Category Archives: Security

Security+ CompTIA

EVENT

21 – 25 January 2019 | Rp 10.000.000 at Kuningan
22 – 26 April 2019 | Rp 10.000.000 at Kuningan
15 – 19 July 2019 | Rp 10.000.000 at Kuningan
21 – 25 October 2019 | Rp 10.000.000 at Kuningan

 

 

COURSE DESCRIPTION Security+ CompTIA

The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations.

CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Security+ objectives reflect the subject areas in this edition of this exam, and result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an information security professional with two years of experience.



TARGET AUDIENCE Security+ CompTIA

IT Specialist, InfoSec, Risk Manager/Analyst, Security architect, ISSO, Penetration Tester/Ethical Hacker



DURATION Security+ CompTIA

5 (Five) full days program



PREREQUISITES Security+ CompTIA

The CompTIA Security+ Certification is aimed at an IT security professional who has:

  • A minimum of 2 years experience in IT administration with a focus on security
  • Day to day technical information security experience



C
OURSE MODULES Security+ CompTIA

Module 1:  Network Security

1.1 Explain the security function and purpose of network devices and

technologies

1.2 Apply and implement secure network administration principles

1.3 Distinguish and differentiate network design elements and components

1.4 Implement and use common protocols

1.5 Identify commonly used default network ports

1.6 Implement wireless network in a secure manner

Module 2 : Compliance and Operational Security

2.1 Explain risk related concepts

2.2 Carry out appropriate risk mitigation strategies

2.3 Execute appropriate incident response procedures

2.4 Explain the importance of security related awareness and training

2.5 Compare and contrast aspects of business continuity

2.6 Explain the impact and proper use of environmental controls

2.7 Execute disaster recovery plans and procedures

2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA)

Module 3 : Threats and Vulnerabilities

3.1 Analyze and differentiate among types of malware

3.2 Analyze and differentiate among types of attacks

3.3 Analyze and differentiate among types of social engineering attacks

3.4 Analyze and differentiate among types of wireless attacks

3.5 Analyze and differentiate among types of application attacks

3.6 Analyze and differentiate among types of mitigation and deterrent techniques

3.7 Implement assessment tools and techniques to discover security threats and

vulnerabilities

3.8 Within the realm of vulnerability assessments, explain the proper use of

penetration testing versus vulnerability scanning

Module 4 : Application, Data and Host Security

4.1 Explain the importance of application security

4.2 Carry out appropriate procedures to establish host security

4.3 Explain the importance of data security

Module 5 : Access Control and Identity Management

5.1 Explain the function and purpose of authentication services

5.2 Explain the fundamental concepts and best practices related to

authentication,authorization and access control

5.3 Implement appropriate security controls when performing account

management

Module 6 : Cryptography

6.1 Summarize general cryptography concepts

6.2 Use and apply appropriate cryptographic tools and products

6.3 Explain the core concepts of public key infrastructure

6.4 Implement PKI, certificate management and associated components

 

VENUE AND TIME

  • 21 – 25 January 2019
  • 22 – 26 April 2019
  • 15 – 19 July 2019
  • 21 – 25 October 2019
  • Time                : 09.00AM – 05.00PM
  • Venue             : AXA Tower Kuningan City,  Jakarta Selatan



PRICING Security+ CompTIA

IDR 10.000.000



TRAINING PACKAGES Security+ CompTIA

  • Original Courseware from CompTIA
  • Security+ Exam
  • Certificate of Attendance
  • Security+ Certification from CompTIA (if pass the exam)
  • Lunch and Coffee Break
  • Stationery
  • Exclusive Souvenir

Security+ CompTIA

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

CASP – CompTIA Advanced Security Practitioner

Event

28 January – 01 February 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan
08 – 12 April 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan
22 – 26 July 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan
28 October – 01 November 2019 | Rp 12.000.000 at Kuningan, Jakarta Selatan

 

 

COURSE DESCRIPTION CASP (CompTIA Advanced Security Practitioner )

The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus at the enterprise level.

CASP meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments.

 

COURSE OBJECTIVES CASP (CompTIA Advanced Security Practitioner )

At the end of the program, the participants will be able to:

  • Apply technical knowledge and skills of Advanced IT Security
  • Conceptualize, engineer, integrate and implement secure solutions across complex environments
  • Apply critical thinking and judgment across a broad spectrum of security disciplines
  • Propose and implement sustainable security solutions that map to organizational strategies
  • Translate business needs into security requirements
  • Analyzes risk impact
  • Respond to security incidents

 

TARGET AUDIENCE CASP (CompTIA Advanced Security Practitioner )

The CASP Certification is aimed for Cyber Security / IS Professional, Information Security Analyst, Security Architect, IT Specialist INFOSEC, IT Specialist Cybersecurity.

 

DURATION CASP (CompTIA Advanced Security Practitioner )

This program is 5 days of intensive training class.

 

REQUIREMENT:

It is recommended for CASP candidates to have 10 years experience in IT administration including at least 5 years of hands-on technical security experience.

 

Assessment

At the end of the program, the participants will be assessed with 1 hour and 45 minutes of CASP Exam.

 

Award:

CASP Certification will be awarded upon successfully passing the exam from CompTIA.

 

COURSE MODULES CASP (CompTIA Advanced Security Practitioner )

Module 1: Enterprise Security

  • Select Appropriate Cryptographic Concepts and Techniques
  • Illustrate the Security Implications Associated with Enterprise Storage
  • Analyze Network and Security Components, Concepts and Architectures
  • Troubleshoot Security Controls for Hosts
  • Differentiate Application Vulnerabilities and Select Appropriate Security Controls

Module 2: Risk Management and Incident Response

  • Interpret Business and Industry Influences and Explain Associated Security Risks
  • Execute Risk Mitigation Planning, Strategies and Controls
  • Compare and Contrast Security, Privacy Policies and Procedures
  • Conduct Incident Response and Recovery Procedures

Module 3: Research, Analysis and Assessments

  • Apply Research Methods to Determine Industry Trends and Impact to the Enterprise
  • Analyze Scenarios to Secure the Enterprise
  • Select Methods or Tools Appropriate to Conduct an Assessment and Analyze Results

Module 4: Integration of Computing, Communications and Business Disciplines

  • Facilitate Collaboration Across Diverse Business Units to Achieve Security Goals
  • Select the Appropriate Control to Secure Communications and Collaboration Solutions
  • Implement Security Activities Across the Technology Life Cycle

Module 5: Technical Integration of Enterprise Components

  • Integrate Hosts, Storage, Networks and Applications into a Secure Enterprise Architecture
  • Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives

 

VENUE AND TIME

  • 11 – 15 March 2019
  • 10 – 14 June 2019
  • 02 – 06 September 2019
  • 02 – 06 December 2019

Time     : 09.00 AM – 05.00 PM

Venue   : AXA Tower Kuningan City, Jakarta Selatan

 

TRAINING PACKAGES

  • Get More Special Discount if can register for minimum 3 (three) Participants
  • Original CASP Courseware from CompTIA
  • CASP Pre Assessment, Exercises and Mock Exam Simulation
  • CASP Exam Voucher
  • Certificate of Attendance from Informatics (Singapore)
  • CASP Certification from CompTIA (if pass the exam)
  • Lunch and Coffee Break
  • Stationery
  • Exclusive Souvenir

 

CompTIA Advanced Security Practitioner (CASP)

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

 

Cyber Crime In Finance Sector

ACARA

02 – 03 Januari 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
05 – 06 Maret 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
02 – 03 Mei 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
03 – 04 Juli 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta

Jadwal Training 2019 Selanjutnya…

 

PENDAHULUAN TRAINING CYBER CRIME IN FINANCE SECTOR

Cyber crime, atau Kejahatan Dunia Maya, terutama di industri perbankan dan lembaga keuangan lainnya, dari waktu ke waktu semakin tinggi frekuensinya dan ruang lingkupnya juga semakin luas, sementara dampak negatif dan tingkat kerugian yang diderita oleh individu maupun organisasi di berbagai industri dan berbagai negara semakin tinggi dan banyak.

Oleh karenanya, dalam menghadapi fenomena ini, Cyber Resilience yaitu kemampuan untuk bertahan dan kemudian melakukan serangan balik di dunia maya sementara di sisi lain melindungi aset bisnis yang kritikal agar aktivitas bisnis bisa tetap beroperasi dan pulih ke kondisi normal, diyakini sebagai solusi tepat, ketimbang Cyber Security, yang notabene berfokus pada jenis serangan dan kejahatan, namun melupakan faktor waktu dan dampaknya terhadap aset bisnis organisasi.

 

TUJUAN AKHIR TRAINING CYBER CRIME IN FINANCE SECTOR

Pada akhir sesi pelatihan, peserta diharapkan mampu untuk:

  1. Memahami Tren Terbaru Kejahatan di Dunia Maya, Tingkat dan Skalanya.
  2. Mendalami Situasi dan Kondisi Terakhir.
  3. Memahami Masalah, Sebab dan Dampaknya Secara Bisnis.
  4. Memahami Kondisi Keamanan Saat Ini di Berbagai Organisasi.
  5. Mengenal Berbagai Jenis Resiko dan Ancaman (Threat) Kejahatan Dunia Maya.
  6. Mendalami Berbagai Jenis Kerentanan dan Kelemahan.
  7. Mengimplementasikan Strategi dan Solusi yang Efektif atas Kejahatan Dunia Maya.

 

TOPIK BAHASAN TRAINING CYBER CRIME IN FINANCE SECTOR

  1. Tren, Situasi dan Kondisi Kejahatan Dunia Maya.
  2. Masalah, Sebab dan Dampaknya Secara Bisnis.
  3. Kondisi Keamanan Saat Ini di berbagai Organisasi dan Pemerintahan.
  4. Berbagai Jenis Resiko dan Ancaman (Threat) Kejahatan Dunia Maya.
  5. Berbagai Jenis Kerentanan dan Kelemahan (Vulnerabilities).
  6. Perencanaan dan Strategi Cyber Resilience
  7. Pemahaman atas Standar ISO 27000 untuk Cyber Resilience dan Cyber Security
  8. Pemahaman atas Framework NIST untuk Cyber Resilience dan Cyber Security
  9. Tool dan Teknik sebagai Countermeasure terhadap Cyber Crime.

 

METODE TRAINING CYBER CRIME IN FINANCE SECTOR

Agar pelatihan dapat berlangsung secara efektif dan efisien, 30% waktu akan dialokasikan untuk konsep penting dan 70% untuk diskusi, latihan serta studi kasus.

 

TARGET PERSERTA TRAINING CYBER CRIME IN FINANCE SECTOR

Staff, Officer, Penyelia, Manajer, Manajer Senior`, Kepala Bagian, Kepala Divisi, Kepala Departemen, Konsultan, maupun profesional lain di bidang Teknologi Informasi, Keuangan, Akuntansi, Manajemen Resiko, Audit, Compliance (Kepatuhan), Governance (Tata Kelola), Keamanan Informasi (Information Security) di industri perbankan yang ingin memperoleh, mengetahui, memahami, menguasai, meningkatkan, memperdalam pengetahuan serta kemampuan dalam menghadapi serta mengatasi Kejahatan Dunia Maya di dalam maupun di luar organisasinya.

 

FACILITATOR TRAINING CYBER CRIME IN FINANCE SECTOR

Goutama Bachtiar

Goutama Bachtiar adalah : Advisor, Auditor, Konsultan, Trainer, Courseware Designer dan Penulis bidang Teknologi dan Sistem Informasi selama 17 tahun terakhir dengan spesialisasi di ranah IT Governance, Risk, Security, Assurance, Audit dan IT Management.

Saat ini beliau menjabat sebagai advisor beberapa perusahaan dan organisasi, Subject Matter Expert, Program Mentor, Editorial Journal Reviewer, Certification Exam (CISA, CGEIT, CISM, CRISC) dan Study Materials Developer di ISACA International Chapter, Subject Matter Expert dan Program Evaluator di PMI International Chapter, IASA, SABSA dan Open Group Global Working Group Member, Reviewer Panel di International Institute of Business Analysis (IIBA), Dosen Tamu di program pasca sarjana beberapa universitas di AS dan Indonesia (UTB, UI, IPB dan Binus), serta moderator, panelis dan pembicara di sejumlah konferensi, workshop dan seminar.

Sebagai auditor dan konsultan, telah memberikan layanan tersebut kepada 35 perusahaan dan organisasi. Puluhan sertifikasi internasional sudah diperolehnya sampai dengan saat ini.

Selain itu, beliau juga telah mengadakan dan memberikan pelatihan, perkuliahan, seminar, konferensi dan workshop sebanyak lebih dari 230 sesi dan 5500 jam lebih kepada sekitar 7500 peserta di Indonesia maupun luar negeri kepada lebih dari 70 perusahaan dan organisasi.

Sebagai penulis, sudah mengarang 2 buku dan 22 courseware serta sudah menulis, melakukan review dan editing atas 300 artikel, manuskrip, paper dan white paper seputar Telematika dan Manajemen di lebih dari 20 media, publikasi, organisasi, jurnal dan konferensi.

 

Current State Of Cyber Crime In Finance Sector: Threats And Solutions

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

MRTI: Managing IT Risks in Internet Banking

ACARA

16 – 17 Januari 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
20 – 21 Maret 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
22 – 23 Mei 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
24 – 25 Juli 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
25 – 26 September 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta

 

PENDAHULUAN TRAINING MRTI

Manajemen Resiko Teknologi Informasi (MRTI) mengidentifikasikan dan menggolongkan berbagai Resiko Teknologi Informasi yang dihadapi oleh setiap organisasi. Secara umum, proses dan aplikasi bisnis akan digunakan untuk ditinjau, diulas dan dibahas serta diakomodasi dalam proses perencanaan MRTI lebih jauh.

Berbagai skenario terkait dengan Resiko Teknologi Informasi terhadap Internet Banking (termasuk juga Mobile Banking) akan dibahas dalam pelatihan ini yang menggunakan Risk IT dari ISACA (organisasi profesi bidang audit sistem informasi dan pengendalian) sebagai salah satu framework internasional terpopuler dan paling banyak digunakan di seluruh dunia.

 

TUJUAN TRAINING MRTI

Pada akhir sesi pelatihan, peserta diharapkan untuk mampu:

  1. Memahami Konsep MRTI termasuk Standar dan Frameworknya.
  2. Mendalami Framework MRTI Risk IT dari ISACA.
  3. Melakukan Identifikasi Resiko (Risk Identification) TI.
  4. Memiliki dan Menentukan Resiko dengan Risk Assessment dan Risk Scenario.
  5. Memahami Analisa Kualitatif dan Kuantitatif.
  6. Membuat Skala dan Peringkat Resiko.
  7. Mengidentifikasi Risk Scoring, Risk Response dan Strateginya.
  8. Menentukan Kepemilikan Resiko, Tenggat Waktunya serta Key Risk Indicator.
  9. Membuat Risk Register.

 

MATERI TRAINING MRTI

  1. Memahami MRTI dengan Standar dan Frameworknya.
  2. Mendalami Framework MRTI dari ISACA yaitu Risk IT.
  3. Menguasai Risk Practitioner Guide dan Toolkit.
  4. Memanfaatkan Risk Scenario untuk Resiko Negatif maupun Positif.
  5. Melakukan Risk Identification.
  6. Menguasai Risk Assessment beserta Tekniknya.
  7. Memahami Analisa Kualitatif dan Kuantitatif.
  8. Menentukan Risk Scale dan Risk Rating.
  9. Mengidentifikasi Risk Scoring, Risk Response dan Risk Action Plan.
  10. Memahami Risk Tolerance, Risk Appetite dan Risk Key Risk Indicator.
  11. Melaksanakan Risk Register.

 

METODE TRAINING MRTI

Agar pelatihan dapat berlangsung secara efektif dan efisien, 30% waktu akan dialokasikan untuk konsep penting dan 70% untuk diskusi, latihan serta studi kasus.

 

TARGET PESERTA TRAINING MRTI

Staff, Officer, Penyelia, Manajer, Manajer Senior`, Kepala Bagian, Kepala Divisi, Kepala Departemen, Konsultan, maupun profesional lain di bidang Teknologi Informasi, Keuangan, Akuntansi, Manajemen Resiko, Audit, Compliance (Kepatuhan), Governance (Tata Kelola), Keamanan Informasi (Information Security) di industri perbankan dan lembaga keuangan lainnya yang ingin memperoleh, mengetahui, memahami, menguasai, meningkatkan, memperdalam pengetahuan serta kemampuan dalam mengelola MRTI di dalam maupun di luar organisasinya menggunakan salah satu framework internasional yang paling banyak digunakan di seluruh dunia.

 

FACILITATOR TRAINING MRTI

Goutama Bachtiar

Goutama Bachtiar adalah : Advisor, Auditor, Konsultan, Trainer, Courseware Designer dan Penulis bidang Teknologi dan Sistem Informasi selama 17 tahun terakhir dengan spesialisasi di ranah IT Governance, Risk, Security, Assurance, Audit dan IT Management.

Saat ini beliau menjabat sebagai advisor beberapa perusahaan dan organisasi, Subject Matter Expert, Program Mentor, Editorial Journal Reviewer, Certification Exam (CISA, CGEIT, CISM, CRISC) dan Study Materials Developer di ISACA International Chapter, Subject Matter Expert dan Program Evaluator di PMI International Chapter, IASA, SABSA dan Open Group Global Working Group Member, Reviewer Panel di International Institute of Business Analysis (IIBA), Dosen Tamu di program pasca sarjana beberapa universitas di AS dan Indonesia (UTB, UI, IPB dan Binus), serta moderator, panelis dan pembicara di sejumlah konferensi, workshop dan seminar.

Sebagai auditor dan konsultan, telah memberikan layanan tersebut kepada 35 perusahaan dan organisasi. Puluhan sertifikasi internasional sudah diperolehnya sampai dengan saat ini.

Selain itu, beliau juga telah mengadakan dan memberikan pelatihan, perkuliahan, seminar, konferensi dan workshop sebanyak lebih dari 230 sesi dan 5500 jam lebih kepada sekitar 7500 peserta di Indonesia maupun luar negeri kepada lebih dari 70 perusahaan dan organisasi.

Sebagai penulis, sudah mengarang 2 buku dan 22 courseware serta sudah menulis, melakukan review dan editing atas 300 artikel, manuskrip, paper dan white paper seputar Telematika dan Manajemen di lebih dari 20 media, publikasi, organisasi, jurnal dan konferensi.

 

Managing IT Risks in Internet Banking

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

Oracle Database 12C Security

ACARA

21 – 22 November 2018 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta

Jadwal Training 2019

03 – 04 Januari 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
25 – 26 Maret 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta
24 – 25 Mei 2019 | Rp 5.225.000 di Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta

Jadwal Training 2019 Selanjutnya…

 

This Oracle Database 12c: Security training teaches you how you can use Oracle Database features to meet the security, privacy and compliance requirements of your organization. You’ll get the chance to interact with expert Oracle University instructors through a combination of instruction and hands-on exercises that reinforce new concepts.

 

Oracle Database 12C Security Training Objectives

Setelah mengikuti pelatihan ini peserta diharapkan mampu untuk :

  1. Securing the Database Installation and Configuration
  2. Managing user privileges
  3. Encrypting data with oracle transparent data encryption
  4. Controlling access with oracle database vault
  5. Restricting access with oracle virtual private database
  6. Limiting Access to sensitive data using oracle data redaction
  7. Enforcing row-level security with oracle label security
  8. Auditing database activivty

 

Oracle Database 12C Security Training Syllabus

  1. Introduction to Oracle Database Security
    • About This Guide
    • Before Using This Guide
    • is Guide Is and Is Not
    • Common Database Security Tasks
    • Tools for Securing Your Database
    • Securing Your Database: A Roadmap
  2. Securing the Database Installation and Configuration
    • About Securing the Database Installation and Configuration
    • Securing Access to the Oracle Database Installation
    • Default Security Settings
    • Security for the Oracle Data Dictionary
    • Initialization Parameters Used for Installation and Configuration Security
    • Modifying the Value of an Initialization Parameter
    • Security for the Network
    • About Securing the Network
    • Protecting Data on the Network by Using Network Encryption
    • Initialization Parameters Used for Network Security
    • Securing User Accounts
    • About Securing Oracle Database User Accounts
    • Predefined User Accounts Provided by Oracle Database
    • Expiring and Locking Database Accounts
    • Requirements for Creating Passwords
    • Finding and Changing Default Passwords
    • Parameters Used to Secure User Accounts
  3. Managing User Privileges
    • About Privilege Management
    • When to Grant Privileges to Users
    • When to Grant Roles to Users
    • Controlling Access to Applications with Secure Application Roles
    • About Secure Application Roles
    • Tutorial: Creating a Secure Application Role
    • Initialization Parameters Used for Privilege Security
  4. Encrypting Data with Oracle Transparent Data Encryption
    • About Encrypting Sensitive Data
    • When Should You Encrypt Data?
    • How Transparent Data Encryption Works
    • Configuring Data to Use Transparent Data Encryption
    • Step 1: Configure the Keystore Location
    • Step 2: Check the COMPATIBLE Initialization Parameter Setting
    • Step 3: Create the Software Password-Based Keystore
    • Step 4: Open (or Close) the Keystore
    • Step 5: Create the Master Encryption Key
    • Step 6: Encrypt Data
    • Checking Existing Encrypted Data
    • Finding the Type of Keystore That Was Created
    • Finding the Keystore Location
    • Checking Whether a Keystore Is Open or Closed
    • Checking Encrypted Columns of an Individual Table
    • Checking All Encrypted Table Columns in the Current Database Instance
    • Data Dictionary Views for Checking Encrypted Tablespaces in the Current Database Instance
  5. Controlling Access with Oracle Database Vault
    • About Oracle Database Vault
    • Tutorial: Controlling Administrator Access to a User Schema
      • Step 1: Enable Oracle Database Vault
      • Step 2: Grant the SELECT Privilege on the OE.CUSTOMERS Table to User SCOTT
      • Step 3: Select from the OE.CUSTOMERS Table as Users SYS and SCOTT
      • Step 4: Create a Realm to Protect the OE.CUSTOMERS Table
      • Step 5: Test the OE Protections Realm
      • Step 6: Optionally, Remove the Components for This Tutorial
  6. Restricting Access with Oracle Virtual Private Database
    • About Oracle Virtual Private Database
    • Tutorial: Limiting Access to Data Based on the Querying User
    • About Limiting Access to Data Based on the Querying User
      • Step 1: Create User Accounts for This Tutorial
      • Step 2: If Necessary, Create the Security Administrator Account
      • Step 3: Update the Security Administrator Account
      • Step 4: Create the F_POLICY_ORDERS Policy Function
      • Step 5: Create the ACCESSCONTROL_ORDERS Virtual Private Database Policy
      • Step 6: Test the ACCESSCONTROL_ORDERS Virtual Private Database Policy
      • Step 7: Optionally, Remove the Components for This Tutorial
  7. Limiting Access to Sensitive Data Using Oracle Data Redaction
    • About Oracle Data Redaction
    • Tutorial: Redacting Data for a Select Group of Users
    • About Redacting Data for a Select Group of Users
      • Step 1: Create User Accounts and Grant Them the Necessary Privileges
      • Step 2: Create and Populate the SALES_OPPS Sales Opportunities Table
      • Step 3: Create the SALES_OPPS_POL Oracle Data Redaction Policy
      • Step 4: Test the SALES_OPPS_POL Oracle Data Redaction Policy
      • Step 5: Optionally, Remove the Components for This Tutorial
  8. Enforcing Row-Level Security with Oracle Label Security
    • About Oracle Label Security
    • Differences Between Virtual Private Database, Oracle Label Security, and Data Redaction
    • Guidelines for Planning an Oracle Label Security Policy
    • Tutorial: Creating Levels of Access to Table Data Based on the User
    • About Creating Levels of Access to Table Data Based on the User
      • Step 1: Enable Oracle Label Security
      • Step 2: Enable the LBACSYS Account
      • Step 3: Create a Role and Three Users for the Oracle Label Security Tutorial
      • Step 4: Create the ACCESS_LOCATIONS Oracle Label Security Policy
      • Step 5: Define the ACCESS_LOCATIONS Policy-Level Components
      • Step 6: Create the ACCESS_LOCATIONS Policy Data Labels
      • Step 7: Create the ACCESS_LOCATIONS Policy User Authorizations
      • Step 8: Apply the ACCESS_LOCATIONS Policy to the HR.LOCATIONS Table
      • Step 9: Add the ACCESS_LOCATIONS Labels to the HR.LOCATIONS Data
      • Step 10: Test the ACCESS_LOCATIONS Policy
      • Step 11: Optionally, Remove the Components for This Tutorial
  9. Auditing Database Activity
    • About Auditing
    • Why Is Auditing Used?
    • Tutorial: Creating a Unified Audit Policy
      • Step 1: If Necessary, Enable Unified Auditing
      • Step 2: Grant the SEC_ADMIN User the AUDIT_ADMIN Role
      • Step 3: Create and Enable a Unified Audit Policy
      • Step 4: Test the Unified Audit Policy
      • Step 5: Optionally, Remove the Components for This Tutorial
      • Step 6: Optionally, Remove the SEC_ADMIN Security Administrator Account

 

Oracle Database 12C Security Training Audience Target (Intermediate and advanced Level)

  • IT/ Technical Staff, IT Manager
  • Software Developer / Programmer, Software Consultant,  System Analyst, System Administrator, Database Administrator., IT Support, IT administration
  • High School Graduate

 

Oracle Database 12C Security Training Method

  • 25% Theory
  • 75% Practices  (Case study).
  • Dynamic and interactive training presentation

 

Oracle Database 12C Security Training Leader

Agus Sulaiman, S. Kom, MM

Praktisi trainer yang mempunyai pengalaman lebih dari 10 tahun menjadi lecture/ instructor / trainer/ Software developer di beberapa lembaga pelatihan swasta, instansi pemerintah / swasta  di Jakarta, mulai tahun 2003 – 2014, antara lain  di Universitas Multimedia Nusantara, Universitas Bina Nusantara, Universitas Bunda Mulia, Institut Bisnis dan Informatika Indonesia, Binus Center, Smart Learning, Xsis Mitra Utama, Cyber Campus, SKA.

Pernah menjabat sebagai Head of IT Software developer department di perusahaan swasta dan perusahaan jasa konsultan. Sekarang beliau aktif sebagai pengajar di beberapa kampus, memberikan pelatihan      di perusahaan provider training and consulting dan bekerja dalam dunia IT Software developer ERP (Enterprise Resource planning) system dengan produk yang dihasilkan dengan nama ISA (Integrated System Apllication).

Selain tema pelatihan tersebut di atas, beliau juga memberikan pelatihan IT sebagai berikut :

  • Introduction to SQL on Oracle 10g /11g Database
  • Programming With PL/SQL on Oracle 10g/11g Database
  • Build Internet Applications with Oracle 10g Forms
  • Build Reports with Oracle 10g Reports
  • Introduction to Database with Microsoft Access
  • Web Programming with ASP.Net
  • Programming N-Tier With ASP.Net
  • Database Programming T-SQL with Microsoft SQL Server
  • Introduction to Microsoft Access Programming
  • Step by step menjadi programmer handal dengan tools .Net Developer

 

Oracle Database 12C Security

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

GAS RUMAH KACA: PENGURANGAN EMISI DAN MITIGASI – Confirmed

ACARA

05 – 07 November 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
12 – 14 November 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
21 – 23 November 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta – CONFIRMED
26 – 28 November 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta – CONFIRMED

Jadwal Training 2018 Selanjutnya …

 

 

PENDAHULUAN TRAINING GAS RUMAH KACA: PENGURANGAN EMISI DAN MITIGASI

Perubahan iklim telah diidentifikasi sebagai salah satu tantangan besar yang dihadapi negara, pemerintah, kalangan bisnis dan masyarakat selama beberapa dekade mendatang. Perubahan iklim memiliki implikasi luas baik bagi manusia dan lingkungan dan dapat menyebabkan perubahan signifikan dalam penggunaan sumber daya, produksi dan kegiatan ekonomi. Sebagai tanggapannya, inisiatif internasional, regional, nasional dan lokal sedang dikembangkan dan dilaksanakan untuk membatasi konsentrasi gas rumah kaca (GRK) di atmosfer  untuk mencegah efek pemanasan global. Inisiatif pengendalian GRK tersebut terkait dengan pemantauan, pelaporan  dan verifikasi emisi dan/atau pengurangan GRK .

Dalam rangka untuk mendapatkan keuntungan optimum ketika mencoba untuk menerapkan cara-cara pengendalian  ini, maka berbagai pihak tidak terkecuali kalangan bisnis, memerlyukan komitmen untuk membangun sumber daya manusia yang kompeten terkait dengan GRK. Clean Development Mechanism (CDM) adalah salah satu mekanisme penanggulangan Emisi Gas Rumah Kaca (GRK) yang diakui secara internasional dan memainkan peran penting dalam pencegahan proses pemanasan global. Sebagian besar protocol dan standar di bidang pengurangan emisi dan mitigasi GRK baik yang berskala internasional maupun local, mengadopsi aturan dan metodologi CDM sebagai acuannya.  Di sisi lain, ISO 16064 adalah standar internasional tentang GRK yang penting untuk diaplikasikan  dalam pengelolaan industri dan berbagi kegiatan lainnya.

 

TUJUAN TRAINING GAS RUMAH KACA: PENGURANGAN EMISI DAN MITIGASI

  • Memahami konsep-konsep yang dikembangkan ISO 14064.
  • Membangun kesadaran untuk berkotribusi dalam pengurangan emisi GRK.
  • Dapat mengidentifikasi sumber emisi GRK.
  • Memahami konsep dasar pengurangan emisi GRK.
  • Menyiapkan SOP untuk mendukung praktek mitigasi GRK

 

MATERI TRAINING GAS RUMAH KACA: PENGURANGAN EMISI DAN MITIGASI

  1. Pengenalan konsep pengurangan emisi
  2. Jenis dan Karakterisktik GRK
  3. Sumber-sumber Emisi GRK
  4. Konsep dan Istilah dalam Aktivitas Reduksi GRK
  5. Sejarah  dan Latar Belakang Background CDM : UNFCCC & Protokol Kyoto
  6. Konsep Baseline dan Additionality
  7. Metodologi Pemilihan dan Skenario
  8. Contoh skenario baseline
  9. Metodologi Pemilihan
  10. Perhitungan dan Pengurangan  Emisi
  11. Mitigasi
  12. Contoh Best Practice
  13. Contoh Menyiapkan SOP

 

METODE TRAINING GAS RUMAH KACA: PENGURANGAN EMISI DAN MITIGASI

  • Presentation
  • Discussion
  • Case Study
  • Evaluation

 

METODE TRAINING GAS RUMAH KACA: PENGURANGAN EMISI DAN MITIGASI

Presentasi, Diskusi , Brainstorming, Case Study,Evaluasi

 

Jadwal Training 2018

Hotel Ibis Malioboro ,Yogyakarta

  • 05 – 07 November 2018
  • 12 – 14 November 2018
  • 21 – 23 November 2018
  • 26 – 28 November 2018
  • 03 – 05 Desember 2018
  • 10 – 12 Desember 2018
  • 17 – 19 Desember 2018
  • 26 – 28 Desember 2018

 

Investasi dan Fasilitas

  • 5.900.000 (Non Residential, Belum Termasuk Pajak PPn 10%)
  • VIP training Rp 7.9000 (4 Hari , Non Residential dengan tambahan Fasilitas Paket studi lapangan/ City tour dan Belum Termasuk Pajak PPn 10%)
  • Quota minimum 2 peserta
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel khusus bagi perusahaan yang mengirimkan minimal 3 orang peserta)

 

Instruktur

Team Instruktur .

 

PENGURANGAN EMISI DAN MITIGASI GAS RUMAH KACA

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

ASP.NET Security

ACARA

16 – 18 April 2019 | Rp 6.000.000,- di Yogyakarta

 

Tujuan Pelatihan ASP.NET SECURITY

Tujuan dari pelatihan ini adalah membahas berbagai macam teknik untuk mengamankan aplikasi web yang dibuat menggunakan teknologi ASP.NET.

Dengan mengikuti pelatihan ini peserta diharapkan dapat mengoptimalkan berbagai fitur yang ada pada framework ASP.NET untuk tujuan keamanan aplikasi web.

 

Materi Pelatihan ASP.NET SECURITY

  1. Configuration
    • Setting up the Sample App
    • Enabling Custom Errors
    • Setting a Default Redirect Error Page
    • Configuring the Redirect Mode
    • Persisting Sessions in Cookies and URIs
    • HTTP only Session Cookies
    • Changing the Session Cookie Name
    • Enabling and Using Tracing o Request Validation
    • Securing Content using the Location Element
    • Hiding the ASP.NET Version Number
    • Defaulting Cookies to HTTP Only
    • Defaulting Cookies to Secure
    • Enabling Retail mode on the Server
    • The maxRequestLength Setting
    • About Unsafe Header Parsing
  2. NET Identity
    • Understanding ASP.NET Identity
    • Creating a ASP.NET with ASP.NET Identity
    • The Forms Authentication Auth Cookie
    • Persisting Accounts in the Database
    • Forms Authentication Timeout
    • Cookieless, Requiring SSL, HttpOnly and Cookie Name
    • Sliding Expiration
    • The Protection Setting
    • Configuring User
  3. General Security Principles and Tools
    • Manual HTML Encoding
    • CSS and JavaScript
    • Encoding with AntiXSS
    • Creating Custom Response Headers
    • Encrypting Connection Strings
    • Creating Trusted Connections
    • The Security Implications of ELMAH

 

Metode Pelatihan ASP.NET SECURITY

  1. Ceramah
  2. Diskusi
  3. Konsultasi
  4. Studi kasus

 

Instruktur Pelatihan ASP.NET SECURITY

Erick Kurniawan dan Team

Praktisi dan akademisi yang kompeten dibidangnya dan tersertifikasi dalam bidangnya.

 

Tanggal & Tempat Pelatihan ASP.NET SECURITY

  • Tanggal Pelatihan: 16 – 18 April 2019
  • Venue: Yogyakarta

 

Investasi Pelatihan ASP.NET SECURITY

Rp. 6.000.000,-/ participant non residential

 

Fasilitas Pelatihan ASP.NET SECURITY

  1. Room Meeting
  2. Penjemputan wilayah khusus Jogjakarta
  3. Stater kit
  4. Trainer
  5. Materi
  6. Sertifikat
  7. Block note + Bolpen

 

ASP.NET Security

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

CHFI: Certified Hacking Forensics Investigator: Teknik identifikasi dan analisis Cyber Crime (CONFIRMED)

EVENT

05 – 07 November 2018 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta
12 – 13 November 2018 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta

26 – 28 November 2018 | Rp 10.900.000,- per peserta  di Hotel Ibis, Yogyakarta – CONFIRMED

Jadwal Training 2018 Selanjutnya …

02 – 04 Januari 2019 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta
07 – 09 Januari 2019 | Rp 10.900.000,- per peserta di Hotel Ibis, Yogyakarta

Jadwal Training 2019 Selanjutnya …

 

 

Deskripsi Training CHFI

EC-Council adalah sebuah institusi yang telah diakui di dunia internasional yang mengeluarkan sertifikasi di bidang e-commerce, audit sistem, jaringan serta keamanan sistem.Training ini menawarkan program pelatihan dan sekaligus ujian sertifikasi internasional CertifiedHacking Forensics Investigator (CHFI). Sertifikasi CHFI mempelajari teknik identifikasi terjadinya sebuah kejahatan yang melibatkan sistem komputer serta mengumpulkan bukti-bukti dan menganalisisnya untuk dapat dibawa dalam pengadilan. Sertifikasi CHFI ini bertujuan untuk memberikan pengetahuan bagi peserta dalam menangani Cyber crime.


Tujuan Training CHFI

Setelah mengikuti pelatihan ini, peserta diharapkan mampu untuk memahami konsep dan materi pelatihan serta lulus dalam ujian sertifikasi.


Materi Training (+ exam) CHFI

  • 01: Computer Forensics in Today’s World
  • 02: Computer Forensics Investigation Process
  • 03: Searching and Seizing of Computers
  • 04: Digital Evidence
  • 05: First Responder Procedures
  • 06: Incident Handling
  • 07: Understanding Hard Disks and File Systems
  • 08: Digital Media Devices
  • 09: Windows Forensics
  • 10: Linux Forensics
  • 11: Mac Forensics
  • 12: Data Acquisition and Duplication
  • 13: Recovering Deleted Files and Deleted Partitions
  • 14: Steganography
  • 15: Multimedia Files Forensics
  • 16: Application Password Crackers
  • 17: Network Forensics and Investigating Logs
  • 18: Investigating DoS Attacks
  • 19: Investigating virus, Trojan, spyware and Rootkit Attacks
  • 20: Investigating Internet Crimes
  • 21: Investigating Identity Theft Cases
  • 22: Cell Phone Forensics
  • 23: USB Forensics
  • 24: Computer Forensic Tools

 

Peserta Training CHFI

Cocok untuk Semua staff dari berbagai lini dan departement

 

Lead Instruktur Training CHFI

Team Instruktur IT

 

Jadwal Training 2018

Hotel Ibis Malioboro ,Yogjakarta

  • 05 – 07 November 2018
  • 12 – 14 November 2018
  • 21 – 23 November 2018
  • 26 – 28 November 2018
  • 03 – 05 Desember 2018
  • 10 – 12 Desember 2018
  • 17 – 19 Desember 2018
  • 26 – 28 Desember 2018

 

Jadwal Training 2019

Hotel Ibis Malioboro ,Yogjakarta

  • 2 – 4 Januari 2019
  • 7 – 9 Januari 2019
  • 14 – 16 Januari 2019
  • 21 – 23 Januari 2019
  • 28 – 30 Januari 2019
  • 6 – 8 Februari 2019
  • 11 – 13 Februari 2019
  • 18 – 20 Februari 2019
  • 25 – 27 Februari 2019
  • 4 – 6 Maret 2019
  • 11 – 13 Maret 2019
  • 18 – 20 Maret 2019
  • 25 – 27 Maret 2019
  • 1 – 2 April 2019
  • 8 – 10 April 2019
  • 15 – 17 April 2019
  • 22- 24 April 2019
  • 29 – 30 Mei 2019
  • 6 – 8 Mei 2019
  • 13 – 15 Mei 2019
  • 20 – 22 Mei 2019
  • 27 – 29 Mei 2019
  • 10 – 12 Juni 2019
  • 17 – 19 Juni 2019
  • 24 – 26 Juni 2019
  • 1 – 3 Juli 2019
  • 8 – 10 Juli 2019
  • 15 – 17 Juli 2019
  • 22 -24 Juli 2019
  • 29 – 31 Juli 2019
  • 5 – 7 Agustus 2019
  • 13-15 Agustus 2019
  • 19 – 21 Agustus 2019
  • 26 -28 Agustus 2019
  • 02 – 04 September 2019
  • 09-11 September 2019
  • 16 – 18 September 2019
  • 23 – 25 September 2019
  • 30 September – 02 Oktober 2019
  • 07 – 09 Oktober 2019
  • 14 – 16 Oktober 2019
  • 21 – 23 Oktober 2019
  • 28 – 30 Oktober 2019
  • 04 – 06 November 2019
  • 11 – 13 November 2019
  • 18 – 20 November 2019
  • 25 – 27 November 2019
  • 02 -04 Desember 2019
  • 9 – 11 Desember 2019
  • 16 – 18 Desember 2019
  • 23 – 24 Desember 2019
  • 30 – 31 Desember 2019

 

Investasi dan Fasilitas Training CHFI

  • Rp.10.900.000 (Non Residential, Belum Termasuk Pajak PPn 10%)
  • VIP training Rp.12.900.000 (4 Hari , Non Residential dengan tambahan Fasilitas Paket studi lapangan/ City tour dan Belum Termasuk Pajak PPn 10%)
  • Quota minimum 2 peserta
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel khusus bagi perusahaan yang mengirimkan minimal 3 orang peserta)

 

Instruktur Training CHFI

Team Instruktur IT

 

Certified Hacking Forensics Investigator (CHFI): Teknik identifikasi dan analisis Cyber Crime – Training dan Sertifikasi Internasional

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

Web Security

ACARA

09 – 11 April 2019 | Rp 6.500.000,- di Bandung

 

Tujuan Pelatihan Web Security

Tujuan dari pelatihan ini adalah membahas berbagai macam serangan dan ancaman keamanan pada aplikasi berbasis web. Serangan/ancaman yang akan dibahas pencegahannya adalah ancaman/serangan yang kerap muncul (10 besar jenis serangan) berdasarkan OWASP (Open Web Application Security Project).

Dengan mengetahui jenis serangan dan pencegahan dari ancaman yang sering terjadi pada aplikasi web, maka pengembang aplikasi web dapat mempunyai dasar dan pengetahuan yang cukup untuk menyiapkan strategi pencegahan untuk berbagai jenis serangan yang umum dilakukan.

 

Materi/ Unit Kompetensi Pelatihan Web Security

  1. Introduction to Web Security
  2. Injection
  3. Broken Authentication and Session Management
  4. Cross Site Scripting (XSS)
  5. Insecure Direct Object Reference
  6. Security Misconfiguration
  7. Sensitive Data Exposure
  8. Missing Function Level Access Control
  9. Cross Site Request Forgery (CSRF)
  10. Using Components with Known Vulnerabilities
  11. Unvalidated Redirects and Forwards

 

Metode  Pelatihan Web Security

  1. Ceramah
  2. Diskusi
  3. Konsultasi
  4. Studi kasus

 

Tanggal & Tempat Pelatihan Web Security

  • Tanggal Pelatihan: 09 – 11 April 2019
  • Venue: Bandung

 

Investasi  Pelatihan Web Security

Rp. 6.500.000,-/ participant non residential

 

Fasilitas  Pelatihan Web Security

  1. Room Meeting
  2. Penjemputan wilayah khusus Jogjakarta
  3. Stater kit
  4. Trainer
  5. Materi
  6. Sertifikat
  7. Block note + Bolpen

 

Web Security

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days

ISO 27001: 2013 INFORMATION SECURITY MANAGEMENT SYSTEMS – TUV Rheinland®

ACARA

15 – 16 Oktober 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
22 – 23 Oktober 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
29 – 30 Oktober 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta
05 – 06 November 2018 | Rp 5.900.000,- per peserta di Hotel Ibis, Yogyakarta

Jadwal Training 2018 Selanjutnya …

 

 

ISO 27001: 2013 Information Security Management Systems Training Description

Complex IT systems are now capable of processing a wealth of information quickly. To ensure safe processing, information must be confidential and available, and its integrity must be maintained. After all, if information starts to leak out, it can become a trust problem and lead to a competitive disadvantage.

Particularly in the age of Facebook, Twitter and the like, information security is becoming increasingly important, but, at the same time, ever more vulnerable to threats. It therefore follows that well-organized and demonstrably operational professional IT security management is a pressing requirement for companies.

Complex IT systems are now capable of processing a wealth of information. At the same time, it is becoming more difficult to protect them. With an ISO 27001 certification we provide you with an independent review of the degree of conformity of your information security management system (ISMS) to the requirements of ISO 27001.

With ISO 27001 we use the globally recognized standard for assessing the security of information and IT environments. It describes the requirements of implementation as well as the documentation of an ISMS. Security risks can be minimized and IT security procedures can be established that contribute to the long-term optimization of the quality of your systems.

 

ISO 27001: 2013 Information Security Management Systems Training Benefit:

 You will be protecting your organization from cyber attacks, loss of data and the resulting financial losses and damage to reputation. Legal protections are ensured and attacks by hackers are reduced, alongside a minimization of the hacker’s ability to access sensitive information. Other advantages of the ISO 27001 certification are:

  1. Assured availability of your IT systems and processes
  2. Confidentiality of your information
  3. Competitive advantage
  4. Minimization of IT risks and potential damages
  5. Exposure and elimination of weak areas
  6. Control of IT risks
  7. Guaranteed satisfaction of compliance requirements
  8. Cost reduction

 

ISO 27001: 2013 Information Security Management Systems Training Outline

  1. Information security guidelines
  2. Staff security
  3. Asset management
  4. Physical and environment-related security
  5. Access control
  6. Cryptography
  7. Operational security
  8. Communication security
  9. Purchase, development and maintenance of systems
  10. Supplier relationships
  11. Handling of information security incidents
  12. Information security aspects of business continuity management
  13. Compliance

 

Waktu  Dan Tempat

Hotel Ibis Malioboro ,Yogjakarta

  • 15 – 16 Oktober 2018
  • 22 – 23 Oktober 2018
  • 29 – 30 Oktober 2018
  • 05 – 06 November 2018
  • 12 – 13 November 2018
  • 21 – 22 November 2018
  • 26 – 27 November 2018
  • 03- 04 Desember 2018
  • 10 – 11 Desember 2018
  • 17 – 18 Desember 2018
  • 26 – 27 Desember 2018

 

Investasi dan Fasilitas Training

  • 5.900.000 (Non Residential, Belum Termasuk Pajak PPn 10%)
  • Quota minimum 2 peserta
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel khusus bagi perusahaan yang mengirimkan minimal 3 orang peserta)

 

ISO 27001: 2013 Information Security Management Systems Training Instructor

Tim Instruktur TUV Rheinland

 

ISO 27001: 2013 INFORMATION SECURITY MANAGEMENT SYSTEMS

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
 

cforms contact form by delicious:days