Network and Information Security
|Course Name||Network and Information Security|
May 5, 2017 - May 6, 2017
Friday - Saturday
9:00 am - 5:00 pm
Network and Information Security is designed to provide network professionals and IT managers, with a broad view of the field of ethical hacking and information security. Basic concepts to be discussed will include the hacking process, developing an IT security plan and best practices it mitigating breaches in IT security in your company.
You are given hands-on exposure to ethical hacking tools, that enable you to gain the skills and knowledge necessary to understand the technical risks related to managing an information security program within an organization. Case studies and business examples will be included in this course to complement the conceptual coverage to provide real-world context.
After this course, you will:
1. Identify your organization’s IT security needs;
2. Develop an IT security plan, customized to the needs of your company;
3. Plan, execute and harden your company’s IT security posture; and
4. Hack targets of evaluation to gain insight on how hackers get in
and out of your systems.
|Who should attend||
Networking professionals, IT managers, and decision-makers that need and want to understand the security solutions that exist today.
I. Introduction to Information Security
II. Introduction to Ethical Hacking
and how it differs from “hacking”
III. Top Trends in Information Security
IV. The Hacking Process
(Kali Linux is part of the tool-set of the course.)
A. Gathering Information
1. Find information about people
2. Profile websites
3. Retrieve lost information from websites
4. Email Tracking
B. Gaining Access
1. Google Hacking
2. Hacking Passwords
4. Credit Card Fraud
5. Identity Theft
8. Web attacks
9. DOS and DDOS
11. Corporate Espionage
12. WiFi Hacking and Wire-chalking
13. Social Engineering
C. Clearing Tracks
1. How not to get caught
2. Create Fake Identities
3. Stay anonymous in the Web
D. Mitigation Techniques
V. Consultation. Developing your IT Security
Plan. (Templates will be provided)
Note: The course does not guarantee proficiency in the tools demonstrated in two days. It guarantees awareness of the hacking techniques and the knowledge of how to prevent such from happening.
|Mr. Chino Antonio S. Rodriguez||
is a Product Consultant at Danateq Philippines, Inc. Prior to this, he was the Manager of the Computing Services Group, Information Technology Resource Management Office, of the Ateneo de Manila University.