Course Name

Network and Information Security

Schedule

April 13, 2024 - April 20, 2024

Schedule via Zoom:

April 13 & 20, 2024
Saturdays
8:30am-12:00pm

April 15 & 17, 2024
Monday & Wednesday
4:00 pm-7:30 pm

Regular Rate:

Php 11,000

Early Eagle Rate:

Php 10,000

Valid Until:

April 01, 2024

Network and Information Security

Description

Network and Information Security is designed to provide network professionals and IT managers, with a broad view of the field of ethical hacking and information security. Basic concepts to be discussed will include the hacking process, developing an IT security plan and best practices in mitigating breaches in IT security in your company.

You are given hands-on exposure to ethical hacking tools, that enable you to gain the skills and knowledge necessary to understand the technical risks related to managing an information security program within an organization. Case studies and business examples will be included in this course to complement the conceptual coverage to provide real-world context.

Who should attend

Networking professionals, IT managers, and decision-makers that need and want to understand the security solutions that exist today.

After this course, you will:

  1. Identify your organization’s IT security needs;

  2. Develop an IT security plan, customized to the needs of your company; 

  3. Plan, execute and harden your company’s IT security posture; and

  4. Hack targets of evaluation to gain insight on how hackers get in and out of your systems.

I. Introduction to Information Security

II. Introduction to Ethical Hacking and how it differs from “hacking”

III. Top Trends in Information Security 

IV. The Hacking Process (Kali Linux is part of the tool-set of the course)

    A. Gathering Information

          1. Find information about people

          2. Profile websites

          3. Retrieve lost information from websites

          4. Email Tracking

   B. Gaining Access

          1. Google Hacking

          2. Hacking Passwords

          3. Sniffers

          4. Malware and Ransomware

          5. Credit Card Fraud

          6. Identity Theft

          7. Piracy

          8. Web attacks

          9. DOS and DDOS

         10. Piracy

         11. WiFi Hacking and Wire-chalking

         12. Social Engineering

         13. Phishing

    C. Clearing Tracks

         1. How not to get caught

         2. Create Fake Identities

         3. Stay anonymous in the Web

    D. Mitigation Techniques

    E. Consultation. Developing your IT Security Plan.

Note: The course does not guarantee proficiency in the tools demonstrated in four sessions. It guarantees awareness of the hacking techniques and the knowledge of how to prevent such from happening. Templates will be provided. 

Laptop/Desktop Required Settings:

1. Mac or Windows  (Except Mac M1 as it will not work for the Virtual Machine)
2. i5 Intel CPU/Core
3. 8GB RAM
4. 500GB Harddisk
5. Video Cam
6. Mic
7. Internet Connection (Minimum 20MBPS

Mr. Chino Antonio S. Rodriguez is currently the Global Cybersecurity Fusion Center Manager for Cboe Philippines. He heads a team of Incident Responders that monitors, responds, and mitigates cyber attacks for Cboe Global Markets worldwide. Cboe Options Exchange is the world's largest options exchange with contracts focusing on individual equities, indexes, and interest rates globally.

He has been in cybersecurity professionally since 2006 but has been hacking since the 80s. He has held various managerial positions in IT Security, IT Infrastructure, Solutions Architecture, and Project Management for many companies at the forefront of cutting-edge technology.

Mr. Rodriguez holds a Master's degree from the Ateneo Graduate School of Business, major in Information Technology, and a Certification for Ethical Hacking from EC Council.

Register Now