia maupun luar negeri kepada lebih dari 70 perusahaan dan organisasi.

Sebagai penulis, sudah mengarang 2 buku dan 22 courseware serta sudah menulis, melakukan review dan editing atas 300 artikel, manuskrip, paper dan white paper seputar Telematika dan Manajemen di lebih dari 20 media, publikasi, organisasi, jurnal dan konferensi.

 

Current State Of Cyber Crime In Finance Sector: Threats And Solutions

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days