Network and Information Security
March 26, 2022 - April 02, 2022
Schedule via Zoom:
March 26 & April 2, 2022
8:30 am - 12:00 pm
March 29 & 31, 2022
Tuesday & Thursday
4:00 pm - 7:30 pm
Early Eagle Rate:
March 14, 2022
Network and Information Security is designed to provide network professionals and IT managers, with a broad view of the field of ethical hacking and information security. Basic concepts to be discussed will include the hacking process, developing an IT security plan and best practices in mitigating breaches in IT security in your company.
You are given hands-on exposure to ethical hacking tools, that enable you to gain the skills and knowledge necessary to understand the technical risks related to managing an information security program within an organization. Case studies and business examples will be included in this course to complement the conceptual coverage to provide real-world context.
Who should attend
Networking professionals, IT managers, and decision-makers that need and want to understand the security solutions that exist today.
After this course, you will:
Identify your organization’s IT security needs;
Develop an IT security plan, customized to the needs of your company;
Plan, execute and harden your company’s IT security posture; and
Hack targets of evaluation to gain insight on how hackers get in and out of your systems.
I. Introduction to Information Security
II. Introduction to Ethical Hacking and how it differs from “hacking”
III. Top Trends in Information Security
IV. The Hacking Process (Kali Linux is part of the tool-set of the course)
A. Gathering Information
1. Find information about people
2. Profile websites
3. Retrieve lost information from websites
4. Email Tracking
B. Gaining Access
1. Google Hacking
2. Hacking Passwords
4. Malware and Ransomware
5. Credit Card Fraud
6. Identity Theft
8. Web attacks
9. DOS and DDOS
11. WiFi Hacking and Wire-chalking
12. Social Engineering
C. Clearing Tracks
1. How not to get caught
2. Create Fake Identities
3. Stay anonymous in the Web
D. Mitigation Techniques
E. Consultation. Developing your IT Security Plan.
Note: The course does not guarantee proficiency in the tools demonstrated in four sessions. It guarantees awareness of the hacking techniques and the knowledge of how to prevent such from happening. Templates will be provided.
Laptop/Desktop Required Settings:
1. Mac or Windows
2. i5 Intel CPU/Core
3. 8GB RAM
4. 500GB Harddisk
5. Video Cam
7. Internet Connection (Minimum 20MBPS).
Mr. Chino Antonio S. Rodriguez is currently the Infrastructure Manager of CHI-X, a high frequency trading center and support provider for CHI-X Global.
He was the IT Head and Data Protection Officer of Neural Mechanics, a data science and artificial intelligence companies headquartered in Singapore and the Philippines.
He has over a decade of experience in Consulting, IT Management, IT Audit, Project Management, Solution Architecture and Ethical Hacking.
Prior to this, he held other posts, such as: PMO Director for ADEC Innovations; Solution Architect and IT Head for Natural Intelligence Solutions; and Solution Architect and IT Head for DANATEQ. He has held various managerial positions in IT for the Ateneo Graduate School of Business, Ateneo CCE and Ateneo de Manila University.
Mr. Rodriguez holds a Master’s Degree in Information Technology from the Ateneo de Manila University, Certifications in Ethical Hacking and Forensics from EC-Council and a Diploma in Applied Project Management from the Ateneo Graduate School of Business-Center for Continuing Education.