Information Security
    Trend, Knowledge and Promising Career
             Medan, 12 Juni 2010




     Delivering Qualit...
By: Ir. Hogan Kusnadi, MSc, CISSP-ISSAP, CISA
           (Certified Information Systems Security Professional)
        (In...
Kegiatan dan Keanggotaan
       Terkait Keamanan Informasi
• Ketua Sub Panitia Teknis Kementrian Kominfo dan BSN, untuk
  ...
Klien UniPro
Holistic Information Security
People – Process - Technology
Piagam Penghargaan MURI
Partner UniPro
Training Partner           Service Partner


Technology Partner




                                       ...
Kegiatan Seminar




                   8
Kegiatan Seminar




                   9
Kegiatan Seminar




                   10
Kegiatan Seminar




                   11
Digital Lifestyle & Workstyle
Akses dan Transaksi

• Dimana saja
• Kapan Saja
• Siapa Saja
Dua Sisi Teknologi
Manfaat vs Risiko

Multi Fungsi                       Database Application
                                       Web Appl...
Fastest Malware Outbreak
INFORMATION SECURITY RISK

R                            P
                             R
                             O
I ...
Information Security
  Attack / Incident
Serangan Keamanan Informasi di Indonesia
• Malicious Ware (Virus, Worm, Spyware,
  Keylogger, DOS, DDOS, etc)
• Spam, Phis...
Serangan Terhadap Website Indonesia
       Domain .id 1998 – 2009


          792                      .go.id
            ...
Serangan Terhadap Website
Government Domain 1998 - 2009


          17
   711
                                   .go.id
  ...
CISSP 2002 - 2010
1200

1000

 800
                                          3-Oct-02
                                    ...
Competency vs Incident
           (Government Website 2010)
2500


2000


1500
                                          N...
As of Aug 2009

       Number of (ISC)² Members in Various Asian
       Economies


2500

2000

1500

1000

500

  0
     ...
CISSP In the World
 1000+   United States   Canada United Kingdom Hong Kong Korea, South Singapore             Australia  ...
Facts about IT Security
Pencurian Data
                                                                         WORLD RECORD
140,000,000
         ...
Largest Incidents
CardSystems - Hacking Incident
• Hackers had stolen 263,000 customer credit card
  numbers and exposed 40 million more.
• ...
Data Loss 2000-2009
GhostNet – Cyber Espionage
             (Report: 29 March 2009)

• Infected 1.295 Computers
  Targeted at:
  – Ministries ...
Motivation Behind Cyber Attacks
               •   Just for FUN
               •   Fame and popularity
               •   ...
Change in the Security
            Landscape
5 Years Ago             Now
•   Vandalism           •   Profit Oriented
•   I...
Hacking itu Mudah




                    41
How to Mitigate Information
      Security Risk
Practical Personal Protection

                     AIDS
                   Acquired
                    InfoSec
         ...
Regulation & Best Practice
• Government & Industry Regulation
  –   UU ITE 2008 (PP pendukung - 2010)
  –   PP 60/2008
  –...
HISA Framework
Hogan Information Security Architecture Framework
Fractal
Risk Equation
Risk = Threat X Vulnerability x Asset
Risk Factor = T x V x A
Minimum level of protection
     Risk Factor = T x V x A




                               Threat Level
Risk Factor = T x V x A



                       Potential
                     Future Threat



                        ...
MV Dumai Express-18 dari Dumai tujuan Batam bocor dan tenggelam di Pulau
Terkulai, Batupanjang, Dumai, 15 menit setelah be...
False Sense of Security
Non Effective Enforcement
Situ Gintung,
Before and After 27 March 2009
Where is ISO 27001 Position in IT Governance?




                                         UU ITE, PP60/2008, PBI


      ...
UniPro Public Training
  Top Management        Information Security Governance for Top Executive

   Manager Umum         ...
ISO 27001 Series: International Standard for
 Information Security Management System
   • Based on British               I...
ISO 27002
ISO 27001 Certificates in The World (Jan 2010)
                               ISO 27001 Statistic:
                       ...
Information Security
      Solution
7 Flagship DETIKNAS
•   e-Education
•   e-Budgeting
•   e-Procurement
•   National Identity Number
•   National Single Win...
Tenaga Ahli Keamanan Indonesia



                 High Level
                                  International Certificatio...
The Economic of Supply and Demand

    Red Ocean vs Blue Ocean


                                 Applicant
              ...
Job Posting
     (Required CISSP Certification. From www.isc2.org)
  Manager/Analyst/Engineer
• Computer Systems Security ...
Job Posting
   (Required CISSP Certification. From www.isc2.org)

Consultant/Auditor          Critical Infrastructure
• Co...
Job Posting
     (Required CISSP Certification. From www.isc2.org)

Business Function              Executive Management
• ...
US Department of Defense Directive 8570
        Information Security Certification Required for 2010
    IAT Level I      ...
FBI Recruit CISSP
Tenaga Ahli Keamanan Indonesia



                 High Level
                                  International Certificatio...
Why UniPro ?




                                                      Training Partner



                               ...
Your InfoSec Learning Path




                                                            International Certification
   ...
TRAINING, HIRING & INCREASE CAREER
             PROGRAM


                                     77
Special Note:
     Program THINC juga mendapat dukungan
      Balitbang SDM Kementerian Kominfo
             sebagai penga...
Silver Program (Promo)
•   Essential Information Security (4 Days)
•   Enterprise Information Security Technology (6 Days)...
Essential Information Security
 No       Training Module       Day
  1 Essential Information        2
    Security Foundat...
Essential Information Security Foundation
Day I
   •     Introduction
   •     InfoSec Management Concept
   •     InfoSec...
Essential Packet Analysis
• TCP/IP Security
• TCP/IP Header
• Stimulus and Response
• Tcpdump
• Wireshark




            ...
Essential Web Application Security

• Introduction to Web Threat
• Assessment Method
• Top 10 OWASP Vulnerability
• Web Ap...
Enterprise InfoSec Technology
No        Training Module         Day
 1    Firewall Fundamental         1
 2   Firewall 1 (...
Firewall Fundamental (1 Day).

•   Basic TCP/IP
•   Firewall Technology
•   Firewall Design & Rules
•   Firewall Rules &
 ...
Firewall 1 – Checkpoint (1 Day)

• Checkpoint FW Secure
  Platform
• Checkpoint FW Smart
  Management
• Checkpoint FW Inst...
Firewall 2 - Juniper (1 Day)

•   Juniper Firewall Introduction
•   Juniper FW Installation
•   Policy Implementation
•   ...
Intrusion Prevention System (1 Day)

• IPS Architecture
• Tippingpoint IPS
  Introduction
• Tippingpoint IPS Installation
...
Proxy (1 Day)

•   Bluecoat Introduction
•   Proxy Features & Topology
•   Bluecoat Proxy Installation
•   Configuring Blu...
Load Balancer (1 Day)


•   F5 Introduction
•   Load Balancer Introduction
•   F5 Installation
•   Configuring F5 LTM
•   ...
Pre-Requisite
• Bahan/mata kuliah yang perlu dipelajari
  sebagai persiapan sebelum mengambil
  kelas THINC Silver:
  – Ke...
Package                  Modules                   Day(s)         Price

 Bronze A         Essential Information Security ...
Package                  Modules                   Day(s)         Price

                  Essential Information Security ...
SILVER PROMO !!!


   PROGRAM                SILVER PROMO


           Total Class         10 Days
Training     Exam      ...
INTEGRATION SIMULATION
(2 Days With Real Lab IN JAKARTA)
                                    95
Integration Simulation




                         96
Seat
Invest Your Future NOW !!                         Limited


A journey of a thousand miles begins with a
             ...
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Hogan Kusnadi - Information Security
Upcoming SlideShare
Loading in …5
×

Hogan Kusnadi - Information Security

2,377 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,377
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
152
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hogan Kusnadi - Information Security

  1. 1. Information Security Trend, Knowledge and Promising Career Medan, 12 Juni 2010 Delivering Quality and Competence 1 TRAINING, HIRING & INCREASE CAREER
  2. 2. By: Ir. Hogan Kusnadi, MSc, CISSP-ISSAP, CISA (Certified Information Systems Security Professional) (Information Systems Security Architecture Professional) (Certified Information Systems Auditor) Certified Consultant for ISO 27001/27002 Founder and Director PT. UniPro Nuansa Indonesia E-mail: hogan@unipro.co.id www.unipro.co.id blog.unipro.co.id •
  3. 3. Kegiatan dan Keanggotaan Terkait Keamanan Informasi • Ketua Sub Panitia Teknis Kementrian Kominfo dan BSN, untuk Keamanan Informasi, mengadopsi ISO 27001, ISO 27002 seri lain dari ISO 27000. • MASPI (Masyarakat Sandi dan Keamanan Informasi). Anggota Pendiri dan Ketua Bidang Pengembangan Kompetensi (2006). • (ISC)2 International Information Systems Security Certification Consortium • ISACA (Information Systems Audit and Control Association), Member. • Mantan anggota Menkominfo “Task Force Pengamanan dan Perlindungan Infrastruktur Strategis Berbasis Teknologi Informasi” (2004) • Mantan Anggota Pokja EVATIK DETIKNAS (2007)
  4. 4. Klien UniPro
  5. 5. Holistic Information Security People – Process - Technology
  6. 6. Piagam Penghargaan MURI
  7. 7. Partner UniPro Training Partner Service Partner Technology Partner 7
  8. 8. Kegiatan Seminar 8
  9. 9. Kegiatan Seminar 9
  10. 10. Kegiatan Seminar 10
  11. 11. Kegiatan Seminar 11
  12. 12. Digital Lifestyle & Workstyle
  13. 13. Akses dan Transaksi • Dimana saja • Kapan Saja • Siapa Saja
  14. 14. Dua Sisi Teknologi
  15. 15. Manfaat vs Risiko Multi Fungsi Database Application Web Application Fleksibel Client Server Mudah digunakan Networking Integration Manfaat Cloud Computing Kerahasiaan Integritas Risiko Identity Theft Information Theft Ketersediaan Information Theft Otentisitas Industrial/State Espionage Distributed Denial of Service Nir Sangkal
  16. 16. Fastest Malware Outbreak
  17. 17. INFORMATION SECURITY RISK R P R O I T Bussiness Process E C S Information Assets T I K O SAFE N 18
  18. 18. Information Security Attack / Incident
  19. 19. Serangan Keamanan Informasi di Indonesia • Malicious Ware (Virus, Worm, Spyware, Keylogger, DOS, DDOS, etc) • Spam, Phising • Pencurian Identitas * • Data Leakage/Theft • Web Defaced • Web Transaction Attack • Misuse of IT Resources * Pencurian via ATM (Jan 2010)
  20. 20. Serangan Terhadap Website Indonesia Domain .id 1998 – 2009 792 .go.id 2138 846 .co.id .or.id 1463 .ac.id Source: www.zone-h.org
  21. 21. Serangan Terhadap Website Government Domain 1998 - 2009 17 711 .go.id .gov.my .gov.sg 2138 Source: www.zone-h.org
  22. 22. CISSP 2002 - 2010 1200 1000 800 3-Oct-02 30-Mar-10 600 400 200 0 Indonesia Malaysia Singapore
  23. 23. Competency vs Incident (Government Website 2010) 2500 2000 1500 Number of CISSP Number of Incident 1000 500 0 Indonesia Malaysia Singapore 26
  24. 24. As of Aug 2009 Number of (ISC)² Members in Various Asian Economies 2500 2000 1500 1000 500 0 Ho Ph Si Ind Au Ma Th Vi Ch Ko Ind ng etn ilip ng ail str on lay re ina ia ap an pin a am ali es Ko sia or d a ia es ng e
  25. 25. CISSP In the World 1000+ United States Canada United Kingdom Hong Kong Korea, South Singapore Australia Japan India 500+ Switzerland France Netherlands Germany Mexico Brazil Denmark China South Africa Belgium Malaysia 200+ Ireland Finland Spain Sweden Taiwan United Arab Emirates 100+ Poland Russia Saudi Arabia Italy Israel New Zealand Thailand
  26. 26. Facts about IT Security
  27. 27. Pencurian Data WORLD RECORD 140,000,000 2009 Heartland Payment 120,000,000 System 2008 T-Mobile, Deutche 100,000,000 Telecom 80,000,000 2007 TJX Companies Inc 2006 US Dept of Veteran Affairs 60,000,000 2005 CardSystem 40,000,000 2004 American Online 20,000,000 - 2003 2004 2005 2006 2007 2008 2009 2010 INDONESIA World 2008 Total Incident Reported Indonesia 32
  28. 28. Largest Incidents
  29. 29. CardSystems - Hacking Incident • Hackers had stolen 263,000 customer credit card numbers and exposed 40 million more. • In September 2004, hackers dropped a malicious script on the CardSystems application platform, injecting it via the Web application that customers use to access account information. The script, programmed to run every four days, extracted records, zipped them and exported them to an FTP site. • Visa and MasterCard threatened to terminate it as a transactions processor. • CardSystems acquire by PayByTouch, in October 2005.
  30. 30. Data Loss 2000-2009
  31. 31. GhostNet – Cyber Espionage (Report: 29 March 2009) • Infected 1.295 Computers Targeted at: – Ministries of foreign affairs, – Embassies, – International organizations, – News media, – and NGOs. • 103 Countries (Indonesia Included)
  32. 32. Motivation Behind Cyber Attacks • Just for FUN • Fame and popularity • Challenging activities • Ideological/political • Jealousy, anger • Revenge • Random attack • Personal financial gain • Organized crime for financial gain (FUND)
  33. 33. Change in the Security Landscape 5 Years Ago Now • Vandalism • Profit Oriented • Incident is known • Stealthy mode • Attack System • Attack Application and Data • Broad base • Targeted • Individual • Organized crime • (State) Sponsored Attack/ Espionage/Sabotage
  34. 34. Hacking itu Mudah 41
  35. 35. How to Mitigate Information Security Risk
  36. 36. Practical Personal Protection AIDS Acquired InfoSec Deficiency Syndrome
  37. 37. Regulation & Best Practice • Government & Industry Regulation – UU ITE 2008 (PP pendukung - 2010) – PP 60/2008 – PBI (Peraturan Bank Indonesia) 2007 – Basell II (Banking Industry) – PCI-DSS (Payment Card Industry Data Security Standard) – SOX (Sarbanes-Oxley Act) – JSOX (Japan SOX) • Best Practice / Standard / Framework – COBIT Framework – COSO Enterprise Risk Management Framework – ISO 27001 (SNI-ISO 27001 - Oct 2009), ISO 27002 – HISA Framework 47
  38. 38. HISA Framework Hogan Information Security Architecture Framework
  39. 39. Fractal
  40. 40. Risk Equation Risk = Threat X Vulnerability x Asset
  41. 41. Risk Factor = T x V x A
  42. 42. Minimum level of protection Risk Factor = T x V x A Threat Level
  43. 43. Risk Factor = T x V x A Potential Future Threat Current Threat
  44. 44. MV Dumai Express-18 dari Dumai tujuan Batam bocor dan tenggelam di Pulau Terkulai, Batupanjang, Dumai, 15 menit setelah bertolak dari Pelabuhan Dumai, Senin (28/9) sekitar pukul 10.00 WIB.
  45. 45. False Sense of Security
  46. 46. Non Effective Enforcement
  47. 47. Situ Gintung, Before and After 27 March 2009
  48. 48. Where is ISO 27001 Position in IT Governance? UU ITE, PP60/2008, PBI COSO COBIT / ISO 38500 ISO 20000 / ITIL V3 SNI-ISO 27001
  49. 49. UniPro Public Training Top Management Information Security Governance for Top Executive Manager Umum Information Security Governance for General Management End User Information Security Awareness & Security Policy Socialization Holistic Information Security IT Manager ISO 27001 Introduction Security Policy Formulation Holistic Information Security IT Application Web Application Hacking & Countermeasures Secure SDLC/CSSLP (Certified Secure Software Lifecycle Professional) Holistic Information Security Hacking Insight through Penetration Testing IT Network Wireless Hacking & Defense Packet Analysis & Troubleshoot Managerial Holistic Information Security IT Server Hacking Insight through Penetration Testing Holistic Information Security ISO 27001 Introduction ISO 27001 Implementation IT Security Manager Security Policy Formulation BCP / DRP CISSP (Certified Information Systems Security Professional) Holistic Information Security Incident Response & Handling Log Management & Analysis Hacking Insight through Penetration Testing IT Security Personnel Wireless Hacking & Defense Packet Analysis & Troubleshoot Forensic Investigation Analysis SSCP (Systems Security Certified Practitioner) Physical Security Information Security for Physical Security Personnel
  50. 50. ISO 27001 Series: International Standard for Information Security Management System • Based on British It include the following: Standard BS7799 that 1. Security Policy provide comprehensive 2. Organizing Information Security guidance on various 3. Asset Management controls for implementing 4. Human Resources Security information security. 5. Physical and Environmental Security 6. Communications and Operations • ISMS Best Practice Pair: Management 7. Access Control Criteria for Certification – ISO 27001: 2005 8. Information Systems Acquisition, Development and Maintenance (was BS 7799 - 2: 2005) Guideline for Best Practice 9. Information Security Incident Management – ISO 27002 10. Business Continuity Management (was17799: 2005) 11. Compliance.
  51. 51. ISO 27002
  52. 52. ISO 27001 Certificates in The World (Jan 2010) ISO 27001 Statistic: 81 Negara Japan 55% 4 Negara Asia di Top 5 5 Negara Asia di Top 10 Indonesia di posisi no. 42, terrendah diantara negara awal ASEAN. http://www.iso27001certificates.com
  53. 53. Information Security Solution
  54. 54. 7 Flagship DETIKNAS • e-Education • e-Budgeting • e-Procurement • National Identity Number • National Single Window • Palapa Ring • Legalisasi Software 66
  55. 55. Tenaga Ahli Keamanan Indonesia High Level International Certification Skill of InfoSec Medium Level of InfoSec Care / Awareness
  56. 56. The Economic of Supply and Demand Red Ocean vs Blue Ocean Applicant Job APPLICANT JOB Applicant >> Job Job >> Applicant Many Other IT Skill InfoSec Skill
  57. 57. Job Posting (Required CISSP Certification. From www.isc2.org) Manager/Analyst/Engineer • Computer Systems Security • Manager, Security Program • Cyber Network Operations Management Planning Specialist - $75K • Network Security Manager • Cyber Security Specialist • Project Manager Data Center • Data & System Security • Security Operations Center Specialist Analyst • Digital Forensics Analyst • Security System • Functional Security/Penetration Administrator - $95K Testers/Telecommute • Senior Computer Forensic • Information Security Analyst Examiner • Information System Security • Technical Manager of (ISS) Project/Program Manager Applications Security • IT Security Specialist Consulting • Manager, Security Policy, • Technology Risk Analyst Compliance, and Risk • Vulnerability Management Management Engineer
  58. 58. Job Posting (Required CISSP Certification. From www.isc2.org) Consultant/Auditor Critical Infrastructure • Consulting Partner • Critical Infrastructure Protection Specialist • Entry Level IT • NATO Cyber Defence Security Consultant Coordinator • Information Others Technology (IT) • Recruiter Auditor • Sales Engineer • Senior IT Auditor • Senior Technical Recruiter, Human Resources • Technical Writer
  59. 59. Job Posting (Required CISSP Certification. From www.isc2.org) Business Function Executive Management • Analyst, Business • Chief Information Analysis (Security Due Security Officer Diligence) • Director of Security • Business Continuity and • Director, Information Operational Quality Security Assurance Role • VP Governance, Risk • Identity Management and Compliance Architect/Developer • VP Security Engineering • Senior Enterprise • VP, Enterprise Security Architect • VP/Information • Senior Information Assurance Assurance Engineer • Senior Security Architect
  60. 60. US Department of Defense Directive 8570 Information Security Certification Required for 2010 IAT Level I IAT Level II IAT Level III IAT : SSCP SSCP CISSP (or Associate) Information Assurance A+ GSEC CISA Technical Network + Security + GSE GCIH SCNP SCNA IAM : Information Assurance IAM Level I IAM Level II IAM Level III Management CAP CISSP (or Associate) CAP CISSP (or Associate) GISF GSLC CISM IASAE : CISM Security + GSLC GSLC Information Assurance Security Architecture IASAE I IASAE II IASAE III and Engineering CISSP (or Associate) CISSP – ISSAP CND : CISSP (or Associate) Computer Network CISSP – ISSEP Defense CND Infrastructure CND Incident CND-SP CND Analyst Support Reporter CND Auditor Manager Level I : Junior Level GCIH CISA Level II : Middle Level GCIA SSCP CISSP-ISSMP CSIH GSNA Level III : Senior Level CEH CEH CEH CISM CEH 72
  61. 61. FBI Recruit CISSP
  62. 62. Tenaga Ahli Keamanan Indonesia High Level International Certification Skill of InfoSec Medium Level of InfoSec Care / Awareness
  63. 63. Why UniPro ? Training Partner Technology Competence Certification Experience Partner Regulation & Standard : UU ITE , PBI, SNI ISO 27001 Customer Requirement, Career Opportunities
  64. 64. Your InfoSec Learning Path International Certification e.g. SSCP, CISSP-ISSAP Expert Advance Professional Essential Fundamental
  65. 65. TRAINING, HIRING & INCREASE CAREER PROGRAM 77
  66. 66. Special Note: Program THINC juga mendapat dukungan Balitbang SDM Kementerian Kominfo sebagai pengakuan kualitas serta seiring dengan VISI & MISI pemerintah. Program ini akan menjadi bagian dari SKKNI (Standar Kompetensi Kerja Nasional Indonesia) 78
  67. 67. Silver Program (Promo) • Essential Information Security (4 Days) • Enterprise Information Security Technology (6 Days) • Exam (1 Day) • Total (11 Days) 79
  68. 68. Essential Information Security No Training Module Day 1 Essential Information 2 Security Foundation 2 Essential Packet Analysis 1 3 Essential Web Application 1 Security 80
  69. 69. Essential Information Security Foundation Day I • Introduction • InfoSec Management Concept • InfoSec Practical Concept • Threat and Attack • Firewall Day II • Firewall • IDS/IPS • VPN • Data Protection 81
  70. 70. Essential Packet Analysis • TCP/IP Security • TCP/IP Header • Stimulus and Response • Tcpdump • Wireshark 82
  71. 71. Essential Web Application Security • Introduction to Web Threat • Assessment Method • Top 10 OWASP Vulnerability • Web Application Firewall 83
  72. 72. Enterprise InfoSec Technology No Training Module Day 1 Firewall Fundamental 1 2 Firewall 1 ( Check Point ) 1 3 Firewall 2 ( Juniper ) 1 4 IPS (TippingPoint) 1 5 Proxy (Blue Coat) 1 6 Load Balancer (F5) 1 84
  73. 73. Firewall Fundamental (1 Day). • Basic TCP/IP • Firewall Technology • Firewall Design & Rules • Firewall Rules & Discussion 85
  74. 74. Firewall 1 – Checkpoint (1 Day) • Checkpoint FW Secure Platform • Checkpoint FW Smart Management • Checkpoint FW Installation • Checkpoint FW Smart Management Installation • Policy Implementation 86
  75. 75. Firewall 2 - Juniper (1 Day) • Juniper Firewall Introduction • Juniper FW Installation • Policy Implementation • Multiple Layers Policy Implementation 87
  76. 76. Intrusion Prevention System (1 Day) • IPS Architecture • Tippingpoint IPS Introduction • Tippingpoint IPS Installation • Configuring Tippingpoint IPS • Customize Policy & Monitoring Log 88
  77. 77. Proxy (1 Day) • Bluecoat Introduction • Proxy Features & Topology • Bluecoat Proxy Installation • Configuring Bluecoat Proxy • Visual Policy Manager • Customize Policy & Monitoring log 89
  78. 78. Load Balancer (1 Day) • F5 Introduction • Load Balancer Introduction • F5 Installation • Configuring F5 LTM • Load Balancing Methodology • Monitoring Log & Performance 90
  79. 79. Pre-Requisite • Bahan/mata kuliah yang perlu dipelajari sebagai persiapan sebelum mengambil kelas THINC Silver: – Kelas Komunikasi Data – Kelas Jaringan Komputer – Sistem Operasi Komputer
  80. 80. Package Modules Day(s) Price Bronze A Essential Information Security 2 Rp. 1.300.000,- Foundation Essential Essential Packet Analysis 1 Rp. 650.000,- Information Security Essential Web Application Security 1 Rp. 650.000,- Bronze A Package 4 Rp. 2.200.000- Firewall Fundamental 1 Rp. 750.000,- Bronze B Firewall 1 ( Check Point ) 1 Rp. 750.000,- Enterprise Firewall 2 ( Juniper ) 1 Rp. 750.000,- InfoSec IPS (TippingPoint) 1 Rp. 750.000,- Technology Proxy (Blue Coat) 1 Rp. 750.000,- Load Balancer (F5) 1 Rp. 750.000,- Bronze B Package 6 Rp. 4.000.000- EXAM 1 Rp. 500.000,- Total Individual Modules + Exam 11 Rp. 7.600.000,- 92 Note: Minimum participant 32 student, maximum 40 per Class
  81. 81. Package Modules Day(s) Price Essential Information Security 2 Rp. 1.300.000,- Essential Foundation Information Security Essential Packet Analysis 1 Rp. 650.000,- Essential Web Application Security 1 Rp. 650.000,- Firewall Fundamental 1 Rp. 750.000,- Enterprise Firewall 1 ( Check Point ) 1 Rp. 750.000,- InfoSec Firewall 2 ( Juniper ) 1 Rp. 750.000,- Technology IPS (TippingPoint) 1 Rp. 750.000,- Proxy (Blue Coat) 1 Rp. 750.000,- Load Balancer (F5) 1 Rp. 750.000,- EXAM 1 Rp. 500.000,- Silver Package 11 Rp. 5.000.000,- 93 Note: Minimum participant 32 student, maximum 40 per Class
  82. 82. SILVER PROMO !!! PROGRAM SILVER PROMO Total Class 10 Days Training Exam 1 Day IDR 5 Million/Student PRICE 32 - 40 Students Per Class 94
  83. 83. INTEGRATION SIMULATION (2 Days With Real Lab IN JAKARTA) 95
  84. 84. Integration Simulation 96
  85. 85. Seat Invest Your Future NOW !! Limited A journey of a thousand miles begins with a single step Lao Tzu, Chinese Philosopher (6th Centuries BC)

×