Saturday, December 24, 2011

THIS IS A GREAT ONE TIME OFFER, IT MAY NOT BE HERE TOMORROW!

TUTORIAL VIDEOS ON CISA [CERTIFIED INFORMATION SYSTEMS AUDITOR]

topics covered                                                                                                                     
  1. Introduction  to CISA     
  2. The Information System Audit Process [ parts 1 and 2]
  3. The information Technology Governance  [ parts 1,2 and 3]
  4. Systems and Infrastructure Life Cycle Management [parts 1,2 and 3]
  5.  IT Service Delivery and Support  [parts 1,2 and 3]
  6.  Protection of Information  Assets [parts 1, 2 , 3,4 and 5]
  7.  Disaster Recovery and Business Continuity [parts 1 and 2]                                   
Total running time of over 9HRS

TUTORIAL VIDEOS ON CISM [CERTIFIED INFORMATION SYSTEMS MANAGEMENT ]

topics covered

  1. Introduction to CISM
  2. Information Security Governance  [ parts 1,2 and 3]
  3. Risk Management [parts 1,2 and 3]
  4. Information Security Program Development [parts 1,2 and 3]
  5. Security Programme Management [parts 1,2 and 3]
  6. Incident Management and Response [parts 1 and 2]
                   TOTAL RUNNING TIME OF OVER 7HRS


 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL { CISSP}

topics covered;  

  1.  Introduction to CISSP
  2. Basics of Access Control
  3. Advanced Access Control
  4. Access Control Administration
  5. Security Models
  6. Authentication 
  7. Access Control Methods
  8. Access Attacks
  9. Penetration Testing
  10. OSI Model
  11. Secure Topology
  12. IP Security
  13. Remote Access
  14. Network Security Devices
  15. Network Security Protocols
  16. Wide Area Network Technologies
  17. Security Techniques
  18. Email Security
  19. Phone Security
  20. Security Controls
  21. Web Vulnerabilities
  22. Physical Media
  23. Security Management Concepts
  24. Security Policy
  25. Protection mechanisms
  26.  Change Control
  27. Data Classification
  28. Risk Management
  29. Wireless Security
  30. Roles and Responsibilities
  31. Security Awareness
  32. Database Basics
  33. Database Concepts
  34. Data Storage
  35. Artificial Intelligence
  36. System Development Life cycle
  37. Security Control Architecture
  38. Computer Design
  39. Malicious Code Basics
  40. Malicious Code Advanced
  41. Web Enhancements
  42. Application and System Attacks
  43. Cryptography Basics
  44. Cryptography Algorithm
  45. Cryptography  Strength
  46. Key Management
  47. Message Authentication
  48. Secret Key
  49. Public Key
  50. PKI
  51. Cryptography Attacks
  52. Computer Processing
  53. Security Architecture Concepts
  54. Evaluation Criteria
  55. Security Model Principles
  56. Trusted Computing Base
  57. Security Model Threats
  58. Administrative Management
  59. Anti-Virus Management
  60. Sensitive Information Handling
  61. Control Types
  62. Machine Types
  63. Resource Protection
  64. Auditing
  65. Audit Trails
  66. Monitoring
  67. Intrusion Detection
  68. Negative Actions
  69. Business Continuity
  70. Information System Back-up
  71. Availability
  72. Recovery Techniques
  73. RAID
  74. Emergency Response
  75. Types of Laws
  76. Information Security Laws
  77. Investigations
  78. Evidence
  79. Computer Crime
  80. Incident Handling
  81. Ethics
  82. Facility Requirements
  83. Environmental Safety
  84. Physical Threats                                    
TOTAL RUNNING TIME IS OVER 40 HRS

                                        BONUS PACKAGE

CERTIFIED ETHICAL HACKING { CEH } 

topics covered   

  1.  Introduction
  2. Hacker Terms
  3. Hacker Procedures
  4. Using VMware
  5. Using Linux
  6. Passive Intelligence Gathering {parts 1 and 2}
  7. Social Engineering
  8. Network Reconnaissance [parts 1 and 2]
  9. Service Identification  and Enumeration
  10. Vulnerability Assessment [parts 1and 2]
  11. SNMP
  12. DNS
  13. Password Cracking
  14. Exploits [ parts 1 and 2]
  15. Web and File Exploits
  16. Wireless Security
  17. Erasing Tracks

    TO GET THE ENTIRE TUTORIAL VIDEOS LISTED ABOVE, ALL YOU NEED TO DO IS PAY
THE CASH SUM OF #20,000  INTO THE BANK ACCOUNT LISTED BELOW
                               
                                                     NAME : UDO-OBIA CRYSTAL .A
                                                     BANK  ; OCEANIC BANK
                                             ACC NUM   : 1890001013636

AFTER PAYMENT, SEND  AN SMS CONTAINING YOUR NAME, AMOUNT PAID, E-MAIL ADDRESS, TELLER NUMBER, AND POSTAL ADDRESS, TO THE NUMBER 08068590823.
PLS EXPECT YOUR PACKAGE WITHIN A MAXIMUM OF 48HRS AFTER CONFIRMATION
OF PAYMENT.

 LIKE I SAID EARLIER, THIS IS A ONE TIME OFFER, AND MAY BE GONE A LOT SOONER THAN YOU THINK, SO IF YOU REALLY WANT  IT, YOU SHOULD QUIT WHATEVER YOU'RE DOING NOW, AND SECURE THIS ADVANTAGE IMMEDIATELY

WITH WARM REGARDS
UDO-OBIA CRYSTAL .A







Monday, December 19, 2011

WANNA BE A CERTIFIED INFORMATION SECURITY PROFESSIONAL?

  Let me guess, you've been dreaming of building a career in information security, but you can hardly afford the high cost of training institutes, as such you are now quite clueless on when, where or how to build your dream.
You don't need to wallow in confusion, not when there is an alternative route to the solution, possibly a better one. But just before we explore this alternative, we should better understand what information security is;
INFORMATION SECURITY can be defined as the process of protecting [electronic] information, as such the entire process functions to;
  1.  protect the availability of information
  2.  protect accessibility of information and
  3.  protect the integrity of information     
                    
So now that you know what information security is, the next question is..

          IS IT WORTH IT ? 
  YES!, apart from the pride and confidence that comes with the knowledge and skill, an average certified information security professional is paid an average of 250usd a day, that's right, 250 usd 
a day,imagine that amount running into 30 days.....i'll let you do the math.
that said, the next big question is
HOW?!
Get the right training  from preferably a known and legally approved training institute.
Globally recognized certifications like CISA, CISM, CISSP and CEH demands a sound knowledge and understanding in information security from the candidate, in order to get them. 
IT may only cost you money to register for these exams,which of course is a very good investment, but of what consequence will the money you invested be to you if you're going to flunk the exam?  needless to say, the best way to avoid such an unnecessary waste of your hard-earned resources will be to build your confidence in this field of study by getting the right training; this can be done in two ways:
1: The real classroom training method where you get to meet your teachers one on one and have the opportunity to rapport with both the trainer and the training institute as a whole
  It is the oldest, most preferred method of training but has the disadvantage of being 
more expensive and has a relatively rigid time table.
As such, it is best for people who have a lot of time and money on their hands.

2: IF you're a working person, you'll naturally not have a lot of time on your hands, and if you're like
most people out there, you're also working with a tight budget, which simply means
that you don't have much time and money to spare for your training, 
as such, you'll require a flexible training programme tailored to suit both your strict working hours
your learning ability and of course your purse!
if you find yourself in this situation, then i'll strongly recommend you go for

 virtual training method is functions by simulating a virtual environment, in this case the virtual environment is a classroom,
and in this 'classroom', an instructor is able to explain, test
and show certain qualities which aid in the learning process.
it has the unbeatable advantages of very flexible with time, for instance, once gotten, can be easily controlled with the click of a button, as such one can easily; play, replay, rewind, fast-forward, slow down, stop or even pause the video for as long as he/she pleases at no cost.
Little wonder it has become so popular among both trainers and trainees. it is a very convenient way to learn in the comfort of your home, office, etc and at your own pace, typical examples of popular virtual training companies are VTC,
CBT NUGGETS, LEARN KEY SOLUTIONS, etc.
for great virtual training videos on informal security certifications like CISA,CISM, CEH and CISSP ;
please click here