Home Contact Us
 


INFORMATION TECHNOLOGIES SECURITY PROGRAM

OSSA(tm)OSSA(tm)

Click here for detail course outlinetartshem

OSSA(tm)

With its emphasis on the use of Open-Source-based methodologies and tools to achieve the objective of network and server security for organizations, the OSSA™ teaches a vendor-independent approach to practical issues surrounding IT security and is geared towards equipping participants with the knowledge and skills necessary to secure their organizations from both internal and external threats. The internationally-accredited program is an Enterprise-level, IT-Security Certification that is designed specially for the following groups of people:

  • Technical staff who are interested in learning more about real-world, practical IT Security from technical, procedural and legal standpoints, who are responsible for the security of their organization's infrastructure or who are interested in a career in IT Security.
  • IT-Security Professionals looking for practical and hands-on technical enterprise-level security training & certification.
  • IT Professionals who are looking to get into the IT-Security industry.
  • Those looking for Enterprise-relevant IT-Security training which use practical lab-based certification training and examination that will not devalue over time, unlike courses with theory-only exams.

OSWA(tm)rtshem

The Organizational Systems Wireless Auditor™ (OSWA™) is focuses primarily on providing attendees with the technical knowledge, methodology and skills to executing a wireless audit or penetration test. Unlike other wireless courses which are limited to administration"-style access-point-centric viewpoints and are not designed by wireless security professionals, this program is designed from the ground up to teach wireless security from the starting point of understanding the fundamentals of Radio Frequency (RF) and RF Spectrum Analysis, through to understanding the IEEE 802.11 specification and how to analyze information contained in 802.11 packet dumps before arriving at 802.11-based security concerns such as how to penetrate wireless LANs and going on to advanced methods of auditing wireless networks by targeting wireless clients, as well as how to build your own wireless tools to augment your wireless auditing capabilities. In addition, it covers how to audit other wireless technologies such as Bluetooth and RFID.

While the programme syllabus should be used to determine if this programme is appropriate for the attendee based on their current skills and requirements, all attendees will go away with the following:
• A solid understanding about Radio Frequency (RF) fundamentals.
• The ability to isolate and analyze wireless networks from Layer 1 to Layer 3.
• The knowledge of what preparations have to be made prior to conducting a wireless security audit.
• Comprehensive technical understanding of how to practically execute a wireless security audit.
• How to audit wireless networks using a variety of tools, including DIY tools.
• The ability to recommend countermeasures based on wireless audit results.
• The legal implications of wireless security auditing.

OSWISP(tm)OSWISP(tm)OSWISP(tm)

Click here for detail course outline

OSSA(tm)

This OSWiSP™ teaches a vendor-independent approach to practical deployment and securing of both private and public Wireless Local Area Networks (WLANs) based on the Practical Wireless Deployment Methodology (PWDM).
This training program will ensure that you are able to professionally and competently secure and maintain wireless networks irrespective of the hardware used.

The OSWiSP™ covers practical issues which impact WLAN operational security and deployment such as building-management relations, site survey, project scoping, cable-plant management, post-deployment monitoring and operations, etc.

It provides in-depth technical coverage of 802.11 security issues and hands-on coursework on how to deploy all manner of 802.11i-based setups (WEP, WPAPSK, WPA/2), as well as integrating them with VPNoL for multilayer-defense WLAN deployments. Simply put, participants will come away with the following:

  • a top-to-bottom practical understanding of the real-life issues facing any type of wireless deployment;
  • the ability to advise their organizations about the
    various security wireless security risks and how to
    mitigate them;
  • the skills to build, upgrade and integrate a private or public WLAN of varying security levels into any existing network without just relying on vendor-equipmentspecific security features;
  • the skills to set up and maintain a monitoring and
    management overlay to manage the WLAN postdeployment.

This programme is extremely heavy on practical

[ click here for information on HRDF SBL Claim Scheme ]

MY Office : 36-1, Plaza Puchong, Jalan Puchong Mesra 1, 58200 Kuala Lumpur, Malaysia. Tel:+603-8071 1300 fax:+603-8071 1400
SG Office : 259, Onan Road, Singapore 424651. Tel: +65-6468 3325 Fax: +65-6764 5646