{"id":24858,"date":"2016-06-06T08:29:50","date_gmt":"2016-06-06T08:29:50","guid":{"rendered":"http:\/\/www.interadigm.com\/home\/?post_type=tribe_events&#038;p=24858"},"modified":"2016-06-10T04:06:55","modified_gmt":"2016-06-10T04:06:55","slug":"network-hacking-defence","status":"publish","type":"tribe_events","link":"https:\/\/interadigm.com\/home\/event\/network-hacking-defence\/","title":{"rendered":"Network Hacking &#038; Defence"},"content":{"rendered":"<div class=\"row \"><div class=\"wpv-grid grid-1-1  wpv-first-level first unextended\" style=\"padding-top:0px;padding-bottom:0px\" id=\"wpv-column-3ff3cacbf32590ea96c90199ce12108a\" >\t\t<div class=\"sep-text single centered\">\n\t\t\t\t\t\t\t<span class=\"sep-text-before\"><div class=\"sep-text-line\"><\/div><\/span>\n\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t<h2 class=\"text-divider-double\">Network Hacking &amp; Defence<\/h2>\t\t\t<\/div>\n\t\t\t<span class=\"sep-text-after\"><div class=\"sep-text-line\"><\/div><\/span>\n\t\t\t\t\t<\/div>\n\t<h3>COURSE OVERVIEW:<\/h3>\n<p class=\"eventtext\">\u201cCyber hacking and the breach of information systems security is an emerging threat to most companies in the world, tipped as one of the top risks in the sector. It can be vicious, well organized and undertaken by highly skilled operators. Investing in the prevention of such an attack may be less costly than the downtime, loss of intellectual property and time spent fighting such an attack. These threats are heightened by the centralization of many business functions across the supply chain as a result of increasing cost rationalization. This has translated into the need for a more sophisticated IT system and network infrastructure to connect the geographically diverse workforce, which increases an organization\u2019s exposure to, and dependency on, the internet. With the trend toward remote operation to improve cost efficiency, there is a convergence of IT and OT and this provides cyber hackers with an access path to the operation systems from the internet. This course is designed for information security professionals and enthusiasts, or anyone in charge of designing, securing, auditing and implementing information security policies and procedures. The topics have been designed to provide an in-depth knowledge about information security as applied to specific domains that are the interest of various info-sec professionals. The course aims to provide participants with up-to-date practical information and is comprised of the latest techniques and exploits which hackers use for hacking, and the know-how that the participants can use to manage the existing and ever growing threat of hacking and damages caused by (black hat) hackers in various domains. The participants will be provided with interactive demos to enhance the learning experience. The participants can then use their learning&#8217;s to effectively maintain and improve IT security in their organizations.<\/p>\n<h3>COURSE OBJECTIVE<\/h3>\n<p class=\"eventtext\">In this course, participants will learn about information and data security measures in place, and the modern or latest techniques hackers use to by-pass or overcome these security measures. Theoretical lessons will be supported with case studies and demo.<\/p>\n<h3>WHO SHOULD ATTEND<\/h3>\n<p class=\"eventtext\">This course was designed for System Managers, Information Security Managers, Information Security Auditors, IT Managers, System Analyst, Software Developers, Defense Forces,, Info Sec Professionals,Auditors (financial, operations, or beginner IS auditors), Compliance Officers and Everyone who is responsible on a Information &amp; Data Security.<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber hacking and the breach of information systems security is an emerging threat to most companies in the world, tipped as one of the top risks in the sector. It can be vicious, well organized and undertaken by highly skilled operators.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_tribe_events_status":"","_tribe_events_status_reason":"","_joinchat":[]},"tags":[],"tribe_events_cat":[],"_links":{"self":[{"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/tribe_events\/24858"}],"collection":[{"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/comments?post=24858"}],"version-history":[{"count":0,"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/tribe_events\/24858\/revisions"}],"wp:attachment":[{"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/media?parent=24858"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/tags?post=24858"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/interadigm.com\/home\/wp-json\/wp\/v2\/tribe_events_cat?post=24858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}