SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Seminar on Ethical Hacking and Cyber Crime –
Get comprehensive Know-how in just one week!




                                     Introduced by your trusted security partner.
Education in information security –
made in Switzerland.
Education Services
                       Seminar on Ethical Hacking and Cyber Crime



                       Why attending this seminar
                       Throughout the world increasing numbers of governments              gally obtain government-sensitive information from a data-
                       and public authorities are relying on IT infrastructures to         base server or a file share.
                       perform a wide range of duties. Almost everything is inter-
                                                                                           It can take a second to steal a national secret; and it will cost
                       connected nowadays, and people in all positions are accus-
                                                                                           a high price. Ethical hacking brings the message home: if
                       tomed at shuttling information where it is needed.
                                                                                           cyber crime is so easy, and the tools to do it are at anybody’s
                       News reports on the alarming growth of information tech-            fingertips, then it pays to give more attention to the preven-
                       nology-related crimes have reached the general public.              tion of this new, often widely underestimated form of crime.
                       Some incidents have been widely publicised, resulting in an
                                                                                           Information is no longer concentrated in highly protected
                       overall impression of insecurity. This adds to the basic notion
                                                                                           repositories: it is everywhere. Risks must be clearly under-
                       that IT infrastructures are not 100% reliable, with systems
                                                                                           stood and evaluated – even at a technical level; routine
                       that crash, hosts that are unreachable, data that are corrupt-
                                                                                           penetration tests (also called “ethical hacking”) will improve
                       ed or lost.
                                                                                           the understanding of the concept of «risk»: it means finding
                       The truth is that data are not safe – whether the users sit in      the way to illegally access your data before the crooks out
                       their office, in a false feeling of security, or in a hotel room,   there find it on their own.
                       airport lounge or the office of a foreign partner. Specific
                                                                                           In five interesting and captivating days this course gives
                       security requirements apply everywhere, both in the appar-
                                                                                           attendees a solid understanding of the principles and prac-
                       ently friendly office space and in the open world. A deliber-
                                                                                           tice of ethical hacking. They will learn why and when to
                       ate criminal action can target information wherever it sits.
                                                                                           request a penetration test, what to look for, how to interact
                       Most present-day computer users do not have the least idea          with the specialist who will perform the test, how to inter-
                       of how easy it is to intercept a plain e-mail containing confi-     pret the results to build a better security for their informa-
                       dential information, to attack an application server, to ille-      tion assets.

www.infoguard.ch / crypto                                                                           Seminar on Ethical Hacking and Cyber Crime | Page 1
Seminar on Ethical Hacking and Cyber Crime


Crypto AG and its sister company InfoGuard AG            Seminar dates
have jointly developed a 5 day education pro-            The seminar dates can be found on the enclosed book-
gramme for the needs of governmental information         ing form or on our website: www.infoguard.ch/crypto/
security professionals.
                                                         Seminar language
Who should attend                                        English
Delegates from government and defence entities who
are responsible for initiating, implementing and main-   Seminar location
taining information security in their organisation.      InfoGuard AG education centre, Zug/Switzerland.

The seminar is open to everyone. On request it can be    Seminar Certificate
conducted as a private seminar on a date mutually        Each participant becomes an InfoGuard Certified Cyber
agreeable. Please ask for further information.           Crime Prevention Expert, and is awarded a formal
                                                         certificate.




Page 2 | Seminar on Ethical Hacking and Cyber Crime                                                              www.infoguard.ch / crypto
Participants will receive introduction on all relevant topics
                       with regard to a holistic approach to Ethical Hacking.



                       Attacks from the Internet to public services                    Attacks against data confidentiality
                       It is easier to attack what one can see, and knows best.        One day is spent in seeing how easy it is to tap existing
                       This usually means web applications, mail servers or DNS        connections, be it SSL connections to a webmail server
                       servers. In the first part of the course delegates will learn   from the office, or a remote Windows share to the server
                       at first to identify targets (information gathering, scan       back at the Ministry. A mobile user must never rely on
                       techniques etc), and then to seek for weaknesses and            third party security: the WiFi network at the hotel may
                       vulnerabilities (mail filter tests, DNS spoofing, manual        be protected by a password, but a hacker might inter-
                       and automated web checks etc).                                  cept it and capture important data that the user is ex-
                                                                                       changing with headquarters. Nothing is secure by
                       Attacks against the internal network with insider               default: a determined hacker can attack the LAN of an
                       help                                                            organisation with the malicious support of an insider.
                       Joining together technical ingenuity and workers’ good
                       faith, offers the largest success opportunities at the          Introduction to best defence security practice
                       lowest costs. One day is thus dedicated to examine              The closing module of the seminar will address informa-
                       attacks, some of which are heard of from the press:             tion and communications technology and its common
                       phishing, backdoors, inside-out attacks, social engineer-       weaknesses, leading the discussion to the security con-
                       ing, firewall rule evasion etc.                                 trols you can implement today to strengthen your pro-
                                                                                       tection. Practical and proven best defence measures are
                                                                                       the heart of this lesson.




www.infoguard.ch / crypto                                                                      Seminar on Ethical Hacking and Cyber Crime | Page 3
Seminar Agenda




Arrival

DAYS 1/2 Attacks from the Internet to public services

DAY 3       Attacks against the internal network with
            insider help

DAY 4       Attacks against data confidentiality

DAY 5       Introduction to best defence security
            practice

Departure




Page 4 | Seminar on Ethical Hacking and Cyber Crime     www.infoguard.ch / crypto
Days 1 and 2                          •   Phishing                              Days 5
                       Attacks from the Internet to          •   Installing and exploiting backdoors   Introduction to best defence
                       public services                       •   Inside-out attacks                    security practice
                       • Attack targets, aggressors and      •   Firewall rule evasion                 • Network security
                         methods                                                                       • Secure VPN
                       • Information gathering               Days 4                                    • Secure mobile computing
                       • IP address and port scan            Attacks against data confiden-            • Wireless LAN security
                       • Searching for vulnerabilities       tiality                                   • Secure E-Mail
                       • Performing tests and attacks        • Tapping information in a                • Secure personal devices (note-
                       • Manual and automated checks           networked environment                     book, workstation)
                       • Reporting                           • Man-in-the-middle attacks: tap-         • Secure telephony and facsimile
                                                               ping SSL connections from an              communication
                       Days 3                                  Internet Café                           • Key management
                       Attacks against the internal          • Attacking wireless networks in
                       network with insider help               semi-public environments (e.g.
                       • Preparing an attack: planning for     hotel)
                         obtaining insider help              • Sniffing in a switch-based environ-
                       • Social engineering and informa-       ment
                         tion gathering
                       • Performing the attack




www.infoguard.ch / crypto                                                                  Seminar on Ethical Hacking and Cyber Crime | Page 5
Seminar environment




                                                      Tutors
                                                      The skill transfer is of high quality, both in terms of sub-
                                                      ject matter and tuition. In addition to their technical or
                                                      scientific background, the tutors have many years of
                                                      practical experience in their specialist fields with regard
                                                      to information security and other ICT related areas. Their
                                                      extensive social and cultural skills guarantee a congenial
                                                      learning environment.

                                                      Seminar methodology
                                                      The seminar is a combination of presentations and work-
                                                      shop sessions including exercises and live demonstra-
                                                      tions.

                                                      Daily schedule
                                                      Monday to Friday
                                                      Morning          09.00 – 12.00 h
                                                      Lunch            12.00 – 13.30 h
                                                      Afternoon        13.30 – 16.30 h

                                                      Accommodation
                                                      Hotel booking can be arranged on request.



Page 6 | Seminar on Ethical Hacking and Cyber Crime                                                             www.infoguard.ch / crypto
Terms and conditions




                       Registration                            • No charge will be made if another      • It may become necessary for us to
                       Please complete the registration          person participates in the seminar       make alterations to the content,
                       form enclosed or online on our web-       on behalf of the absent partici-         speakers, timing, venue or date of
                       site www.infoguard.ch/crypto and          pant.                                    the event compared to the adver-
                       fax to +41 41 749 19 10 or mail to                                                 tised programme.
                       info@infoguard.ch. Your registration    Substitutions/Name Changes
                       will be confirmed in writing.           If you are unable to attend you may      Terms of Payment
                                                               nominate, in writing, another partic-    • Payments are due within 10 days
                       Cancellation                            ipant to take your place at any time       of the invoice date and not later
                       • All cancellations must be submit-     prior to the start of the seminar. Two     than the start of the seminar.
                         ted in writing.                       ore more participants may not            • In the event of a registration at
                       • Up to two weeks before the start      «share» a place at a seminar. Please       short notice, i.e. within one week,
                         of the seminar, 25% of the regis-     make separate bookings for each            the person participating in the
                         tration fee will be charged for       participant.                               seminar may be required to submit
                         administration.                                                                  proof of payment or to pay cash
                       • Up to one week before the start of    Alterations                                prior to the seminar start.
                         the seminar, 50% of the registra-     • InfoGuard AG reserves the right to
                         tion fee will be charged.               cancel the seminar due to an insuf-    Place of Jurisdiction
                       • In the week before the start of the     ficient number of registrations. In    The place of jurisdiction is Zug,
                         seminar, the full registration fee      such cases, any registration fees      Switzerland
                         will be charged.                        already paid will be fully refunded.




www.infoguard.ch / crypto                                                                   Seminar on Ethical Hacking and Cyber Crime | Page 7
Enjoy your stay in Switzerland




                                                         Your stay in Switzerland will be care-    InfoGuard AG –
                                                         fully prepared. Learning will be          Education in information security
                                                         made much easier thanks to a pleas-       «Made in Switzerland».
                                                         ant atmosphere and interesting,           InfoGuard AG is the preferred edu-
                                                         exciting leisure time. During this five   cation provider for information secu-
                                                         day seminar we will organize a cul-       rity. Its courses are geared to the
                                                         tural outing.                             needs of governmental and military
                                                                                                   organizations as well as public ad-
                                                         The small but lively town of Zug          ministrations.
                                                         (22’000 inhabitants) benefits from
                                                         being close to the Swiss business         Crypto AG –
                                                         metropolis of Zurich, and its interna-    To Remain Sovereign.
                                                         tional airport, and Lucerne, which        We have developed, manufactured
                                                         are both near at hand. It is situated     and implemented custom security
                                                         right by Lake Zug, and surrounded         solutions for over 55 years. You too
                                                         by typical Swiss hills and mountains.     can rely on the expertise and capa-
                      Basel                              The region is an excellent starting       bilities of Crypto AG – just like our
                                 Zurich
                                Zug                      point for excursions to the country’s     customers in over 130 countries.
                          Lucerne
              Berne
                                                         most interesting tourist attractions.
     Geneva

                                    Lugano




Page 8 | Seminar on Ethical Hacking and Cyber Crime                                                                www.infoguard.ch / crypto
Designed and given      InfoGuard AG              Introduced by your          Crypto AG
by the sister company   Feldstrasse 1             trusted security partner:   P.O. Box 460
of Crypto AG:           CH-6300 Zug                                           CH-6301 Zug/Switzerland
                        Switzerland                                           Phone +41 41 749 77 22
                        Phone +41 41 749 19 00                                Fax +41 41 741 22 72
                        Fax +41 41 749 19 10                                  crypto@crypto.ch
                        info@infoguard.ch                                     www.crypto.ch
                        www.infoguard.ch/crypto
© 2009 InfoGuard AG | 091113_IG_EHC_d0
A M E M B E R O F « T H E C RY P T O G R O U P »

Mais conteúdo relacionado

Mais procurados

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...Fabio Ghioni
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)CloudMask inc.
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatIBM Government
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpFabio Ghioni
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalJerome Chapolard
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 

Mais procurados (20)

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the Threat
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 

Destaque

Katalog kontour komplett
Katalog kontour komplettKatalog kontour komplett
Katalog kontour komplettlortegap
 
AJLPLuis Gómez y Rubén Pina
AJLPLuis Gómez y Rubén PinaAJLPLuis Gómez y Rubén Pina
AJLPLuis Gómez y Rubén PinaLugorak
 
Curación de contenidos
Curación de contenidosCuración de contenidos
Curación de contenidosIsa Gamer
 
Preventers Bitácoras ONDAS
Preventers Bitácoras ONDASPreventers Bitácoras ONDAS
Preventers Bitácoras ONDASIE Simona Duque
 
El arte en la nueva era
El arte en la nueva eraEl arte en la nueva era
El arte en la nueva erapmolinan
 
Enquesta ens respectem. presentació
Enquesta ens respectem. presentacióEnquesta ens respectem. presentació
Enquesta ens respectem. presentacióAngel López García
 
El verbo (1) enunciado y presente indicativo
El verbo (1)  enunciado y presente indicativoEl verbo (1)  enunciado y presente indicativo
El verbo (1) enunciado y presente indicativoNegrevernis Negrevernis
 
Informe Bandas y Bandidos
Informe Bandas y BandidosInforme Bandas y Bandidos
Informe Bandas y Bandidosvivianitavega
 
Hans Biomed Spine & Orthopedic
Hans Biomed  Spine & OrthopedicHans Biomed  Spine & Orthopedic
Hans Biomed Spine & OrthopedicJamieatHansUSA
 
Servicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLO
Servicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLOServicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLO
Servicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLOcemuflo
 
FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...
FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...
FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...Alexander Díaz García
 
La comunicación
La comunicaciónLa comunicación
La comunicacióncrc2002
 
VIDES Philippines Volunteers Foundation, Inc.
VIDES Philippines Volunteers Foundation, Inc.VIDES Philippines Volunteers Foundation, Inc.
VIDES Philippines Volunteers Foundation, Inc.srjojofma
 

Destaque (20)

TheReferralDatabase
TheReferralDatabaseTheReferralDatabase
TheReferralDatabase
 
Mumias tana eia_part7
Mumias tana eia_part7Mumias tana eia_part7
Mumias tana eia_part7
 
Katalog kontour komplett
Katalog kontour komplettKatalog kontour komplett
Katalog kontour komplett
 
Dossier 2014 Eventosfera profesionales y pymes
Dossier 2014 Eventosfera profesionales y pymesDossier 2014 Eventosfera profesionales y pymes
Dossier 2014 Eventosfera profesionales y pymes
 
AJLPLuis Gómez y Rubén Pina
AJLPLuis Gómez y Rubén PinaAJLPLuis Gómez y Rubén Pina
AJLPLuis Gómez y Rubén Pina
 
Curación de contenidos
Curación de contenidosCuración de contenidos
Curación de contenidos
 
Preventers Bitácoras ONDAS
Preventers Bitácoras ONDASPreventers Bitácoras ONDAS
Preventers Bitácoras ONDAS
 
El arte en la nueva era
El arte en la nueva eraEl arte en la nueva era
El arte en la nueva era
 
Enquesta ens respectem. presentació
Enquesta ens respectem. presentacióEnquesta ens respectem. presentació
Enquesta ens respectem. presentació
 
El verbo (1) enunciado y presente indicativo
El verbo (1)  enunciado y presente indicativoEl verbo (1)  enunciado y presente indicativo
El verbo (1) enunciado y presente indicativo
 
Informe Bandas y Bandidos
Informe Bandas y BandidosInforme Bandas y Bandidos
Informe Bandas y Bandidos
 
Promo opcion 2016
Promo opcion 2016Promo opcion 2016
Promo opcion 2016
 
Hans Biomed Spine & Orthopedic
Hans Biomed  Spine & OrthopedicHans Biomed  Spine & Orthopedic
Hans Biomed Spine & Orthopedic
 
Servicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLO
Servicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLOServicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLO
Servicio de asesoramiento a Emprendedores - Desayuno de Trabajo CEM UFLO
 
La metástasis
La metástasisLa metástasis
La metástasis
 
FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...
FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...
FALSEDAD IDEOLÓGICA EN DOCUMENTO PÚBLICO RAD. 19930. ABRIL 21 DE 2004. MP. MA...
 
La comunicación
La comunicaciónLa comunicación
La comunicación
 
Historia de Dokeos
Historia de DokeosHistoria de Dokeos
Historia de Dokeos
 
VIDES Philippines Volunteers Foundation, Inc.
VIDES Philippines Volunteers Foundation, Inc.VIDES Philippines Volunteers Foundation, Inc.
VIDES Philippines Volunteers Foundation, Inc.
 
Bci report
Bci reportBci report
Bci report
 

Semelhante a Ehc brochure

Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last standGeorge Delikouras
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecuritySvetlana Belyaeva
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-studyhomeworkping4
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveAvinantaTarigan
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 

Semelhante a Ehc brochure (20)

Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 

Mais de Ehab El Barbary

Mais de Ehab El Barbary (20)

Train the trainer attendance certificate
Train the trainer attendance certificateTrain the trainer attendance certificate
Train the trainer attendance certificate
 
Train the trainer-pass certificate
Train the trainer-pass certificateTrain the trainer-pass certificate
Train the trainer-pass certificate
 
Fire extinguisher training
Fire extinguisher trainingFire extinguisher training
Fire extinguisher training
 
Fire pumps
Fire pumpsFire pumps
Fire pumps
 
Fire life
Fire lifeFire life
Fire life
 
Customer services.
Customer services.Customer services.
Customer services.
 
Criss mangment
Criss mangmentCriss mangment
Criss mangment
 
Contents administration & general
Contents   administration & generalContents   administration & general
Contents administration & general
 
Certficate
CertficateCertficate
Certficate
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
Building evac flow chart
Building evac flow chartBuilding evac flow chart
Building evac flow chart
 
Bomb threatmanagement
Bomb threatmanagementBomb threatmanagement
Bomb threatmanagement
 
Atf bomb threats
Atf bomb threatsAtf bomb threats
Atf bomb threats
 
Appendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spaAppendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spa
 
Apartment patrol scan last
Apartment patrol scan lastApartment patrol scan last
Apartment patrol scan last
 
Alert levels to staff bomb threat.doc11
Alert levels   to staff bomb threat.doc11Alert levels   to staff bomb threat.doc11
Alert levels to staff bomb threat.doc11
 
Action plan for the new cctv operators
Action plan for the new cctv operatorsAction plan for the new cctv operators
Action plan for the new cctv operators
 
Action plan for ss
Action plan for ssAction plan for ss
Action plan for ss
 
Accidenclub car
Accidenclub carAccidenclub car
Accidenclub car
 
444444444444
444444444444444444444444
444444444444
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Ehc brochure

  • 1. Seminar on Ethical Hacking and Cyber Crime – Get comprehensive Know-how in just one week! Introduced by your trusted security partner.
  • 2. Education in information security – made in Switzerland.
  • 3. Education Services Seminar on Ethical Hacking and Cyber Crime Why attending this seminar Throughout the world increasing numbers of governments gally obtain government-sensitive information from a data- and public authorities are relying on IT infrastructures to base server or a file share. perform a wide range of duties. Almost everything is inter- It can take a second to steal a national secret; and it will cost connected nowadays, and people in all positions are accus- a high price. Ethical hacking brings the message home: if tomed at shuttling information where it is needed. cyber crime is so easy, and the tools to do it are at anybody’s News reports on the alarming growth of information tech- fingertips, then it pays to give more attention to the preven- nology-related crimes have reached the general public. tion of this new, often widely underestimated form of crime. Some incidents have been widely publicised, resulting in an Information is no longer concentrated in highly protected overall impression of insecurity. This adds to the basic notion repositories: it is everywhere. Risks must be clearly under- that IT infrastructures are not 100% reliable, with systems stood and evaluated – even at a technical level; routine that crash, hosts that are unreachable, data that are corrupt- penetration tests (also called “ethical hacking”) will improve ed or lost. the understanding of the concept of «risk»: it means finding The truth is that data are not safe – whether the users sit in the way to illegally access your data before the crooks out their office, in a false feeling of security, or in a hotel room, there find it on their own. airport lounge or the office of a foreign partner. Specific In five interesting and captivating days this course gives security requirements apply everywhere, both in the appar- attendees a solid understanding of the principles and prac- ently friendly office space and in the open world. A deliber- tice of ethical hacking. They will learn why and when to ate criminal action can target information wherever it sits. request a penetration test, what to look for, how to interact Most present-day computer users do not have the least idea with the specialist who will perform the test, how to inter- of how easy it is to intercept a plain e-mail containing confi- pret the results to build a better security for their informa- dential information, to attack an application server, to ille- tion assets. www.infoguard.ch / crypto Seminar on Ethical Hacking and Cyber Crime | Page 1
  • 4. Seminar on Ethical Hacking and Cyber Crime Crypto AG and its sister company InfoGuard AG Seminar dates have jointly developed a 5 day education pro- The seminar dates can be found on the enclosed book- gramme for the needs of governmental information ing form or on our website: www.infoguard.ch/crypto/ security professionals. Seminar language Who should attend English Delegates from government and defence entities who are responsible for initiating, implementing and main- Seminar location taining information security in their organisation. InfoGuard AG education centre, Zug/Switzerland. The seminar is open to everyone. On request it can be Seminar Certificate conducted as a private seminar on a date mutually Each participant becomes an InfoGuard Certified Cyber agreeable. Please ask for further information. Crime Prevention Expert, and is awarded a formal certificate. Page 2 | Seminar on Ethical Hacking and Cyber Crime www.infoguard.ch / crypto
  • 5. Participants will receive introduction on all relevant topics with regard to a holistic approach to Ethical Hacking. Attacks from the Internet to public services Attacks against data confidentiality It is easier to attack what one can see, and knows best. One day is spent in seeing how easy it is to tap existing This usually means web applications, mail servers or DNS connections, be it SSL connections to a webmail server servers. In the first part of the course delegates will learn from the office, or a remote Windows share to the server at first to identify targets (information gathering, scan back at the Ministry. A mobile user must never rely on techniques etc), and then to seek for weaknesses and third party security: the WiFi network at the hotel may vulnerabilities (mail filter tests, DNS spoofing, manual be protected by a password, but a hacker might inter- and automated web checks etc). cept it and capture important data that the user is ex- changing with headquarters. Nothing is secure by Attacks against the internal network with insider default: a determined hacker can attack the LAN of an help organisation with the malicious support of an insider. Joining together technical ingenuity and workers’ good faith, offers the largest success opportunities at the Introduction to best defence security practice lowest costs. One day is thus dedicated to examine The closing module of the seminar will address informa- attacks, some of which are heard of from the press: tion and communications technology and its common phishing, backdoors, inside-out attacks, social engineer- weaknesses, leading the discussion to the security con- ing, firewall rule evasion etc. trols you can implement today to strengthen your pro- tection. Practical and proven best defence measures are the heart of this lesson. www.infoguard.ch / crypto Seminar on Ethical Hacking and Cyber Crime | Page 3
  • 6. Seminar Agenda Arrival DAYS 1/2 Attacks from the Internet to public services DAY 3 Attacks against the internal network with insider help DAY 4 Attacks against data confidentiality DAY 5 Introduction to best defence security practice Departure Page 4 | Seminar on Ethical Hacking and Cyber Crime www.infoguard.ch / crypto
  • 7. Days 1 and 2 • Phishing Days 5 Attacks from the Internet to • Installing and exploiting backdoors Introduction to best defence public services • Inside-out attacks security practice • Attack targets, aggressors and • Firewall rule evasion • Network security methods • Secure VPN • Information gathering Days 4 • Secure mobile computing • IP address and port scan Attacks against data confiden- • Wireless LAN security • Searching for vulnerabilities tiality • Secure E-Mail • Performing tests and attacks • Tapping information in a • Secure personal devices (note- • Manual and automated checks networked environment book, workstation) • Reporting • Man-in-the-middle attacks: tap- • Secure telephony and facsimile ping SSL connections from an communication Days 3 Internet Café • Key management Attacks against the internal • Attacking wireless networks in network with insider help semi-public environments (e.g. • Preparing an attack: planning for hotel) obtaining insider help • Sniffing in a switch-based environ- • Social engineering and informa- ment tion gathering • Performing the attack www.infoguard.ch / crypto Seminar on Ethical Hacking and Cyber Crime | Page 5
  • 8. Seminar environment Tutors The skill transfer is of high quality, both in terms of sub- ject matter and tuition. In addition to their technical or scientific background, the tutors have many years of practical experience in their specialist fields with regard to information security and other ICT related areas. Their extensive social and cultural skills guarantee a congenial learning environment. Seminar methodology The seminar is a combination of presentations and work- shop sessions including exercises and live demonstra- tions. Daily schedule Monday to Friday Morning 09.00 – 12.00 h Lunch 12.00 – 13.30 h Afternoon 13.30 – 16.30 h Accommodation Hotel booking can be arranged on request. Page 6 | Seminar on Ethical Hacking and Cyber Crime www.infoguard.ch / crypto
  • 9. Terms and conditions Registration • No charge will be made if another • It may become necessary for us to Please complete the registration person participates in the seminar make alterations to the content, form enclosed or online on our web- on behalf of the absent partici- speakers, timing, venue or date of site www.infoguard.ch/crypto and pant. the event compared to the adver- fax to +41 41 749 19 10 or mail to tised programme. info@infoguard.ch. Your registration Substitutions/Name Changes will be confirmed in writing. If you are unable to attend you may Terms of Payment nominate, in writing, another partic- • Payments are due within 10 days Cancellation ipant to take your place at any time of the invoice date and not later • All cancellations must be submit- prior to the start of the seminar. Two than the start of the seminar. ted in writing. ore more participants may not • In the event of a registration at • Up to two weeks before the start «share» a place at a seminar. Please short notice, i.e. within one week, of the seminar, 25% of the regis- make separate bookings for each the person participating in the tration fee will be charged for participant. seminar may be required to submit administration. proof of payment or to pay cash • Up to one week before the start of Alterations prior to the seminar start. the seminar, 50% of the registra- • InfoGuard AG reserves the right to tion fee will be charged. cancel the seminar due to an insuf- Place of Jurisdiction • In the week before the start of the ficient number of registrations. In The place of jurisdiction is Zug, seminar, the full registration fee such cases, any registration fees Switzerland will be charged. already paid will be fully refunded. www.infoguard.ch / crypto Seminar on Ethical Hacking and Cyber Crime | Page 7
  • 10. Enjoy your stay in Switzerland Your stay in Switzerland will be care- InfoGuard AG – fully prepared. Learning will be Education in information security made much easier thanks to a pleas- «Made in Switzerland». ant atmosphere and interesting, InfoGuard AG is the preferred edu- exciting leisure time. During this five cation provider for information secu- day seminar we will organize a cul- rity. Its courses are geared to the tural outing. needs of governmental and military organizations as well as public ad- The small but lively town of Zug ministrations. (22’000 inhabitants) benefits from being close to the Swiss business Crypto AG – metropolis of Zurich, and its interna- To Remain Sovereign. tional airport, and Lucerne, which We have developed, manufactured are both near at hand. It is situated and implemented custom security right by Lake Zug, and surrounded solutions for over 55 years. You too by typical Swiss hills and mountains. can rely on the expertise and capa- Basel The region is an excellent starting bilities of Crypto AG – just like our Zurich Zug point for excursions to the country’s customers in over 130 countries. Lucerne Berne most interesting tourist attractions. Geneva Lugano Page 8 | Seminar on Ethical Hacking and Cyber Crime www.infoguard.ch / crypto
  • 11. Designed and given InfoGuard AG Introduced by your Crypto AG by the sister company Feldstrasse 1 trusted security partner: P.O. Box 460 of Crypto AG: CH-6300 Zug CH-6301 Zug/Switzerland Switzerland Phone +41 41 749 77 22 Phone +41 41 749 19 00 Fax +41 41 741 22 72 Fax +41 41 749 19 10 crypto@crypto.ch info@infoguard.ch www.crypto.ch www.infoguard.ch/crypto
  • 12. © 2009 InfoGuard AG | 091113_IG_EHC_d0 A M E M B E R O F « T H E C RY P T O G R O U P »