IT Security loopholes + Systems Protection
Common Security Loopholes in your IT Systems and Remedies
All Major Vulnerable Areas
With Many Hands On Demo
How Outsiders Gain Information about You via Whois, IP Scanning, Port Scanning, Network Scanning, Google Hack, Security Camera Hack, etc
How Anti-Virus and Firewalls Help Secure your Desktop and PCs from external intrusion as well as how some of these Viruses, Trojans & Spywares work
How your Passwords can be Cracked from the outside including by both internal and external parties
Most Common Security Risks
. This workshop is specifically designed to provide the right knowledge for IT executives to explore the various means that an intruder has to gain access into your IT . . Networks and Computers. The main areas covered are Server, Internet, Desktops, Email as well as Wireless Access. It will further investigate the main weaknesses in each of these areas which most IT personnel are seldom aware of.
. One of the key features about this workshop is that it provides insights onto how a Hacker gather information as well as penetrate into your systems. We believe that the best way to understand security is by learning from the perspective of an Ethical Hacker.
. This workshop will explore the various means that an intruder has, to gain access to computer resources. It will investigate weaknesses by discussing the theoretical background behind, and whenever possible, actually performing the attack during the workshop.
. Besides learning about how hackers and intruders work, the workshop also cover the security aspects of your Servers and PCs including valuable advise on how to setup a secure systems, advice on equipment and software you can use to strengthen your systems security as well as various Intrusion Protection Systems (IPS). Many areas concerning web security in particular internet risks and social media risks will also be covered.
. Upon completion of this workshop, you will be well-equipped with all the knowledge your need to keep your IT Systems secure.
Interesting Project Covered
Creating Backdoors in Windows login page
Creating Phishing pages of popular websites
Sending Fake Emails and its counter measures
Creating simple viruses and its protection
Hiding any secret data behind an Image
Generate most secure passwords
*Depending on the participant background, trainer may choose other projects
Who Should Attend?
Contact us with the form below for any inquiries!