Monday, October 3, 2011

PCI Compliance Awareness Training


 
Payment Card Industry (PCI) compliance
 is a complex and ever evolving subject
affecting millions of businesses – acquiring
banks, Independent Sales Organizations
(ISOs), processors, hosts, shopping carts,
 e-commerce and retail merchants and
other merchant services providers. 

Learn PCI Compliance
 from a distinguished international
PCI DSS Consultant!!!

Meet Mr. GILBERT CHU...
ü Lead PCI DSS Implementer
ü Security Consultant
ü Certified Ethical Hacker
ü ISO/IEC 27001 Specialist
in this one-time training…

PCI Compliance Training

Course Overview:

All entities that transmit, process, or store payment card data must be compliant with Payment Card Industry Data Security Standard (PCI DSS). Working proactively to protect sensitive payment card data is essential to all lodging operations.
The Compliance: PCI DSS training course is designed to educate managers, compliance officers and security-concerned individuals on what security measures must be taken to protect the private information of individuals during any transaction occurring through the use of a credit or payment card.
In this 1-day training you will learn:
·         The history of the PCI DSS standard
·         The common payment card features
·         The requirements and process
·         The problems surrounding payment card fraud and identity theft
·         The best practices for payment card transactions

Who Should Attend:
The PCI Compliance Training is for anyone interested
in learning more about PCI and how to secure the
identity of the credit and debit card holders, with a
focus on those individuals working for organizations
that must meet compliance with PCI DSS.
• Anybody accepting credit card payments
• Merchants
• Third party service providers
• Acquirers
• Anybody processing, storing or transmitting credit card data
• Finance, internal audit, IT, sales department staff

Course Outline:

Module 1 -- PCI DSS Program Overview

Module 2 -- Payment Industry Terminology and Relationships

Module 3 -- Compliance Validation, Requirements and Process

Module 4 -- Roles and Responsibilities, ASV & QSA Overview and Quality Assurance

Module 5 -- General Requirements for Scanning and Compliance Audit

Course Fee:
Regular price is P 10,000 per person inclusive of AM/PM snacks, lunch, training materials and certificate of completion.
Early bird rate P 7,000 if you pay on or before October 31, 2011.
Pay only P 6,500 for Bitshield’s returning client if you pay on or before October 31, 2011.
Speaker Profile:
Mr. Gilbert Chu

Backed by strong knowledge of Information Security Management System (ISMS) implementation and technical risk analysis background, Mr. Gilbert Chu (Malaysian) is currently the Lead ISO 27001 Auditor and the Lead PCI DSS Implementer for LE Global Services. Mr. Chu is an expert in Payment Card Industry Data Security Standard (PCI DSS) implementation and PCI DSS Vulnerability Scanning and Penetration Testing.

To register call:

(63 2) 840.2612
(63 2) 893.8527

E-Mail:  sales@bitshieldsecurity.com
www.bitshieldsecurity.com

Duration:         1 day
Date:                25 November 2011
Location:         One Corporate Centre
                        Julia Vargas Avenue corner
Meralco Avenue, Ortigas, Pasig City


Hurry, register now! Limited slots available!

This is a first-come first-served basis.  Your payment serves as the confirmation of your seat.

Certified Penetration Testing Engineer Philippines

Catch the Bitshield’s grand launching of mile2’s CPTE course with trainer straight from Europe!  Don’t miss it!  It only happens… NOW!

Many courses teach "how to hack";


the course teaches "the business of penetration testing".


The course delivers advanced and cutting edge techniques for auditing a broad range of security controls (including Physical and User Security) with "hands-on" laboratories designed by real world security professionals.

For a Certified Ethical Hacker (CEH), this course will improve your knowledge and skills thus making you a complete “security guru”!

Learn the art of ethical hacking with a professional edge (penetration testing)!
Featuring Europe’s top notch and multi-awarded CPTE master instructor DENIZ KAYA!

Don’t be left out…be among the first Certified Pen Test Engineers in the Philippines!

Others compare CEH against CPTE (formerly CPTS) and this is what they say…

CPTE was developed by Mile2 and its security partners as an upgrade from the CEH classes previously offered to address the training needs of IT professionals required in executing the responsibilities of penetrating, analyzing and auditing the security of a network, effectively filling the gap for a course that goes beyond basic hacking techniques
CPTE places emphasis is on methodology, practices, and techniques in assessing and verifying security vulnerabilities in networks, connectivity, applications, databases etc.
CPTE courses are designed with a realization that overloading students with tools and slides does not necessarily make more effectively security practitioners.”  http://mile2.com/articles/157-cpte-vs-ceh.html
“As a veteran of the EC-Council CEH program, Ryan Lindfield , Senior Technical Instructor of Boson
Software, has seen CEH’s program come a very long way since version 2.0.  “Many labs have been added, as well as additional chapters and tools, in fact, the course content seems to grow by a few pounds with each year that passes,” said Lindfield. “I have delivered the CEH course approximately 10 times a year for the last 4 years, and while I enjoy the addition of recent tools, it is difficult to make it through all of the slides, and make sense of the often poorly written labs.” http://mile2.com/articles/163-boson-difference-between-cpte-ceh.html

“I know there is an on going debate about this vs CEH

I have my CEH and OSCP also...

OSCP contains more debugging/exploit writing and technical...However the CPTE is much better then the CEH on content and delivery.”
http://www.techexams.net/forums/security-certifications/58420-passed-cpte-mile2-formerly-cpts.html

“CEH and CPTS courses are similar in concept (Theoretical basis) and from my recent experience are very different in the way they delivered. I‘ve found that CEH course was more theoretical with no time left for practical exercises and the instructor has no pen testing experience. CPTS course was delivered by a very experienced instructor and I had a chance to play with many tools and techniques. I felt a bit frustrated after completing CEH course due to the lack of practice and felt quite confident after finishing CPTS course.  CEH Certification is pupular but I found that some people prefer not to put it on their CV. CPTS certification is not yet popular but doesn't have that stigma. I have CEH and getting ready for CPTS exam.”  http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,701.new/


COURSE OVERVIEW

CPTEngineer’s foundation is built firmly upon proven, hands-on,  
Penetration Testing methodologies utilized by our international
group of vulnerability consultants. Mile 2 trainers keep abreast of
their field by practicing what they teach. They believe that, during
training, an equal emphasis should be placed on both theoretical
and real world experience if the student is going to succeed in
mastering the necessary skills to become a CPTEngineer.

The CPTEngineer presents information based on the
5 Key Elements of PenTesting: Information Gathering,
Scanning, Enumeration, Exploitation and Reporting.
System vulnerabilities will be discovered using these tried
and true steps alongside the use of the latest hacking
techniques.

This course also enhances the business skills needed by
today’s students. It will enable them to identify protection
opportunities, justify testing activities, and optimize security
controls needed by businesses attempting to reduce risks.
mile2 goes far beyond simply teaching students to “Hack”.
Mere hacking was the norm for classes that were available
before mile2 has introduced a new methodology in teaching
this advanced skill.

Our course was developed around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing and ensuring the security of information assets.

COURSE OUTLINE

Module 0: Course Overview
Module 1: Business and Technical Logistics of
     Pen Testing
Module 2: Financial Sector Regulations
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware, Trojans and Back Doors
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Report Writing
Appendix 1: The Basics
Appendix 2: Linux Fundamentals
Appendix 3: Access Controls
Appendix 4: Protocols
Appendix 5: Cryptography
Appendix 6: Economics and Law

SPEAKER PROFILE

DENIZ KAYA
Multi-awarded IT Security and Networking Consultant
CPTE Master

Deniz Kaya's Summary
Cisco ASA and PIX Firewalls, IOS & Zone Based Firewall (ZBF), Cisco IPS Appliances and AIP-SSM modules, Cisco Wireless LAN Controller Appliances and WiSMs, Cisco Wireless Control System WCS, Cisco Switches 6500 Sup720, 4500, 3750, 3560, 2960 series, IBM AS400&iSeries, IPSEC VPN, EZVPN, DMVPN, SSLVPN, GETVPN, PKI enabled VPN, Ironport Email & Web, and Management appliances, Penetration Testing, Network Security Review and Hardening, CiscoWorks, Cisco Routers, EIGRP, OSPF, BGP, Cisco Unified Communication Manager, IP Telephony, Radius, Tacacs, Proxy Servers, Microsoft Active Directory, Microsoft NAP, Failover Clustering, MS Network Load Balancing, Business Continuity Planning, Disaster Recovery.
Specialties
Certified Cisco Systems Instructor (CCSI), CCIE Security Written, CCNP, CCNP Security, CCSP, Cisco Ironport Certified Security Instructor & Professional (CICSI & CICSP), Certified Penetration Testing Specialist/Engineer (CPTS/CPTE), Certified Ethical Hacker (CEH), Certified Disaster Recovery Engineer (CDRE), Microsoft Certified Trainer (MCT) and Microsoft Certified System Engineer (MCSE)
To register, please call:

(63 2) 840.2612
(63 2) 893.8527

E-Mail:  sales@bitshieldsecurity.com

Duration:                    
5 days

Inclusion:
Original CPTE kit (mile2 workbooks (2), mile2 lab guide, key concepts/definitions booklet,  DVDs with penetration testing tools, white papers, videos & resources, mile2 pen, and mile2 T-shirt)
            Exam voucher
            AM/PM snacks & lunch
            Limited edition Bitshield/mile2 jacket (available only for the grand launching class)

Hurry, register now! Limited slots available!

This is a first-come first-served basis.  Your payment serves as the confirmation of your seat.


Bitshield is the only Authorized Training Center of mile2 in