kdb
[Top] [All Lists]

Defend the Network by Attacking It

To: kdb@xxxxxxxxxxx
Subject: Defend the Network by Attacking It
From: "IT Security Event" <chua.mi@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Date: Tue, 22 Apr 2014 12:17:14 +0800
Delivered-to: kdb@xxxxxxxxxxx
Reply-to: amy.c@xxxxxxxxxxxxxxxx

Defend the Network by Attacking It!

Top Emerging Threats, Practice Hacking and the Defensive Techniques to Deploy to Mitigate the Risk of Attack

16 – 17 June 2014, Singapore

Dear Executive,

 

Workshop  Overview:

 

In this two-day workshop we will attack systems and networks at all segments, following each attack we will apply security controls and defensive measures to eliminate or mitigate the attack. The attack will first be demonstrated, and then YOU will perform it!

 

We will compromise machines, and then perform a post-mortem of the compromise, so you fully understand how it happened and more importantly how to counter it. The defensive methods deployed will block up to 90% of the attacks you hear about in the news, you will learn measures to mitigate the risk of the other 10% should you ever be targeted with those.

 

About the Trainer:

 

  Leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years

  Conducted over 500 security assessments across the global

  Worked as both software and systems engineer on a variety of Department of Defense

  Member of the project to bring Internet access to ships at sea

  Past clients include: United States Navy, Federal Reserve Bank, Ernst and Young, Deloitte and Touche, Cybersecurity Malaysia, Oman LNG, HSBC, Citibank, Saudi Aramco, etc…

 

Testimonials:

 

“Every facet of the course was exceptional, the instructor’s knowledge of the material showed with the precision of the presentation.” ~ Senior Engineer

 

“Best instructor I have ever had.” ~ Senior Support Analyst

 

Click Here to Request for Defend Network  Brochure

Other Event:

Live Mobile Application Hacking Lab
2 – 4 June 2014 · Kuala Lumpur, Malaysia

 

Why You Should Attend

 

Attending this course will give you the critical knowledge and skills to learn hacking techniques commonly used to breach and exploit corporate networks. Understanding how such hacking is done is crucial to take on countermeasures to defend the organizations’ security systems. This course enables you to identify vulnerabilities in networks, operations systems and applications and also provides defensive measures that can be taken to avoid such attacks. Furthermore, a section on mobile forensics will provide delegates with essential data recovery skills and possibly help to deter cyber-crime.

 

 

Click Here to Request for Mobile Hacking Brochure

 

To request for full agenda of any of the events, please contact our Marketing Team (Registration).

Email: amy.c@xxxxxxxxxxxxxxxx or amyc.mkt@xxxxxxxxx.

Name: Amy Chua  Tel: +65 6825 9619

This email is sent to kdb@xxxxxxxxxxx. We apologize if this email reached you without your consent ~ 
To remove from our mailing list related to IT only,
CLICK HERE
To remove from our mailing list, CLICK HERE

 

<Prev in Thread] Current Thread [Next in Thread>
  • Defend the Network by Attacking It, IT Security Event <=