How Secure your IT Infrastructure from Cyber Attack? What: - TopicsExpress



          

How Secure your IT Infrastructure from Cyber Attack? What: Certified Penetration Testing Engineer Training + EXAM When: September 15 to 20, 2014 – CEBU Venue Or October 13 to 17, 2014 – MANILA Venue Course Overview The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: 1.) Information gathering 2.) Scanning 3.) Enumeration 4.) Exploitation and 5.) Reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses’ network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. It’s very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve. With our proprietary penetration testing lab exercises, students will spend about 20 hours getting real-world penetration testing experience. Theyll know what they are learning and theyll know how to use it after course. Our instructors will also provide real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. The C) PTE’s foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach; we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. Upon Completion Students will: • Have knowledge to perform penetration test • Have knowledge to accurately report on their findings from examinations • Be ready to sit for the C)PTE Exam Who Should Attend The C) PTE is a course on penetration testing designed for those who already have a basic understanding of cyber security. We recommend an understanding of how computers are networked and how they interact with the internet (TCP/IP). Some of the tools we will use are only developed for Linux; therefor having experience with Linux is a plus. We recommend having the previously mentioned experience or you can prepare to take the course by completing the C) ISSO: Certified Information Systems Officer course as a prerequisite. People who are in or are going into the following professional roles will especially benefit from our course: Penetration Testing Consultant Security Analyst/Consultant Security Architect Chief Information Security Officer Security Auditor IT Management After you complete the C) PTE course and get certified, we recommend you to further develop your penetration testing skillset by being certified as a C) PTC: Certified Penetration Testing Consultant by taking the course and passing the 6 hour exam that will have you perform a penetration test that will really test what you know and can do! Mile2 certifications: 1. Accredited by the NSA CNSS 4011-4016 2. Maps to NIST (National Institute of Standards and Technology) Training Standards 3. Approved on the Department of Defense’s NICE NICCS (National Initiative for Cyber Security Careers and Studies) Training List CPE Credit Accreditation: All Mile2® courses can be submitted to (ISC)2, ISACA, SANS and other Professional organizations that require continuing professional education (CPE) credits. CPE credits are obtained by submitting a copy of your certificate of completion received in each mile2® kit. Why choose WOLRDTECH? Ans: Get MORE THAN What You Paid For • The ONLY Authorized Training Center of cyber security in the philippines authorized by Mile2 company a Cyber Security Training & Consulting. • We limit the number of participants in each course in order to maintain the quality of the training. • We have branded equipment’s like servers, cisco routers, switches, Firewall, & NAS storage to be used during the training. • Trainers are certified. (MCT, CCIE, CEH, MCITP, MCSA, MCSE, MCTS, LPI, Linux co-author, CCNA, CCNP, CCNA SECURITY, CCIP, CPTE, CDFE, CDRE, CSS, VCP5). • Trainers are experienced and expert of what they are teaching. • Willing to extend our days of training without additional fee. • We guide the students in their certification track path. • We evaluated the Trainer performance at the end of the training course. • Refer you in our partner companies for a Job. • Exam assessment. • We provide delightful foods. • Worldtech staff/trainers are friendly. • Worldtech is a God centered people. Looking forward to have business with you in the future. For questions or clarifications, please don’t hesitate to call or email us and we will be glad to assist you anytime. WORLDTECH INFORMATION SOLUTIONS,INC. Tel. nos.: PLDT: (032) 266 - 1744 Mobile: SUN: 09325071398 / TM: 09066214871 Email: worldtech.information.solutions@gmail Website: wisphil FB: wisphils@gmail Skype: worldtech.consultancy
Posted on: Fri, 05 Sep 2014 03:18:52 +0000

Trending Topics



Recently Viewed Topics




© 2015