They are accredited by E-Council.
Regarding their training, I have attended several Microsoft courses since 2006 and the facility is conducive for learning and the trainers are of course certified. I don't know about the CEH training, I haven't attended that yet but I know that they are offering it since I've been receiving invitations from lexysoft from time to time.
If you're interested, you may contact them directly. The number is 63 32 233 6350
Hi Guys,
For the month of June 2010, we will be having a CEH Training in CEBU.
You can now join our upcoming CEH(Certified Ethical Hacker) training
For reservation and other concerns pls
Call Bitshield Security Consulting, Inc.
at 632 840 2612 or 632 8938527 look for TES
or email marites@bitshieldconsulting.com
marites_norca23@yahoo.com
and we also offer other IT Security Trainings as follows:
1. Digital Forensics ( 2 Days)
Attendees will be guided through the process of conducting a forensic
investigation and will learn the principles surrounding the collection of
evidence, together with the forensic tools associated with forensic analysis.
2. Incident Response (2 Days)
Incident Response shows you both the technical administrative aspects of
building an effective incident response plan. You'll learn about the different
types of incidents and ways to respond to them, how to put together an incident
response team, what procedures to use, what tools there are for investigating
incidents, and where to find extensive online resources.
3. Ethical Hacking 1 & 2 (Part 1 – 2 Days & Part 2 – 2 Days)
This ethical hacking training course is a journey into the hacking mindset,
examining and practically applying the tools and techniques that hackers use.
4. CEH- Certified Ethical Hacker (5 Days)
A Certified Ethical Hacker is a skilled professional who understands and knows
how to look for the weaknesses and vulnerabilities in target systems and uses
the same knowledge and tools as a malicious hacker to protect your information
assets.
5. Security5 (1 Day)
Security 5 is an entry level certification for anyone interested in learning
computer networking and security basics. The Security 5 program gives
individuals Basic networking literacy skills to begin high end IT programs.
6. CHFI-Computer Hacker Forensic Investigator (5 Days)
Computer forensics enables the systematic and careful identification of evidence
in computer related crime and abuse cases. This may range from tracing the
tracks of a hacker through a client's systems, to tracing the originator of
defamatory emails, to recovering signs of fraud.
7. I.T. Security Awareness Program (1 Day)
Security awareness is the key aspect of security. The "people factor" is a key
to providing an adequate and appropriate level of security. People are the key,
yet also the weakest link. An employee with lack of knowledge could disclose
sensitive information if not aware of the security risks.
If you have any questions or need other IT Trainings/topics for your company,
please feel free to contact me.
Thank you.
Regards,
Marites Z. Norca
Bitshield Security Consulting, Inc.
Email: marites@bitshieldconsulting.com
marites_norca23@yahoo.com
URL:Home Page
Office No. 632 840 2612
Tel. No. 0908 1233693
Hi Guys,
For the month of June 2010, we will be having a CEH Training in CEBU.
You can now join our upcoming CEH(Certified Ethical Hacker) training
For reservation and other concerns pls
Call Bitshield Security Consulting, Inc.
at 632 840 2612 or 632 8938527 look for TES
or email marites@bitshieldconsulting.com
marites_norca23@yahoo.com
and we also offer other IT Security Trainings as follows:
1. Digital Forensics ( 2 Days)
Attendees will be guided through the process of conducting a forensic
investigation and will learn the principles surrounding the collection of
evidence, together with the forensic tools associated with forensic analysis.
2. Incident Response (2 Days)
Incident Response shows you both the technical administrative aspects of
building an effective incident response plan. You'll learn about the different
types of incidents and ways to respond to them, how to put together an incident
response team, what procedures to use, what tools there are for investigating
incidents, and where to find extensive online resources.
3. Ethical Hacking 1 & 2 (Part 1 – 2 Days & Part 2 – 2 Days)
This ethical hacking training course is a journey into the hacking mindset,
examining and practically applying the tools and techniques that hackers use.
4. CEH- Certified Ethical Hacker (5 Days)
A Certified Ethical Hacker is a skilled professional who understands and knows
how to look for the weaknesses and vulnerabilities in target systems and uses
the same knowledge and tools as a malicious hacker to protect your information
assets.
5. Security5 (1 Day)
Security 5 is an entry level certification for anyone interested in learning
computer networking and security basics. The Security 5 program gives
individuals Basic networking literacy skills to begin high end IT programs.
6. CHFI-Computer Hacker Forensic Investigator (5 Days)
Computer forensics enables the systematic and careful identification of evidence
in computer related crime and abuse cases. This may range from tracing the
tracks of a hacker through a client's systems, to tracing the originator of
defamatory emails, to recovering signs of fraud.
7. I.T. Security Awareness Program (1 Day)
Security awareness is the key aspect of security. The "people factor" is a key
to providing an adequate and appropriate level of security. People are the key,
yet also the weakest link. An employee with lack of knowledge could disclose
sensitive information if not aware of the security risks.
If you have any questions or need other IT Trainings/topics for your company,
please feel free to contact me.
Thank you.
Regards,
Marites Z. Norca
Bitshield Security Consulting, Inc.
Email: marites@bitshieldconsulting.com
marites_norca23@yahoo.com
URL:Home Page
Office No. 632 840 2612
Tel. No. 0908 1233693
Be a Certified Ethical Hacker...we have upcoming CEH Training in CEBU for the month of June 2010
![]()
Similar Threads |
|