Wednesday, August 28, 2013

Secure Android Smart Phones

These are some simple steps to secure your smart phone

1. Protect your phone from suspicious apps 

2. Don't download any app directly from internet they might contain spyware(virus), trust only google play store to download applications. 

3. Locate, ring and wipe a misplaced device

For more advice on how to protect yourself and your family online, visit our videos section , and stay tuned for more posts in our security series. 

 

Friday, August 16, 2013

OPST - Open Source Professional Security Tester Training

 OPST - Open Source Professional Security Tester Training
IT security holds top priority for some of the biggest organizations in the world. Since loss or theft of critical company information can make a firm lose millions, security of their systems is an area they wouldn't rather take chances. Therefore, OPST (Open Source Professional Security Tester) certification is one of the most lucrative qualifications immensely in demand today. OPST certification is worthwhile if your aim is to work in an IT department and handle networks and systems. Network administrators, system administrators, network engineers, network architects, security analysts, security auditors and developers and those who want to polish their technical security skills; have much to gain from this course. Accredited by ISECOM, this OPST course from Koenig offers you great learning opportunities that are beyond your expectations.

Course Objectives

The OPST course targets at providing sound knowledge to students about functioning of network protocols and several security programs and devices, user level expertise with a common OS and basic know-how of server operations/administration specifically to set up and run services and daemons. The course encompasses ethical hacking, web application and penetration testing and network auditing. Objectives of this course include -
  • Safe and legal execution of professional security testing
  • Maximizing precision
  • Learning information sources
  • Understanding information security testing principles with a formal methodology
  • Quantifying and measuring the threats appropriately
  • Deducing the common security tools output
OPST is an applied knowledge certification. It gives you the opportunity to showcase your ability as an expert security tester. Once you gain expertise to use scientific and OSSTMM approaches resourcefully, you can deftly put technical security to test in an ethical manner. So, if you want to be established as a professional who can conduct precise, safe and extensive security tests; this certification will prove to be of great value for you.

for more details visit : http://www.koenig-india.com/opst.aspx#

refer by: http://www.koenig-india.com/opst.aspx

Thursday, August 8, 2013

Hackers are ready. ARE YOU?

Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.
EC-Council Certified Security Analyst (ECSA) complements the
The objective of a Licensed Penetration Tester is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing and aware of all compliance requirements required by the industry.

To obtain LPT a candidate must:
  1. Achieve the Certified Ethical Hacker (CEH) Certification.
  2. Achieve the EC-Council Certified Security Analyst (ECSA) certification.
  3. Fill up and submit the LPT Application form along with required documents and payment ($500) to EC-Council directly.
Koenig is an Accredited Training Partner of EC-Council and our courses are run using the Official Curriculum.

Who should attend:
  • System Administrators
  • Network Administrators
  • Firewall Administrators
  • Security Testers
  • Risk Assessment Professionals
For registration, visit at http://www.koenig-india.com/ecsa-lpt.aspx

ref by: http://www.koenig-india.com/