{"id":139,"date":"2012-11-22T09:29:13","date_gmt":"2012-11-22T02:29:13","guid":{"rendered":"http:\/\/josh.rootbrain.com\/blog\/?p=139"},"modified":"2012-11-22T15:35:30","modified_gmt":"2012-11-22T08:35:30","slug":"wireless-security-management-periode-3-5-desember-2012","status":"publish","type":"post","link":"https:\/\/josh.rootbrain.com\/blog\/2012\/11\/22\/wireless-security-management-periode-3-5-desember-2012\/","title":{"rendered":"Wireless Security &#038; Management periode 3-5 Desember 2012"},"content":{"rendered":"<p>RootBrain IT Security Training &amp; Consulting yang mengkhususkan diri bergerak di bidang Keamanan Infrastruktur Jaringan dan Sistem Informasi akan mengadakan pelatihan dengan tema \u201cWireless Security &amp; Management\u201d.<br \/>\nPelatihan ini sangat diperlukan dalam mengamankan infrastruktur Teknologi Informasi perusahaan khususnya Jaringan Wireless. Setiap instansi telah menggunakan teknologi wireless untuk kemudahan akses sistem informasi dan internet. Berbagai ancaman keamananpun bermunculan, mulai dari adanya pencurian akses tanpa izin, penyadapan, pembelokan komunikasi hingga pengacauan sinyal wireless yang menyebabkan jaringan wireless sering menjadi ancaman tersendiri bagi lembaga tersebut.<br \/>\nMelalui pelatihan ini akan dibahas secara rinci melalui demonstrasi dan praktik langkah-langkah yang digunakan para hacker maupun cracker dalam melakukan serangan terhadap jaringan wireless dan bagaimana penanggulangannya. Diberikan juga materi managemen dan monitoring akses jaringan wireless dengan aman dan terkontrol melalui sistem otentikasi terpusat.<\/p>\n<p><strong>TARGET PESERTA<\/strong><br \/>\nProfessional TI bidang Jaringan dan Keamanan Sistem Komputer<br \/>\nDosen atau staff pengajar bidang Jaringan dan keamanan jaringan &amp; sistem Informasi<br \/>\nSystem Administrator &amp; Network Administrator<br \/>\nPengelola Bidang Infrastruktur Jaringan atau TIK Organisasi<br \/>\nKonsultan dan Auditor TI bidang Keamanan Sistem Informasi<br \/>\nMahasiswa yang sudah memiliki pengalaman bidang Keamanan Sistem Informasi atau pernah mengambil kuliah Keamanan Jaringan dan Sistem Komputer.<\/p>\n<p><strong>JADWAL DAN LOKASI<\/strong><br \/>\nWaktu :\u00a0 3-5 Desember 2012\u00a0 (3 Days)\u00a0 Pukul\u00a0 9.00 \u2013 15.00 WIB<br \/>\nLokasi: Meeting Room Ibis Styles Hotel (All Season Hotel) Yogyakarta<\/p>\n<p><strong>Investasi :<\/strong><br \/>\nRp. 2.900.000,-\/ peserta<br \/>\n(Catatan : Investasi belum termasuk akomodasi penginapan)<\/p>\n<p><strong>PENDAFTARAN<\/strong><br \/>\nSilahkan mengisi formulir Pendaftaran<br \/>\nhttp:\/\/rootbrain.com\/training\/registration\/<\/p>\n<p><strong>Wireless Management &amp; Security<\/strong><br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\nOverview:<br \/>\nDuring this course students will learn how to hack\/attack &amp; protect Wireless Network, how to install wireless Access Point &amp; secure it, configure &amp; optimizing wireless hotspot management using Captive Portal &amp; Radius Server, how to monitoring wireless network, how to limit user by time or volume download or limit user bandwidth<\/p>\n<p>Benefit you will get:<br \/>\nTrainer very Qualified &amp; Certified<br \/>\nLab Work &amp; Practices Demonstration with Direct Internet Connection<br \/>\nCertificate of Attendance<br \/>\nHardcopy Training Modules<br \/>\nCoffee Break &amp; Lunch<\/p>\n<p>Trainer &amp; Consultant :<br \/>\nOur consultant &amp; trainer is very qualified which is not only equipped with professional certifications (CEH, CHFI,ECSA\/LPT, ACE, MCP, RHCT, MTCNA, CCNP, CCNA, CompTIA Security+, Network+, Linux+), but also have hands-on real-world experiences with more than ten years. We will show you the best methods, tricks and practices in incorporating technologies to your business environment. We also provide training &amp; studying methods that are based on active, discovery and enjoy learning.<\/p>\n<p>Outline Course:<br \/>\nBasic Wireless Technology<br \/>\nBasic Wireless LAN Security<br \/>\nWireless Attack &amp; Defense<br \/>\n&#8211; MAC Filtering Attack<br \/>\n&#8211; WEP Attack<br \/>\n&#8211; WPA\/WPA2 PSK Attack<br \/>\n&#8211; WPA\/WPA2 Enterprise Attack<br \/>\n&#8211; WPS Attack<br \/>\n&#8211; Captive Portal Attack<br \/>\n&#8211; Android as Wireless Hacking Tools<br \/>\nCaptive Portal Concept<br \/>\nPreparing Hardware &amp; Linux OS for Captive Portal<br \/>\nBasic Chillispot Captive Portal<br \/>\nApplication Software Requirement<br \/>\nInstallation Captive Portal Software (Chillispot)<br \/>\nPreparing Kernel Linux Server as Captive Portal (Chillispot)<br \/>\nInstallation &amp; setup Database Server for Captive Portal (Chillispot)<br \/>\nInstallation Radius Server<br \/>\nInstallation Apache Web Server<br \/>\nConfiguring Iptables for Captive Portal<br \/>\nConfiguring Server Network and Firewall<br \/>\nConfiguring Chillispot Application<br \/>\nConfiguring Radius Server<br \/>\nConfiguring Apache Web Server<br \/>\nTesting Client using Hotspot<br \/>\nWeb Management for Radius<br \/>\nInstallation DaloRadius\/easyhotspot<br \/>\nAccount Administration using DaloRadius\/easyhotspot<br \/>\nAdministration &amp; Management quota<br \/>\nCaptive Portal Monitoring &amp; Maintenance<\/p>\n<p>&nbsp;<\/p>\n<p>RootBrain IT Security Training &amp; Consulting<br \/>\nNetwork &amp; Security Specialists<br \/>\nTelp.: 0274 3000459 Mobile: 0811 250 8780<br \/>\nEmail:\u00a0<a href=\"mailto:info@rootbrain.com\" target=\"_blank\">info@rootbrain.com<\/a><br \/>\nWebsite:\u00a0<a href=\"http:\/\/rootbrain.com\/\" target=\"_blank\">http:\/\/rootbrain.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>RootBrain IT Security Training &amp; Consulting yang mengkhususkan diri bergerak di bidang Keamanan Infrastruktur Jaringan dan Sistem Informasi akan mengadakan pelatihan dengan tema \u201cWireless Security &amp; Management\u201d. Pelatihan ini sangat diperlukan dalam mengamankan infrastruktur Teknologi Informasi perusahaan khususnya Jaringan Wireless. Setiap instansi telah menggunakan teknologi wireless untuk kemudahan akses sistem informasi dan internet. Berbagai ancaman [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/posts\/139"}],"collection":[{"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/comments?post=139"}],"version-history":[{"count":9,"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions"}],"predecessor-version":[{"id":141,"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions\/141"}],"wp:attachment":[{"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/media?parent=139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/categories?post=139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/josh.rootbrain.com\/blog\/wp-json\/wp\/v2\/tags?post=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}