Category Archives: Security

Oracle Database 12C Security

ACARA

23 – 24 Maret 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta
12 – 13 Mei 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta
22 – 23 Juli 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta

Jadwal Training 2020 Selanjutnya . . .

 

 

This Oracle Database 12c: Security training teaches you how you can use Oracle Database features to meet the security, privacy and compliance requirements of your organization. You’ll get the chance to interact with expert Oracle University instructors through a combination of instruction and hands-on exercises that reinforce new concepts.

 

Oracle Database 12C Security Training Objectives

Setelah mengikuti pelatihan ini peserta diharapkan mampu untuk :

  1. Securing the Database Installation and Configuration
  2. Managing user privileges
  3. Encrypting data with oracle transparent data encryption
  4. Controlling access with oracle database vault
  5. Restricting access with oracle virtual private database
  6. Limiting Access to sensitive data using oracle data redaction
  7. Enforcing row-level security with oracle label security
  8. Auditing database activivty

 

Oracle Database 12C Security Training Outline

  1. Introduction to Oracle Database Security
    • About This Guide
    • Before Using This Guide
    • is Guide Is and Is Not
    • Common Database Security Tasks
    • Tools for Securing Your Database
    • Securing Your Database: A Roadmap
  2. Securing the Database Installation and Configuration
    • About Securing the Database Installation and Configuration
    • Securing Access to the Oracle Database Installation
    • Default Security Settings
    • Security for the Oracle Data Dictionary
    • Initialization Parameters Used for Installation and Configuration Security
    • Modifying the Value of an Initialization Parameter
    • Security for the Network
    • About Securing the Network
    • Protecting Data on the Network by Using Network Encryption
    • Initialization Parameters Used for Network Security
    • Securing User Accounts
    • About Securing Oracle Database User Accounts
    • Predefined User Accounts Provided by Oracle Database
    • Expiring and Locking Database Accounts
    • Requirements for Creating Passwords
    • Finding and Changing Default Passwords
    • Parameters Used to Secure User Accounts
  3. Managing User Privileges
    • About Privilege Management
    • When to Grant Privileges to Users
    • When to Grant Roles to Users
    • Controlling Access to Applications with Secure Application Roles
    • About Secure Application Roles
    • Tutorial: Creating a Secure Application Role
    • Initialization Parameters Used for Privilege Security
  4. Encrypting Data with Oracle Transparent Data Encryption
    • About Encrypting Sensitive Data
    • When Should You Encrypt Data?
    • How Transparent Data Encryption Works
    • Configuring Data to Use Transparent Data Encryption
    • Step 1: Configure the Keystore Location
    • Step 2: Check the COMPATIBLE Initialization Parameter Setting
    • Step 3: Create the Software Password-Based Keystore
    • Step 4: Open (or Close) the Keystore
    • Step 5: Create the Master Encryption Key
    • Step 6: Encrypt Data
    • Checking Existing Encrypted Data
    • Finding the Type of Keystore That Was Created
    • Finding the Keystore Location
    • Checking Whether a Keystore Is Open or Closed
    • Checking Encrypted Columns of an Individual Table
    • Checking All Encrypted Table Columns in the Current Database Instance
    • Data Dictionary Views for Checking Encrypted Tablespaces in the Current Database Instance
  5. Controlling Access with Oracle Database Vault
    • About Oracle Database Vault
    • Tutorial: Controlling Administrator Access to a User Schema
      • Step 1: Enable Oracle Database Vault
      • Step 2: Grant the SELECT Privilege on the OE.CUSTOMERS Table to User SCOTT
      • Step 3: Select from the OE.CUSTOMERS Table as Users SYS and SCOTT
      • Step 4: Create a Realm to Protect the OE.CUSTOMERS Table
      • Step 5: Test the OE Protections Realm
      • Step 6: Optionally, Remove the Components for This Tutorial
  6. Restricting Access with Oracle Virtual Private Database
    • About Oracle Virtual Private Database
    • Tutorial: Limiting Access to Data Based on the Querying User
    • About Limiting Access to Data Based on the Querying User
      • Step 1: Create User Accounts for This Tutorial
      • Step 2: If Necessary, Create the Security Administrator Account
      • Step 3: Update the Security Administrator Account
      • Step 4: Create the F_POLICY_ORDERS Policy Function
      • Step 5: Create the ACCESSCONTROL_ORDERS Virtual Private Database Policy
      • Step 6: Test the ACCESSCONTROL_ORDERS Virtual Private Database Policy
      • Step 7: Optionally, Remove the Components for This Tutorial
  7. Limiting Access to Sensitive Data Using Oracle Data Redaction
    • About Oracle Data Redaction
    • Tutorial: Redacting Data for a Select Group of Users
    • About Redacting Data for a Select Group of Users
      • Step 1: Create User Accounts and Grant Them the Necessary Privileges
      • Step 2: Create and Populate the SALES_OPPS Sales Opportunities Table
      • Step 3: Create the SALES_OPPS_POL Oracle Data Redaction Policy
      • Step 4: Test the SALES_OPPS_POL Oracle Data Redaction Policy
      • Step 5: Optionally, Remove the Components for This Tutorial
  8. Enforcing Row-Level Security with Oracle Label Security
    • About Oracle Label Security
    • Differences Between Virtual Private Database, Oracle Label Security, and Data Redaction
    • Guidelines for Planning an Oracle Label Security Policy
    • Tutorial: Creating Levels of Access to Table Data Based on the User
    • About Creating Levels of Access to Table Data Based on the User
      • Step 1: Enable Oracle Label Security
      • Step 2: Enable the LBACSYS Account
      • Step 3: Create a Role and Three Users for the Oracle Label Security Tutorial
      • Step 4: Create the ACCESS_LOCATIONS Oracle Label Security Policy
      • Step 5: Define the ACCESS_LOCATIONS Policy-Level Components
      • Step 6: Create the ACCESS_LOCATIONS Policy Data Labels
      • Step 7: Create the ACCESS_LOCATIONS Policy User Authorizations
      • Step 8: Apply the ACCESS_LOCATIONS Policy to the HR.LOCATIONS Table
      • Step 9: Add the ACCESS_LOCATIONS Labels to the HR.LOCATIONS Data
      • Step 10: Test the ACCESS_LOCATIONS Policy
      • Step 11: Optionally, Remove the Components for This Tutorial
  9. Auditing Database Activity
    • About Auditing
    • Why Is Auditing Used?
    • Tutorial: Creating a Unified Audit Policy
      • Step 1: If Necessary, Enable Unified Auditing
      • Step 2: Grant the SEC_ADMIN User the AUDIT_ADMIN Role
      • Step 3: Create and Enable a Unified Audit Policy
      • Step 4: Test the Unified Audit Policy
      • Step 5: Optionally, Remove the Components for This Tutorial
      • Step 6: Optionally, Remove the SEC_ADMIN Security Administrator Account

 

Oracle Database 12C Security Training Audience Target (Intermediate and advanced Level)

  • IT/ Technical Staff, IT Manager
  • Software Developer / Programmer, Software Consultant,  System Analyst, System Administrator, Database Administrator., IT Support, IT administration
  • High School Graduate

 

Oracle Database 12C Security Training Method

  • 25% Theory
  • 75% Practices  (Case study).
  • Dynamic and interactive training presentation

 

Oracle Database 12C Security Training Leader

Agus Sulaiman, S. Kom, MM

Praktisi trainer yang mempunyai pengalaman lebih dari 10 tahun menjadi lecture/ instructor / trainer/ Software developer di beberapa lembaga pelatihan swasta, instansi pemerintah / swasta  di Jakarta, mulai tahun 2003 – 2014, antara lain  di Universitas Multimedia Nusantara, Universitas Bina Nusantara, Universitas Bunda Mulia, Institut Bisnis dan Informatika Indonesia, Binus Center, Smart Learning, Xsis Mitra Utama, Cyber Campus, SKA.

Pernah menjabat sebagai Head of IT Software developer department di perusahaan swasta dan perusahaan jasa konsultan. Sekarang beliau aktif sebagai pengajar di beberapa kampus, memberikan pelatihan      di perusahaan provider training and consulting dan bekerja dalam dunia IT Software developer ERP (Enterprise Resource planning) system dengan produk yang dihasilkan dengan nama ISA (Integrated System Apllication).

Selain tema pelatihan tersebut di atas, beliau juga memberikan pelatihan IT sebagai berikut :

  • Introduction to SQL on Oracle 10g /11g Database
  • Programming With PL/SQL on Oracle 10g/11g Database
  • Build Internet Applications with Oracle 10g Forms
  • Build Reports with Oracle 10g Reports
  • Introduction to Database with Microsoft Access
  • Web Programming with ASP.Net
  • Programming N-Tier With ASP.Net
  • Database Programming T-SQL with Microsoft SQL Server
  • Introduction to Microsoft Access Programming
  • Step by step menjadi programmer handal dengan tools .Net Developer

 

Jadwal Training 2020

  • 23 – 24 Maret 2020
  • 12 – 13 Mei 2020
  • 22 – 23 Juli 2020
  • 21 – 22 September 2020
  • 18 – 19 November 2020

 

Lokasi Training 

Amaris Hotel La Codefin / Neo Hotel – Kebayoran / Hotel Santika Premiere Hayam Wuruk, Jakarta (Tentative)

 

FEE TRAINING

  • Rp. 4.450.000 ,- (REG for 3 person/more; payment 1 week before training)
  • Rp. 4.650.000 ,- (REG 2 weeks before; payment 1 week before training)
  • Rp. 5.150.000 ,- (On The Spot; payment at the latest training)
  • Rp. 5.525.000 ,- (Full fare)

 

Oracle Database 12C Security

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

MRTI: Managing IT Risks in Internet Banking

ACARA

14 – 15 Mei 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta
22 – 23 Juli 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta
23 – 24 September 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta

 

 

PENDAHULUAN TRAINING MRTI

Manajemen Resiko Teknologi Informasi (MRTI) mengidentifikasikan dan menggolongkan berbagai Resiko Teknologi Informasi yang dihadapi oleh setiap organisasi. Secara umum, proses dan aplikasi bisnis akan digunakan untuk ditinjau, diulas dan dibahas serta diakomodasi dalam proses perencanaan MRTI lebih jauh.

Berbagai skenario terkait dengan Resiko Teknologi Informasi terhadap Internet Banking (termasuk juga Mobile Banking) akan dibahas dalam pelatihan ini yang menggunakan Risk IT dari ISACA (organisasi profesi bidang audit sistem informasi dan pengendalian) sebagai salah satu framework internasional terpopuler dan paling banyak digunakan di seluruh dunia.

 

TUJUAN TRAINING MRTI

Pada akhir sesi pelatihan, peserta diharapkan untuk mampu:

  1. Memahami Konsep MRTI termasuk Standar dan Frameworknya.
  2. Mendalami Framework MRTI Risk IT dari ISACA.
  3. Melakukan Identifikasi Resiko (Risk Identification) TI.
  4. Memiliki dan Menentukan Resiko dengan Risk Assessment dan Risk Scenario.
  5. Memahami Analisa Kualitatif dan Kuantitatif.
  6. Membuat Skala dan Peringkat Resiko.
  7. Mengidentifikasi Risk Scoring, Risk Response dan Strateginya.
  8. Menentukan Kepemilikan Resiko, Tenggat Waktunya serta Key Risk Indicator.
  9. Membuat Risk Register.

 

MATERI TRAINING MRTI

  1. Memahami MRTI dengan Standar dan Frameworknya.
  2. Mendalami Framework MRTI dari ISACA yaitu Risk IT.
  3. Menguasai Risk Practitioner Guide dan Toolkit.
  4. Memanfaatkan Risk Scenario untuk Resiko Negatif maupun Positif.
  5. Melakukan Risk Identification.
  6. Menguasai Risk Assessment beserta Tekniknya.
  7. Memahami Analisa Kualitatif dan Kuantitatif.
  8. Menentukan Risk Scale dan Risk Rating.
  9. Mengidentifikasi Risk Scoring, Risk Response dan Risk Action Plan.
  10. Memahami Risk Tolerance, Risk Appetite dan Risk Key Risk Indicator.
  11. Melaksanakan Risk Register.

 

METODE TRAINING MRTI

Agar pelatihan dapat berlangsung secara efektif dan efisien, 30% waktu akan dialokasikan untuk konsep penting dan 70% untuk diskusi, latihan serta studi kasus.

 

TARGET PESERTA TRAINING MRTI

Staff, Officer, Penyelia, Manajer, Manajer Senior`, Kepala Bagian, Kepala Divisi, Kepala Departemen, Konsultan, maupun profesional lain di bidang Teknologi Informasi, Keuangan, Akuntansi, Manajemen Resiko, Audit, Compliance (Kepatuhan), Governance (Tata Kelola), Keamanan Informasi (Information Security) di industri perbankan dan lembaga keuangan lainnya yang ingin memperoleh, mengetahui, memahami, menguasai, meningkatkan, memperdalam pengetahuan serta kemampuan dalam mengelola MRTI di dalam maupun di luar organisasinya menggunakan salah satu framework internasional yang paling banyak digunakan di seluruh dunia.

 

FACILITATOR TRAINING MRTI

Goutama Bachtiar

Goutama Bachtiar adalah : Advisor, Auditor, Konsultan, Trainer, Courseware Designer dan Penulis bidang Teknologi dan Sistem Informasi selama 17 tahun terakhir dengan spesialisasi di ranah IT Governance, Risk, Security, Assurance, Audit dan IT Management.

Saat ini beliau menjabat sebagai advisor beberapa perusahaan dan organisasi, Subject Matter Expert, Program Mentor, Editorial Journal Reviewer, Certification Exam (CISA, CGEIT, CISM, CRISC) dan Study Materials Developer di ISACA International Chapter, Subject Matter Expert dan Program Evaluator di PMI International Chapter, IASA, SABSA dan Open Group Global Working Group Member, Reviewer Panel di International Institute of Business Analysis (IIBA), Dosen Tamu di program pasca sarjana beberapa universitas di AS dan Indonesia (UTB, UI, IPB dan Binus), serta moderator, panelis dan pembicara di sejumlah konferensi, workshop dan seminar.

Sebagai auditor dan konsultan, telah memberikan layanan tersebut kepada 35 perusahaan dan organisasi. Puluhan sertifikasi internasional sudah diperolehnya sampai dengan saat ini.

Selain itu, beliau juga telah mengadakan dan memberikan pelatihan, perkuliahan, seminar, konferensi dan workshop sebanyak lebih dari 230 sesi dan 5500 jam lebih kepada sekitar 7500 peserta di Indonesia maupun luar negeri kepada lebih dari 70 perusahaan dan organisasi.

Sebagai penulis, sudah mengarang 2 buku dan 22 courseware serta sudah menulis, melakukan review dan editing atas 300 artikel, manuskrip, paper dan white paper seputar Telematika dan Manajemen di lebih dari 20 media, publikasi, organisasi, jurnal dan konferensi.

 

Lokasi Training 

Amaris Hotel La Codefin / Neo Hotel – Kebayoran / Hotel Santika Premiere Hayam Wuruk, Jakarta (Tentative)

 

FEE TRAINING

  • Rp. 4.450.000 ,- (REG for 3 person/more; payment 1 week before training)
  • Rp. 4.650.000 ,- (REG 2 weeks before; payment 1 week before training)
  • Rp. 5.150.000 ,- (On The Spot; payment at the latest training)
  • Rp. 5.525.000 ,- (Full fare)

 

Managing IT Risks in Internet Banking

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

Cyber Crime In Finance Sector

ACARA

30 April – 01 Mei 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta
01 – 02 Juli 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta
09 – 10 September 2020 | Rp 5.525.000 di Amaris La Codefin/ Santika Hayam Wuruk, Jakarta

Jadwal Training 2020 Selanjutnya . . .

 

 

PENDAHULUAN TRAINING CYBER CRIME IN FINANCE SECTOR

Cyber crime, atau Kejahatan Dunia Maya, terutama di industri perbankan dan lembaga keuangan lainnya, dari waktu ke waktu semakin tinggi frekuensinya dan ruang lingkupnya juga semakin luas, sementara dampak negatif dan tingkat kerugian yang diderita oleh individu maupun organisasi di berbagai industri dan berbagai negara semakin tinggi dan banyak.

Oleh karenanya, dalam menghadapi fenomena ini, Cyber Resilience yaitu kemampuan untuk bertahan dan kemudian melakukan serangan balik di dunia maya sementara di sisi lain melindungi aset bisnis yang kritikal agar aktivitas bisnis bisa tetap beroperasi dan pulih ke kondisi normal, diyakini sebagai solusi tepat, ketimbang Cyber Security, yang notabene berfokus pada jenis serangan dan kejahatan, namun melupakan faktor waktu dan dampaknya terhadap aset bisnis organisasi.

 

TUJUAN AKHIR TRAINING CYBER CRIME IN FINANCE SECTOR

Pada akhir sesi pelatihan, peserta diharapkan mampu untuk:

  1. Memahami Tren Terbaru Kejahatan di Dunia Maya, Tingkat dan Skalanya.
  2. Mendalami Situasi dan Kondisi Terakhir.
  3. Memahami Masalah, Sebab dan Dampaknya Secara Bisnis.
  4. Memahami Kondisi Keamanan Saat Ini di Berbagai Organisasi.
  5. Mengenal Berbagai Jenis Resiko dan Ancaman (Threat) Kejahatan Dunia Maya.
  6. Mendalami Berbagai Jenis Kerentanan dan Kelemahan.
  7. Mengimplementasikan Strategi dan Solusi yang Efektif atas Kejahatan Dunia Maya.

 

MATERI TRAINING CYBER CRIME IN FINANCE SECTOR

  1. Tren, Situasi dan Kondisi Kejahatan Dunia Maya.
  2. Masalah, Sebab dan Dampaknya Secara Bisnis.
  3. Kondisi Keamanan Saat Ini di berbagai Organisasi dan Pemerintahan.
  4. Berbagai Jenis Resiko dan Ancaman (Threat) Kejahatan Dunia Maya.
  5. Berbagai Jenis Kerentanan dan Kelemahan (Vulnerabilities).
  6. Perencanaan dan Strategi Cyber Resilience
  7. Pemahaman atas Standar ISO 27000 untuk Cyber Resilience dan Cyber Security
  8. Pemahaman atas Framework NIST untuk Cyber Resilience dan Cyber Security
  9. Tool dan Teknik sebagai Countermeasure terhadap Cyber Crime.

 

METODE TRAINING CYBER CRIME IN FINANCE SECTOR

Agar pelatihan dapat berlangsung secara efektif dan efisien, 30% waktu akan dialokasikan untuk konsep penting dan 70% untuk diskusi, latihan serta studi kasus.

 

TARGET PERSERTA TRAINING CYBER CRIME IN FINANCE SECTOR

Staff, Officer, Penyelia, Manajer, Manajer Senior`, Kepala Bagian, Kepala Divisi, Kepala Departemen, Konsultan, maupun profesional lain di bidang Teknologi Informasi, Keuangan, Akuntansi, Manajemen Resiko, Audit, Compliance (Kepatuhan), Governance (Tata Kelola), Keamanan Informasi (Information Security) di industri perbankan yang ingin memperoleh, mengetahui, memahami, menguasai, meningkatkan, memperdalam pengetahuan serta kemampuan dalam menghadapi serta mengatasi Kejahatan Dunia Maya di dalam maupun di luar organisasinya.

 

FACILITATOR TRAINING CYBER CRIME IN FINANCE SECTOR

Goutama Bachtiar

Goutama Bachtiar adalah : Advisor, Auditor, Konsultan, Trainer, Courseware Designer dan Penulis bidang Teknologi dan Sistem Informasi selama 17 tahun terakhir dengan spesialisasi di ranah IT Governance, Risk, Security, Assurance, Audit dan IT Management.

Saat ini beliau menjabat sebagai advisor beberapa perusahaan dan organisasi, Subject Matter Expert, Program Mentor, Editorial Journal Reviewer, Certification Exam (CISA, CGEIT, CISM, CRISC) dan Study Materials Developer di ISACA International Chapter, Subject Matter Expert dan Program Evaluator di PMI International Chapter, IASA, SABSA dan Open Group Global Working Group Member, Reviewer Panel di International Institute of Business Analysis (IIBA), Dosen Tamu di program pasca sarjana beberapa universitas di AS dan Indonesia (UTB, UI, IPB dan Binus), serta moderator, panelis dan pembicara di sejumlah konferensi, workshop dan seminar.

Sebagai auditor dan konsultan, telah memberikan layanan tersebut kepada 35 perusahaan dan organisasi. Puluhan sertifikasi internasional sudah diperolehnya sampai dengan saat ini.

Selain itu, beliau juga telah mengadakan dan memberikan pelatihan, perkuliahan, seminar, konferensi dan workshop sebanyak lebih dari 230 sesi dan 5500 jam lebih kepada sekitar 7500 peserta di Indonesia maupun luar negeri kepada lebih dari 70 perusahaan dan organisasi.

Sebagai penulis, sudah mengarang 2 buku dan 22 courseware serta sudah menulis, melakukan review dan editing atas 300 artikel, manuskrip, paper dan white paper seputar Telematika dan Manajemen di lebih dari 20 media, publikasi, organisasi, jurnal dan konferensi.

 

Jadwal Training 2020

  • 30 April – 01 Mei 2020
  • 01 – 02 Juli 2020
  • 09 – 10 September 2020
  • 11 – 12 November 2020

 

Lokasi Training 

Amaris Hotel La Codefin / Neo Hotel – Kebayoran / Hotel Santika Premiere Hayam Wuruk, Jakarta (Tentative)

 

FEE TRAINING

  • Rp. 4.450.000 ,- (REG for 3 person/more; payment 1 week before training)
  • Rp. 4.650.000 ,- (REG 2 weeks before; payment 1 week before training)
  • Rp. 5.150.000 ,- (On The Spot; payment at the latest training)
  • Rp. 5.525.000 ,- (Full fare)

Current State Of Cyber Crime In Finance Sector: Threats And Solutions

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

INFORMATION SECURITY SYSTEM

ACARA

16 – 18 Maret 2020 | Rp 6.500.000/ peserta di Bandung
20 – 22 April 2020 | Rp 6.500.000/ peserta di Bandung
11 – 13 Mei 2020 | Rp 6.500.000/ peserta di Bandung

Jadwal Training 2020 Selanjutnya …

 

 

INTRODUCTION

The information you collect, store, manage and transfer is an organizational asset. It adds value to your business and consequently needs to be suitably protected. It may be the personal details of your customers or confidential financial data. Growing dependence on information systems, shared networks and distributed services like cloud computing means organizations are more now even more vulnerable to security threats. In a recent survey by the Chartered Management Institute, 72% of businesses admitted that they were worried about the financial impact of cybercrime with 1 in 3 having experienced such attacks in 2010. Poor supervision of staff and lack of proper authorization procedures are frequently highlighted as major causes of security incidents.

 

INFORMATION SECURITY SYSTEM TRAINING OBJECTIVE

  1. The training will increase the key knowledge of your information securityconcepts and trends for secure administration and management f computer systems and networking
  2. To be thoroughly understand of the challenges of network security in a global, dynamic networked systems environment
  3. To understand te wide range of vulnerabilities and threats to which an organization’s information assets may be exposed
  4. To identifty ways to improve readiness in responding and recovering from information security incidents

 

INFORMATION SECURITY SYSTEM TRAINING OUTLINE

  1. Dimension of Information Security
  2. Security Management Practices
  3. Human Resources Security
  4. Cryptography
  5. Network Security Technology
  6. Information Security Technology
  7. Access Control System
  8. Disaster Recovery Planning/ Business Continuity Planning
  9. Operation Security
  10. Physical Security

 

INSTRUCTOR

Ir. Emir Mauludi Husni, M.Sc., Ph.D. and Team

Ir. Emir Mauludi Husni, M.Sc., Ph.D. is an alumnus from Electrical Engineering, Institut Teknologi Bandung (Bachelor), Satellite Engineering University of Surrey, UK. (Master), and Telecommunication Engineering University of Surrey, UK. (Ph.D.). Now he is a permanent academic staff at School of Electrical Engineering & Informatics ITB. He have been interacting with industry for more than 15 years for training, consultancy and project implementation in field of ICT. In his expertise in ITB, he has dedicated much scientific work, such as publish to scientific journals and being speaker in national and international conferences.

 

VENUE 

Bandung (Golden Flower, Banana Inn, Serela, Gino Feruci), Amaroossa Hotel, Noor Hotel, Grand Setiabudi Hotel, dll

 

TRAINING DURATION

3 days

 

JADWAL TRAINING 2020

  1. 16 Mar 2020-18 Mar 2020
  2. 20 Apr 2020-22 Apr 2020
  3. 11 Mei 2020-13 Mei 2020
  4. 02 Jun 2020-04 Jun 2020
  5. 20 Jul 2020-22 Jul 2020
  6. 03 Agust 2020-05 Agust 2020
  7. 21 Sep 2020-23 Sep 2020
  8. 05 Okt 2020-07 Okt 2020
  9. 02 Nop 2020-04 Nop 2020
  10. 21 Des 2020-23 Des 2020

 

INVESTMENT PRICE/PERSON

  1. Rp 6.500.000/person (full fare) or
  2. Rp 6.250.000/person (early bird, payment 1 week before training) or
  3. Rp 5.950.000/person (if there are 3 or more participants from the same company)

 

FACILITIES FOR PARTICIPANTS

  1. Training Module
  2. Flashdisk contain training material
  3. Certificate
  4. NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Foto
  8. Training room with full ac facilities and multimedia
  9. Lunch and twice coffee break everyday of training
  10. Qualified Instructor
  11. Transportation from hotel of participants to hotel of training VV (if minimal participants from the same company is 4 )

 

INFORMATION SECURITY SYSTEM

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

ISO 27001: 2005 PEMAHAMAN & PENERAPAN SISTEM MANAJEMEN KEAMANAN INFORMASI

Acara

17 – 18 Februari 2020 | Rp 4.500.000/ peserta di Jakarta
16 – 17 Maret 2020 | Rp 4.500.000/ peserta di Jakarta
29 – 30 April 2020 | Rp 4.500.000/ peserta di Jakarta

Jadwal Training 2020 Selanjutnya …

 

 

PENDAHULUAN TRAINING ISO 27001: 2005

Informasi merupakan aset yang sangat penting bagi setiap organisasi. Dalam persaingan bisnis,dapat dikatakan bahwa penguasaan informasi merupakan salah satu senjata utamanya. Pernahkah Anda merasa bahwa ide brilliant Anda dicuri pesaing? Pernahkah Anda melihat pesaing Anda mendapatkan proyek yang telah Anda incar,beberapa waktu kemudian baru Anda menyadari bahwa pesaing tersebut memenangkan proyek karena mereka mengetahui informasi penting tentang bisnis Anda, yang menurut Anda telah Anda rahasiakan sebaik mungkin? Bagi organisasi pemerintahan, apakah sudah terjamin informasi kebijakan atau hasil penilaian jabatan dalam proses-prosesnya?

Pertanyaan-pertanyaan tersebut akan terjawab dari jawaban pertanyaan-pertanyaan berikut, Bagaimanakah perusahaan/organisasi Anda memperlakukan informasi sebagai asset penting? Pernahkan Anda merasa gangguan pada bisnis Anda dikarenakan pesaing memiliki informasi yang sama dengan yang Anda pegang? Bagaimana Anda mengelola asset intangible ini? Sudahkah dilindungi dengan baik sehingga berdaya guna maksimal bagi perusahaan?

ISO 27001:2005 adalah Sistem Manajemen Keamanan Informasi yang membangun kesadaran terhadap pengelolaan asset intangible ini secara menyeluruh dan meningkatkannya secara berkesinambungan.

 

TUJUAN TRAINING ISO 27001: 2005

  • Memahami prinsip-prinsip dasar sistem manajemen keamanan informasi (SMKI).
  • Memahami kesamaan persyaratan yang ada dalam Sistem Manajemen Keamanan Informasi (SMKI) ISO 27001: 2005.
  • Memahami langkah penyusunan dan penerapan sistem manajemen keamanan informasi.

 

MATERI TRAINING ISO 27001: 2005

  • Prinsip-prinsip dan Pemahaman Sistem Manajemen:
    • Keterkaitan standar sistem manajemen
    • Pengembangan sistem manajemen
  • Prinsip Dasar Keamanan Informasi
    • Konsekuensi dari pengamanan yang lemah
    • Jenis umum dari ancaman
    • Tujuan keamanan informasi
    • Definisi berdasarkan ISO 27001: 2005
    • PDCA
  • Pemahaman persyaratan sistem manajemen keamanan informasi (SMKI)
    • Persyaratan Umum
    • Penetapan dan Pengelolaan SMKI
    • Persyaratan dokumentasi
    • Tanggung jawab Pimpinan
    • Audit internal SMKI
    • Tinjauan Manajemen SMKI
    • Peningkatan Berkesinambungan SMKI
  • Pemahaman Lampiran Persyaratan Standar ISO 27001: 2005

 

SASARAN PESERTA TRAINING ISO 27001: 2005

Kandidat Wakil Manajemen, Tim Implementasi ISO, Manager, Supervisor, Engineer

 

METODE TRAINING ISO 27001: 2005

Pelatihan ini menekankan penggunaan Diskusi, Simulasi, Kasus-kasus dan Latihan

 

INSTRUCTOR TRAINING ISO 27001: 2005 :   Yuwono D. Sucipto

 

VENUE : Jakarta (Maxone Hotel Menteng, Balairung Hotel Matraman, Sentral Hotel, Haris Tebet, Gd Muamalat Institute, Ibis Manggadua, Little Amaroossa Residence, Cosmo Amaroossa, Zodiak MT. Haryono, Grand Tjokro)

 

TRAINING DURATION :   2 days

 

JADWAL TRAINING 2020

  • 11 Feb 2020-12 Feb 2020
  • 10 Mar 2020-11 Mar 2020
  • 22 Apr 2020-23 Apr 2020
  • 18 Mei 2020-19 Mei 2020
  • 09 Jun 2020-10 Jun 2020
  • 22 Jul 2020-23 Jul 2020
  • 11 Agust 2020-12 Agust 2020
  • 23 Sep 2020-24 Sep 2020
  • 13 Okt 2020-14 Okt 2020
  • 10 Nop 2020-11 Nop 2020
  • 23 Des 2020-24 Des 2020

 

HARGA INVESTASI/PESERTA

  1. 4.500.000/peserta (bayar penuh) atau
  2. 4.250.000/peserta (early bird, yang membayar 1 minggu sebelum training) atau
  3. 3.950.000/peserta (peserta bergroup yang terdiri dari 3 peserta atau lebih dari 1 perusahaan yang sama)

 

FACILITIES FOR PARTICIPANTS

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor

 

PEMAHAMAN & PENERAPAN SISTEM MANAJEMEN KEAMANAN INFORMASI ISO 27001: 2005

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

ADVANCED CCTV

safety training
ADVANCED CCTV

ACARA

24 – 26 Februari 2020 | Rp 6.500.000/ peserta di Bandung
18 – 20 Maret 2020 | Rp 6.500.000/ peserta di Bandung
13 – 15 April 2020 | Rp 6.500.000/ peserta di Bandung

Jadwal Training 2020 Selanjutnya …

 

 

PENDAHULUAN TRAINING ADVANCED CCTV

Seiring dengan perkembangan jaman, kebutuhan akan kamera CCTV sudah tidak diragukan lagi. Penggunaan kamera CCTV tidak lagi hanya berfungsi sebagai alamat pengamanan, tapi dapat meningkat produktifitas kerja dalam sebuah perusahaan atau untuk bahkan untuk mengawasi anak balita dirumah.

Perencanaan, desain dan implementasi CCTV merupakan pelatihan dalam bentuk hands-on training dengan porsi praktek adalah 80%. Peserta pelatihan adalah konsultan keamanan, supervisor dan manajer keamanan perusahaan.

Pada umumnya CCTV digunakan sebagai pelengkap keamanan dan banyak dipakai di dalam industri industri seperti : Militer, Airport, Toko, Kantor, Pabrik bahkan sekarang perumahan pun telah menggunakan teknologi ini.

 

MATERI TRAINING ADVANCED CCTV

  1. Perencanaan
    • Sistem Perkabelan Closed Circuit dan Catu Daya
    • Pencahayaan
    • Network CCTV – Internet Protocol
    • CCTV Kamuflase
  2. Desain
    • Detail Engineering Design
    • Penempatan CCTV
    • Simulasi 2D dan 3D
  3. Implementasi
    • Control Room dan Dashboard
    • Management System – CCTV Staff

 

MANFAAT YANG DIPEROLEH :

Kemampuan yang diperoleh :

  • Mampu untuk merencanakan CCTV dengan penguasaan pada pencahayaan dan pembangunan jaringan CCTV termasuk system pelistrikan dan pemilihan kabel jaringan
  • Mampu membuat detail engineering design dan simulasi CCTV
  • Mampu membuat control room, dashboard dan manajemen sumber daya manusia
  • Mampu membuat eskalasi gangguan keamanan

 

INSTRUCTOR : Dr. Ir. Ian Josef Matehus Edward, MT.

 

TEMPAT TRAINING ADVANCED CCTV

Bandung (Golden Flower, Banana Inn, Serela, Gino Feruci), Amaroossa Hotel, Noor Hotel, Grand Setiabudi Hotel, dll

 

DURASI TRAINING ADVANCED CCTV

3 hari

 

JADWAL TRAINING 2020

  • 24 Feb 2020-26 Feb 2020
  • 18 Mar 2020-20 Mar 2020
  • 13 Apr 2020-15 Apr 2020
  • 18 Mei 2020-20 Mei 2020
  • 22 Jun 2020-24 Jun 2020
  • 13 Jul 2020-15 Jul 2020
  • 24 Agust 2020-26 Agust 2020
  • 14 Sep 2020-16 Sep 2020
  • 26 Okt 2020-28 Okt 2020
  • 23 Nop 2020-25 Nop 2020
  • 14 Des 2020-16 Des 2020

 

HARGA INVESTASI/PESERTA :

  1. 6.500.000/peserta (bayarpenuh) atau
  2. 6.250.000/peserta (early bird, yang membayar 1 minggu sebelum training) atau
  3. 5.950.000/peserta (peserta bergroup yang terdiri dari 3 peserta atau lebih dari 1 perusahaan yang sama)

 

FACILITAS UNTUK  PESERTA:

  1. Training Module
  2. Flash disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with full AC facilities and multimedia
  9. Once lunch and twice coffeebreak every day of training
  10. Qualified instructor
  11. Transportation for participants from hotel of participants to/from hotel of training (if minimal number of participants from one company is 4 persons)

 

ADVANCED CCTV: Perencanaan, Desain dan Implementasi

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

IT RISK MANAGEMENT

Acara

03 – 07 Februari 2020 | Rp 9.500.000/ peserta di Jakarta
09 – 13 Maret 2020 | Rp 9.500.000/ peserta di Jakarta
20 – 24 April 2020 | Rp 9.500.000/ peserta di Jakarta

Jadwal Training 2020 Selanjutnya …

 

 

DESCRIPTION IT RISK MANAGEMENT 

The IT risk management is the application of risk management to Information technology context in order to manage IT risk, i.e.: The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.

IT risk management can be considered a component of a wider Enterprise risk management system.

Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.

This training is built around globally accepted standards such as ISO 31000:2009 and frameworks such as ISACA’s Risk IT, and NIST and OCTAVE guidelines for risk management.

 

OBJECTIVES IT RISK MANAGEMENT

  • Identify where and how to reduce known/unknown IT risks
  • Identify areas of cost-benefit optimization and thus reduce IT expenditure
  • Understand the ISO 31000:2009 standard and its applicability to the corporate environment
  • Understand risk assessment as addressed in BASEL II, ISO 20000, ISO 27001, ITIL, COSO, COBIT, BS 25999 and its relevance to IT
  • Understand the different IT Risk Assessment Standards, Models and Methodologies – NIST’s SP-800-30, and OCTAVE™, ISO 27005
  • Insights on practical use of risk assessment and control evaluation techniques

 

IT RISK MANAGEMENT TRAINING OUTLINE

DAY 1:

  • Background:
    • Briefing on Definition of Risk and Risk in context of Information Technology
    • Discussion and recording: Known risk scenarios
    • IT Risk Management Initiative
    • Project Planning Requirements
  • Groundwork:
    • General Risk Scenarios
      • Understanding Business-specific, industry-specific, region/location-specific scenarios
      • Recording the scenarios
  • Management Buy-in
  • Degree of business dependence on information technology
  • Understanding and recording technology-specific risks
  • Tying in general risk scenarios with IT risks
  • Techniques of building business case
  • Budgeting
  • Project Planning
  • Resource Identification and Allocation
  • Understanding the Concepts and Techniques
    • IT Risk Management Cycle
    • Technology and business drivers
    • Risk Terms – Asset, Threat, Threat Agent, Threat Event, Vulnerability, Countermeasure, Risk, Residual Risk
    • Risk Assessment Methodology
    • ISO 31000:2009 Overview
  • Exercises, and Discussion

DAY 2:

  • IT Risk Assessment:
    •  IT Process Selection
    •  IT Component Selection
    • Approach Selection
    •  Risk Discussion :
      • Risks from IT Strategy adopted
      • Risks from IT Processes and Plans
      • Risks from Networks and Systems
      • Risks from Business Applications
      • Risks from Internal Application
      • Risks from Devices – Security Implementation, Disaster Recovery, Business Continuity
      •  Risks from Internal and External customers
    • Applying ISO 31000 and Risk IT for Risk Assessment
    •  Challenges and Solutions
    •  Case Study I
  • Exercises, and Discussion

DAY 3:

  • IT Risk Mitigation :
    • IT Risk Mitigation Options
    • IT Risk Mitigation Strategy
    • Controls’ Identification and Analysis
    • Cost Benefit Analysis
    • Calculating Residual Risk
    • Case Study II
    • Applying ISO 31000 and Risk IT for Risk Mitigation
  •  Evaluation IT Risk Management Cycle :
    • Project Evaluation
    • Learning from Selection and Execution techniques
  • Integrating IT Risk Management with various frameworks and standards – BASEL II, ISO 20000, ITIL, COSO, COBIT, ISO 27001, BS 25999 ,NIST’s SP-800-30,, OCTAVE™, ISO 27005
  • IT Risk Management Cycle: A Revision
  • Exercises, and Discussion

DAY 4:

  • Special Project / Case Study “ IT Risk Assessment”  (part 1)

DAY 5:

  • Special Project / Case Study “ IT Risk Assessment”  (part 2)

 

INSTRUCTOR TRAINING IT RISK MANAGEMENT

Ir. Muhammad Tavip, MPM, Cert.HR (US-Based).

  • Muhammad Tavip, Ir., MPM, Cert. HR pemegang sertifikasi internasional Project Management berdasarkan PMBOK – PMI, USA dan  Human Resource Management (US-based), Alumni of Institut Teknologi Bandung (1992) dan   Post Graduate Diploma dari University of South Australia, Adelaide (1995).  Beberapa Sertifikasi Internasional yang dipegangnya adalah: Project Management (PM)/ITPM, Software Business Analysis (SBA), Systems Analysis and Design (SAD), Software Quality Assurance (SQA), Software Testing Professional (STP),  IT Infrastructure Library (ITIL ), Disaster Recovery Planning (DRP).
  • Memiliki pengalaman lebih dari 15 tahun di bidang IT, Management and Business. Beliau Mengelola Proyek berskala Nasional dan International. Memberikan jasa konsultansi di bidang Project Management dan IT Project Management, Enterprise Project Management using Project Server 2003/2007/2010, Pelatihan dan Konsultansi Implementasi Balanced Scorecard, dan  IT Management consulting. Beliau merupakan salah satu pendesain software Balanced Scorecard MBRIO yang telah digunakan beberapa perusahaan swasta berskala UKM.
  • Beliau berpengalaman lebih dari 10 tahun memberikan pelatihan baik public maupun in-house dan Coaching untuk bidang IT Management termasuk: Project Management (PM)/ITPM, Software Business Analysis (SBA), Systems Analysis and Design (SAD), Software Quality Assurance (SQA), Software Testing Professional (STP),  IT Infrastructure Library (ITIL V2 and V3 ), Disaster Recovery Planning (DRP), IT Risk Management, Information Security Management based on PBI, , COBIT 5 Foundation, Operation Management ( supply chain management, logistics management, warehouse management, inventory management), project financing.
  • Dari tahun 2001 s/d sekarang Beliau telah membimbing lebih dari 5000 para project Manager di Indonesia mempelajari Project Management dan IT Project Management berdasarkan standard defector PMBOK – PMI, USA mulai dari versi 2000, 2004, dan PMBOK 2008.
  • Beberapa klien yang pernah mendapatkan bimbingan/ training/coaching/ konsultasi Project Management/ IT Project Management sejak 2001 s/d sekarang diantaranya adalah:
    • PEMERINTAHAN & BUMN:

Bank Indonesia, PT. Bank Mandiri (Persero) Tbk, PT. Bank Negara Indonesia (Persero) Tbk, PT. Bank Rakyat Indonesia (Persero) Tbk, Depnakertrans, Departemen Dalam Negri, Departemen PU, Departemen Agama, Departemen Keuangan, PLN, BKPM, BPKP, PT. PUSRI, Sekolah Staff Komando Angkatan Laut (SESKOAL). PT. Telkom, PT. Sigma Cipta Caraka, Komisi Pemberantasan Korupsi (KPK), PT. Antam, Tbk, PT. Laras Astra Kartika, dll.

  • PERUSAHAAN SWASTA:

PT. Bank Artha Graha International Tbk, Bank BTN, PT. Bank UOB Buana, Artha Jasa, Kabel Vision, Alcatel, PT. Hindoli (A Cargill Co), Satelindo, Excelcom, Bank Bali, Bank Permata, Tbk, Citra Sari Makmur, PT. Amway Indonesia, PT. Pabrik Kerta Tjiwi Kimia, PT. Astragraphia, Tbk, Metro TV news, PT. Intikom, PT. Bank DKI, Galenium Pharmasia Lab, PT. Unicharm Indonesia, PT. Primacom, PT. Gramedia – Majalah, Swadharma, PT. Data Script, PT. Bank Mega, PT. Astra Oto Parts, Talisman Energy Inc, PT. Berca Hardaya Perkasa, PT. Mandiri Sekuritas, PT. Arutmin, ACC, dll.

  • PERUSAHAAN ASING:

Caltex, Unocal, PWC, Chevron, BHP Billiton, Vico Indonesia, PT. Coats Indonesia, PT. Sumiko Leadframe Bintan, PT. Metlife Sejahtera, Santos Asia Pacific Pty Ltd, German Centre, PT. Thames PAM Jaya, PT. AC Nielsen Indonesia, KPC, PT. Freeport Indonesia, PT. Mattel Indonesia, PT. Bank Rabobank International Indonesia, PT. Roche Indonesia, PT. Nestle Indonesia, PT. Arun LNG, PT. Sinar Meadow International Indonesia, PT. Bank HSBC, PT. Oberthur Indonesia, PT. Bank Woori Indonesia, PT. Bank of Tokyo, PT. Atlas Copo,  PT. Bank RBS,dll.

  • UNIVERSITAS &LSM:

Universitas PETRA, STIE Perbanas, Universitas Trisakti, HIV Foundation, Universitas Maranatha, Universitas Satya Wacana, Universitas Atmajaya World Vision, dll.

 

VENUE TRAINING IT RISK MANAGEMENT 

Jakarta (Maxone Hotel Menteng, Balairung Hotel Matraman, Sentral Hotel, Haris Tebet, Gd Muamalat Institute, Ibis Manggadua, Little Amaroossa Residence, Cosmo Amaroossa, Zodiak MT. Haryono, Grand Tjokro)

 

DURATION TRAINING IT RISK MANAGEMENT

5 days

 

JADWAL TRAINING 2020

  1. 03 Feb 2020-07 Feb 2020
  2. 09 Mar 2020-13 Mar 2020
  3. 20 Apr 2020-24 Apr 2020
  4. 11 Mei 2020-15 Mei 2020
  5. 08 Jun 2020-12 Jun 2020
  6. 20 Jul 2020-24 Jul 2020
  7. 03 Agust 2020-07 Agust 2020
  8. 21 Sep 2020-25 Sep 2020
  9. 05 Okt 2020-09 Okt 2020
  10. 02 Nop 2020-06 Nop 2020
  11. 30 Nop 2020-04 Des 2020

 

INVESTATION PRICE/ PERSON 

  1. Rp 9.500.000/peserta (bayar penuh)  atau
  2. Rp 9.250.000/peserta (early bird, yang membayar 1 minggu sebelum training)  atau
  3. Rp 8.950.000/peserta (untuk peserta bergroup yang terdiri dari 3 orang peserta atau lebih dari 1 perusahaan yang sama)

 

FACILITIES FOR PARTICIPANTS

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor
  11. Transportation for participants from hotel of participants to/from hotel of training – VV (if minimal participants is 4 persons from the same company)

 

IT RISK MANAGEMENT based on Various Frameworks, Standards, and Models: BASEL II, ISO 20000, ITIL, COSO, COBIT, ISO 27001, BS 25999 ,NIST’s SP-800-30 OCTAVE™, ISO 27005

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

X-Ray Screening For Security System – PASTI JALAN

ACARA

27 – 29 Januari 2020 | Rp 6.900.000 di Hotel Ibis Malioboro, Yogyakarta
03 – 05 Februari 2020 | Rp 6.900.000 di Hotel Ibis Malioboro, Yogyakarta
09 – 11 Maret 2020 | Rp 6.900.000 di Hotel Ibis Malioboro, Yogyakarta – CONFIRMED

Jadwal Training 2020 Selanjutnya …

 

Deskripsi  X-Ray Screening For Security System

Perkembangan teknologi membawa sistem keamanan ke level yang lebih tinggi dan canggih. X-Ray screening adalah salah satu cara mutahir untuk mendeteksi kejanggalan-kejanggalan yang tidak bisa dilihat dengan kasat mata. Banyaknya hal-hal berbentuk kriminal seperti human traficking, terorisme, penyelundupan senjata api dan obat-obatan terlarang memaksa para ilmuwan untuk menciptakan sistem keamanan yang mampu mendeteksi hal-hal tersebut. X ray merupakan sinar radiasi elektromagnetik yang mampu menembus bahan padat, hasil dari gelombang elktromagnetik itu dapat ditransformasikan dalam bentuk gambar pada layar komputer untuk mengetahui apa saja yang terdapat di dalam suatu kotak atau benda tanpa perlu membukanya. X ray juga digunakan di bidang kesehatan berupa citra tubuh manusia untuk mendeteksi penyakit melalui foto roentgen. Pada pelatihan ini akan membahas mengenai penggunaan x ray screening dan aplikasinya.

 

Tujuan Training  X-Ray Screening For Security System

  1. Peserta memahami mengenai konsep x ray screening
  2. Peserta mampu menerapkan keterampilan x ray screening sesuai bidang kerjanya
  3. Peserta mampu menerapkan metodologi deteksi ancaman

 

Materi Training  X-Ray Screening For Security System

  1. Backround and Regulation
  2. Aviation Security History and Current Trends
  3. Aviation Security Legislation
  4. Explosive and Improvised Device
  5. X-Ray Screening Skills
  6. X-Ray Screening Equipment and Methods
  7. Inner Working of Screening Equipment
  8. Cargo and mail Screening Techniques
  9. Identifying Weapons and IEDz In An X-Ray
  10. Screening Packed Luggage and Cargo Packages

 

Peserta Training X-Ray Screening For Security System              

Airports, Cargo Companies, Security service providers, Law inforcement agencies, Mail and Courier Companies

 

Jadwal Training 2020

Hotel Ibis Malioboro, Yogyakarta

  • 20 – 22 Januari 2020
  • 27 – 29 Januari 2020
  • 3- 5 Februari 2020
  • 10 – 12 Februari 2020
  • 17 – 19 Februari 2020
  • 26 – 28 Februari 2020
  • 2 – 4 Maret 2020
  • 9 – 11 Maret 2020
  • 16 – 18 Maret 2020
  • 23 – 24 Maret 2020
  • 30 Maret 2020 – 1 April 2020
  • 6 – 8 April 2020
  • 13 – 15 April 2020
  • 20 – 22 April 2020
  • 27 – 29 April 2020
  • 4 – 6 Mei 2020
  • 11 – 13 Mei 2020
  • 2 – 4 Juni 2020
  • 8 – 10 Juni 2020
  • 15 – 17 Juni 2020
  • 22 – 24 Juni 2020
  • 29 Juni 2020 – 1 Juli 2020
  • 6 – 8 Juli 2020
  • 13 – 15 Juli 2020
  • 20 – 22 Juli 2020
  • 27 – 29 Juli 2020
  • 3 – 5 Agustus 2020
  • 10 – 12 Agustus 2020
  • 18 – 19 Agustus 2020
  • 24 – 26 Agustus 2020
  • 31 Agustus 2020 – 2 September 2020
  • 7 – 9 September 2020
  • 14 – 16 September 2020
  • 21 – 23 September 2020
  • 28 – 30 September 2020
  • 5 – 7 Oktober 2020
  • 12 – 14 Oktober 2020
  • 19 – 21 Oktober 2020
  • 26 – 28 Oktober 2020
  • 2 – 4 November 2020
  • 9 – 11 November 2020
  • 16 – 18 November 2020
  • 23 – 25 November 2020
  • 30 November 2020 – 2 Desember 2020
  • 7 – 9 Desember 2020
  • 14 – 16 Desember 2020
  • 21 – 23 Desember 2020
  • 28 – 30 Desember 2020

 

Investasi & Fasilitas

  • Rp 6.900.000 (Non Residential)
  • Jika Perusahaan/ Instansi mengirimkan lebih dari satu pesertapada judul dan tanggal yang sama maka akan di berikan potongan harga pada peserta kedua dan seterusnya masing – masing sebesar Rp 1.000.000 per peserta.
  • VIP training Rp 8.900.000 (4 Hari , Non Residential dengan tambahan Fasilitas Paket studi lapangan/ City tour dan Belum Termasuk Pajak PPn 10%)
  • Quota minimum 2 peserta
  • Fasilitas: Certificate, Training kits, USB, Lunch, Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/ Stasiun ke Hotel khusus bagi perusahaan yang mengirimkan minimal 3 orang peserta)

 

Instruktur Training  X-Ray Screening For Security System

Hamid ST M.Eng and team

 

X-Ray Screening For Security System

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

IT HELPDESK

EVENT

17 – 18 Februari 2020 | Rp 6.500.000/ peserta di Jakarta
16 – 17 Maret 2020 | Rp 6.500.000/ peserta di Jakarta
13 – 14 April 2020 | Rp 6.500.000/ peserta di Jakarta

Jadwal Training 2020 Selanjutnya …

 

 

IT HELPDESK TRAINING INTRODUCTION

A Help Desk is usually not a profit-generating department within a company. It is, for many organizations, a necessary expense, but it can add a significant amount of value to a company in a variety of ways.
In order for your Help Desk to add this value, it must, as follows;

  1. be established with the proper mission;
  2. offer the right set of services, and;
  3. achieve its objectives.

Furthermore, in order to run an effective Help Desk, you must know in advance what services you are going to perform; must know how to prioritize issues, and; must create realistic expectations.
All successful companies start off with a business plan, and the same rule applies to Help Desks. If your Help Desk is focused and has a clear understanding of your business, it will add a significant amount of value to the company in the form of increased productivity.

 

IT HELPDESK TRAINING OUTLINE

In this training, we will cover all the topics necessary regarding IT Help Desk as follows:

  • Information Technology Service Management (ITSM)
    • Overview of ISO 20000
    • Help Desk & Service Desk
  • What is a Help Desk?
    • Introduction
    • Help Desk Description
    • Non-IT Help Desk
    • 6 Functions & Benefits of the IT Help Desk
  • Positioning of the IT Help Desk Within an Organization
  • Who should use Help Desk?
    • Customers of the Help Desk
  • Features of Help Desk
  • Hierarchy of Help Desk (Level of User)
    • Help Desk Design
    • Service Levels
    • Help Desk Models
  • Flow of Help Desk (Working of Help Desk)
    • Staffing of the Help Desk
  • Role of Customer
    • 5 Rules of Customer Care
  • Role of Coordinator
  • Role of Specialist
  • Role of Agent
  • The Incident Management Process
  • Help Desk Tools & Technologies
  • Importance of Goals, Processes, and Procedures
  • Support Environment & Processes
  • Problem Management
  • Top 5 Help Desk Best Practices
  • Implementation & Project Plan
  • Top 10 Metrics to Monitor the Health of Your Help Desk
  • Case Study: Globalized IT Service Desk
  • Case Study: Centralized Support for Service Desk and Desktop

 

PESERTA YANG DIREKOMENDASIKAN

Manajer dan staf IT dan manajer atau pihak-pihak yang perlu dilibatkan dalam perancangan dan operasionalisasi IT Helpdesk.

 

IT HELPDESK TRAINING INSTRUCTOR

Ir. Desmon Ginting, M.Tech.

 

IT HELPDESK TRAINING VENUE

Jakarta (Maxone Hotel Menteng, Balairung Hotel Matraman, Sentral Hotel, Haris Tebet, Gd Muamalat Institute, Ibis Manggadua, Little Amaroossa Residence, Cosmo Amaroossa, Zodiak MT. Haryono, Grand Tjokro)

 

TRAINING DURATION :  

3 hari

 

JADWAL TRAINING 2020

  • 17 Feb 2020-19 Feb 2020
  • 16 Mar 2020-18 Mar 2020
  • 13 Apr 2020-15 Apr 2020
  • 13 Mei 2020-15 Mei 2020
  • 15 Jun 2020-17 Jun 2020
  • 13 Jul 2020-15 Jul 2020
  • 19 Agust 2020-21 Agust 2020
  • 14 Sep 2020-16 Sep 2020
  • 19 Okt 2020-21 Okt 2020
  • 16 Nop 2020-18 Nop 2020
  • 14 Des 2020-16 Des 2020

 

INVESTMENT PRICE/PERSON IT HELPDESK

  1. Rp. 6.500.000/person (full fare) or
  2. Rp. 6.250.000/person (early bird, payment 1 week before training) or
  3. Rp. 5.950.000/person (if there are 3 persons or more from the same company

 

FACILITIES FOR PARTICIPANTS IT HELPDESK

  1. Training Module
  2. Flash Disk contains training material
  3. Certificate
  4. Stationeries: NoteBook and Ballpoint
  5. T-Shirt
  6. Backpack
  7. Training Photo
  8. Training room with Full AC facilities and multimedia
  9. Lunch and twice coffeebreak every day of training
  10. Qualified Instructor

 

IT HELPDESK

 

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days

CASP – CompTIA Advanced Security Practitioner

CompTIA Advanced Security Practitioner
CASP

Event

27 – 31 January 2020 | Rp 12.000.000 at Kuningan, Jakarta Selatan
06 – 10 April 2020 | Rp 12.000.000 at Kuningan, Jakarta Selatan
20 – 24 July 2020 | Rp 12.000.000 at Kuningan, Jakarta Selatan

Jadwal Training 2020 Selanjutnya …

 

 

COURSE DESCRIPTION CASP (CompTIA Advanced Security Practitioner )

The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus at the enterprise level.

CASP meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments.

 

COURSE OBJECTIVES CASP (CompTIA Advanced Security Practitioner )

At the end of the program, the participants will be able to:

  • Apply technical knowledge and skills of Advanced IT Security
  • Conceptualize, engineer, integrate and implement secure solutions across complex environments
  • Apply critical thinking and judgment across a broad spectrum of security disciplines
  • Propose and implement sustainable security solutions that map to organizational strategies
  • Translate business needs into security requirements
  • Analyzes risk impact
  • Respond to security incidents

 

TARGET AUDIENCE CASP (CompTIA Advanced Security Practitioner )

The CASP Certification is aimed for Cyber Security / IS Professional, Information Security Analyst, Security Architect, IT Specialist INFOSEC, IT Specialist Cybersecurity.

 

DURATION CASP (CompTIA Advanced Security Practitioner )

This program is 5 days of intensive training class.

 

REQUIREMENT:

It is recommended for CASP candidates to have 10 years experience in IT administration including at least 5 years of hands-on technical security experience.

 

Assessment

At the end of the program, the participants will be assessed with 1 hour and 45 minutes of CASP Exam.

 

Award:

CASP Certification will be awarded upon successfully passing the exam from CompTIA.

 

COURSE MODULES CASP (CompTIA Advanced Security Practitioner )

Module 1: Enterprise Security

  • Select Appropriate Cryptographic Concepts and Techniques
  • Illustrate the Security Implications Associated with Enterprise Storage
  • Analyze Network and Security Components, Concepts and Architectures
  • Troubleshoot Security Controls for Hosts
  • Differentiate Application Vulnerabilities and Select Appropriate Security Controls

Module 2: Risk Management and Incident Response

  • Interpret Business and Industry Influences and Explain Associated Security Risks
  • Execute Risk Mitigation Planning, Strategies and Controls
  • Compare and Contrast Security, Privacy Policies and Procedures
  • Conduct Incident Response and Recovery Procedures

Module 3: Research, Analysis and Assessments

  • Apply Research Methods to Determine Industry Trends and Impact to the Enterprise
  • Analyze Scenarios to Secure the Enterprise
  • Select Methods or Tools Appropriate to Conduct an Assessment and Analyze Results

Module 4: Integration of Computing, Communications and Business Disciplines

  • Facilitate Collaboration Across Diverse Business Units to Achieve Security Goals
  • Select the Appropriate Control to Secure Communications and Collaboration Solutions
  • Implement Security Activities Across the Technology Life Cycle

Module 5: Technical Integration of Enterprise Components

  • Integrate Hosts, Storage, Networks and Applications into a Secure Enterprise Architecture
  • Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives

 

Schedule

This event will be held on the specified venue and schedule below:

  • 27 – 31 Januari 2020
  • 06 – 10 April 2020
  • 20 – 24 Juli 2020
  • 26 – 30 Oktober 2020
  • Time: 09.00AM – 05.00PM
  • Venue: AXA Tower – Kuningan City – Jakarta Selatan

 

TRAINING PACKAGES

  • Get More Special Discount if can register for minimum 3 (three) Participants
  • Original CASP Courseware from CompTIA
  • CASP Pre Assessment, Exercises and Mock Exam Simulation
  • CASP Exam Voucher
  • Certificate of Attendance from Informatics (Singapore)
  • CASP Certification from CompTIA (if pass the exam)
  • Lunch and Coffee Break
  • Stationery
  • Exclusive Souvenir

 

CompTIA Advanced Security Practitioner (CASP)

Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  1. JENIS INFORMASI/TRAINING
  2. (required)
  3. (required)
  4. DATA PRIBADI
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)
  13. PESAN UNTUK PENYELENGGARA TRAINING
  14. Captcha
 

cforms contact form by delicious:days