Page 3 of 13 FirstFirst 123456 ... LastLast
Results 21 to 30 of 127
  1. #21

    Quote Originally Posted by cliff_drew View Post
    Are they accredited by E-Council?
    Of course

    Quote Originally Posted by 2tdruid View Post
    I used to work for informatics... I'm pretty sure informatics is offering this course.
    No they don't. Informatics Singapore does

  2. #22
    C.I.A. cliff_drew's Avatar
    Join Date
    Oct 2008
    Gender
    Male
    Posts
    4,571
    Blog Entries
    2
    Quote Originally Posted by cliff_drew View Post
    Are they accredited by E-Council?
    Quote Originally Posted by personalmgt View Post
    Of course

    How about their training? Care to share your experience?

  3. #23
    Quote Originally Posted by cliff_drew View Post
    How about their training? Care to share your experience?
    They are accredited by E-Council.

    Regarding their training, I have attended several Microsoft courses since 2006 and the facility is conducive for learning and the trainers are of course certified. I don't know about the CEH training, I haven't attended that yet but I know that they are offering it since I've been receiving invitations from lexysoft from time to time.

    If you're interested, you may contact them directly. The number is 63 32 233 6350

  4. #24
    daghan na diri sa cebu na CEH... hmm..

  5. #25
    Hi Guys,

    For the month of June 2010, we will be having a CEH Training in CEBU.

    You can now join our upcoming CEH(Certified Ethical Hacker) training

    For reservation and other concerns pls
    Call Bitshield Security Consulting, Inc.
    at 632 840 2612 or 632 8938527 look for TES
    or email marites@bitshieldconsulting.com
    marites_norca23@yahoo.com




    and we also offer other IT Security Trainings as follows:

    1. Digital Forensics ( 2 Days)
    Attendees will be guided through the process of conducting a forensic
    investigation and will learn the principles surrounding the collection of
    evidence, together with the forensic tools associated with forensic analysis.

    2. Incident Response (2 Days)
    Incident Response shows you both the technical administrative aspects of
    building an effective incident response plan. You'll learn about the different
    types of incidents and ways to respond to them, how to put together an incident
    response team, what procedures to use, what tools there are for investigating
    incidents, and where to find extensive online resources.

    3. Ethical Hacking 1 & 2 (Part 1 – 2 Days & Part 2 – 2 Days)
    This ethical hacking training course is a journey into the hacking mindset,
    examining and practically applying the tools and techniques that hackers use.

    4. CEH- Certified Ethical Hacker (5 Days)
    A Certified Ethical Hacker is a skilled professional who understands and knows
    how to look for the weaknesses and vulnerabilities in target systems and uses
    the same knowledge and tools as a malicious hacker to protect your information
    assets.

    5. Security5 (1 Day)
    Security 5 is an entry level certification for anyone interested in learning
    computer networking and security basics. The Security 5 program gives
    individuals Basic networking literacy skills to begin high end IT programs.

    6. CHFI-Computer Hacker Forensic Investigator (5 Days)
    Computer forensics enables the systematic and careful identification of evidence
    in computer related crime and abuse cases. This may range from tracing the
    tracks of a hacker through a client's systems, to tracing the originator of
    defamatory emails, to recovering signs of fraud.

    7. I.T. Security Awareness Program (1 Day)
    Security awareness is the key aspect of security. The "people factor" is a key
    to providing an adequate and appropriate level of security. People are the key,
    yet also the weakest link. An employee with lack of knowledge could disclose
    sensitive information if not aware of the security risks.

    If you have any questions or need other IT Trainings/topics for your company,
    please feel free to contact me.



    Thank you.


    Regards,


    Marites Z. Norca
    Bitshield Security
    Consulting, Inc.
    Email: marites@bitshieldconsulting.com
    marites_norca23@yahoo.com
    URL:Home Page
    Office No. 632 840 2612
    Tel. No. 0908 1233693

  6. #26
    Hi Guys,

    For the month of June 2010, we will be having a CEH Training in CEBU.

    You can now join our upcoming CEH(Certified Ethical Hacker) training

    For reservation and other concerns pls
    Call Bitshield Security Consulting, Inc.
    at 632 840 2612 or 632 8938527 look for TES
    or email marites@bitshieldconsulting.com
    marites_norca23@yahoo.com




    and we also offer other IT Security Trainings as follows:

    1. Digital Forensics ( 2 Days)
    Attendees will be guided through the process of conducting a forensic
    investigation and will learn the principles surrounding the collection of
    evidence, together with the forensic tools associated with forensic analysis.

    2. Incident Response (2 Days)
    Incident Response shows you both the technical administrative aspects of
    building an effective incident response plan. You'll learn about the different
    types of incidents and ways to respond to them, how to put together an incident
    response team, what procedures to use, what tools there are for investigating
    incidents, and where to find extensive online resources.

    3. Ethical Hacking 1 & 2 (Part 1 – 2 Days & Part 2 – 2 Days)
    This ethical hacking training course is a journey into the hacking mindset,
    examining and practically applying the tools and techniques that hackers use.

    4. CEH- Certified Ethical Hacker (5 Days)
    A Certified Ethical Hacker is a skilled professional who understands and knows
    how to look for the weaknesses and vulnerabilities in target systems and uses
    the same knowledge and tools as a malicious hacker to protect your information
    assets.

    5. Security5 (1 Day)
    Security 5 is an entry level certification for anyone interested in learning
    computer networking and security basics. The Security 5 program gives
    individuals Basic networking literacy skills to begin high end IT programs.

    6. CHFI-Computer Hacker Forensic Investigator (5 Days)
    Computer forensics enables the systematic and careful identification of evidence
    in computer related crime and abuse cases. This may range from tracing the
    tracks of a hacker through a client's systems, to tracing the originator of
    defamatory emails, to recovering signs of fraud.

    7. I.T. Security Awareness Program (1 Day)
    Security awareness is the key aspect of security. The "people factor" is a key
    to providing an adequate and appropriate level of security. People are the key,
    yet also the weakest link. An employee with lack of knowledge could disclose
    sensitive information if not aware of the security risks.

    If you have any questions or need other IT Trainings/topics for your company,
    please feel free to contact me.



    Thank you.


    Regards,


    Marites Z. Norca
    Bitshield Security
    Consulting, Inc.
    Email: marites@bitshieldconsulting.com
    marites_norca23@yahoo.com
    URL:Home Page
    Office No. 632 840 2612
    Tel. No. 0908 1233693

  7. #27

  8. #28

  9. #29
    what is the cost for all these?

  10. #30
    Be a Certified Ethical Hacker...we have upcoming CEH Training in CEBU for the month of June 2010


  11.    Advertisement

Page 3 of 13 FirstFirst 123456 ... LastLast

Similar Threads

 
  1. Replies: 12
    Last Post: 08-03-2011, 10:38 AM
  2. Certified Ethical Hacker Plus
    By Ronald in forum Networking & Internet
    Replies: 5
    Last Post: 10-20-2010, 06:37 PM
  3. Certified Ethical Hacker Plus
    By Ronald in forum Networking & Internet
    Replies: 4
    Last Post: 10-04-2010, 03:33 PM
  4. Any1 want to catch a hacker?
    By muzikfreakah in forum Websites & Multimedia
    Replies: 116
    Last Post: 07-27-2006, 08:58 AM
  5. gloryhunter <--- How to Catch a Fake Hacker
    By rvyne in forum Websites & Multimedia
    Replies: 170
    Last Post: 05-30-2005, 07:02 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
about us
We are the first Cebu Online Media.

iSTORYA.NET is Cebu's Biggest, Southern Philippines' Most Active, and the Philippines' Strongest Online Community!
follow us
#top