Who is keeping your Information Secure?
Information is an essential resource for the growth and success of every business. In today's information-driven economy, keeping your company's vital data secure is the responsibility of every employee in your company. From guarding against Social Engineering Attacks to creating an effective Incident Response Plan, everyone in your organization has to take part in keeping your information secure.
A recent study by the Computing Technology Industry Association (CompTIA) cited human error as the most common cause of information security breaches, with some 80 percent of respondents believing this human error was caused by a lack of security knowledge, training, or failure to follow security procedures.
New Horizons and the Secure Organization
Information security awareness and training can significantly reduce not only the odds of your business experiencing a serious information security breach, but can also help minimize negative impact should a breach occur.
At New Horizons, our information security offerings are designed to insure that your organization can be 'The Secure Organization.' The Secure Organization approach enables you to target specific training for your organization based on information security threats, organizational job roles, and the knowledge and skills required by job role to keep an organization's information secure.
Certified Ethical Hacker
The Certified Ethical Hacker course immerses students in an interactive environment where they will learn how to scan, test, hack, and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks. No real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, Open Source Intelligence, Incident Handling and Log Interpretation.
Certified Hacking Forensic Investigator
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases. Electronic evidence is critical in the following situations:
• Disloyal employees
• Computer break-ins
• Possession of pornography
• Breach of contract
• Industrial espionage
• E-mail Fraud
• Disputed dismissals
• Web page defacements
• Theft of company documents
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. The CHFI course will benefit:
• Police and other law enforcement personnel
• Defense and Military personnel
• e-Business Security professionals
• Systems administrators
• Legal professionals
• Banking, Insurance and other professionals
• Government agencies
• IT managers
Windows Infrastructure Hardening has become a mandatory step performed on a regular basis by any organization that sees security as a priority.
Businesses nowadays are almost fully dependent on IT services, making the hardening and securing processes even more intense. The number of possible attack surfaces has emerged exponentially in direct relation to the increasingly competitive field of current technology we are witnessing where developers try to achieve more and more functionality from implemented solutions and applications.
616: Securing Windows Infrastructure is designed with the single purpose of providing Info-Sec professionals with complete knowledge and practical skills necessary to secure their network infrastructure which is fast becoming if already not a top priority plus a major tech challenge for most security conscious organizations.
This 3 day training deep dives into the key aspects of solving infrastructure-related problems by appreciating the key elements of how Windows Internal Security mechanisms actually work and how it can be further optimized without jeopardizing or easing an organization’s IT Environment configuration settings which becomes common as time passes. Some of the highlights of this course are techniques used in Kernel Debugging, Malware hunting, deep diving into BitLocker and the automation of the whole hardening process.
Please find the partial list of Certification offered by New Horizons:
Certified Ethical Hacker
CHFI - Computer Hacking Forensic Investigator
EC-Council Certified Security Analyst
Licensed Penetration Tester (ECSA_LPT)
EC-Council Network Security Administrator
Certified Secure Computer User (CSCU)
Ethical Hacking and Countermeasures
Security+ is a vendor-neutral security certification program that enables individuals to acquire the initial skills needed to become an Information Security Professional.