IT Security & Forensic
Service Times: 9am and 10:30am
6399 North Wells Road, Bigtownville, CO 32748
Latest
  • Loading
f

EmailPrint

IT Security & Forensic

Academy of Management & Science (AMS), Dhaka, Bangladesh is the pioneer & best organization to provide IT Security & Forensic Training courses in Bangladesh through the most experienced resources. Therefore, AMS is the sole authorized training & examination partner of EC-Council. Academy of Management & Science (AMS) is also providing IT security & Forensic training courses of other a few globaly renowned vendors like ISACA, ISC2 and so on.

A few of its trainings of IT Security and Forensic domain are listed below:

   

Date: 2011-12-06 - 2011-12-11

License Penetration Tester is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field. The objective of the LPT is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing and aware of all the compliance requirements required by the industry. Unlike a normal security certification, the LPT is a program which trains security professionals to analyze the security posture of a network exhaustively and recommend corrective measures authoritatively. EC-Council's license vouches for their professionalism and expertise thereby making these professionals more sought after by organizations and consulting firms globally. Penetration Testing is a process of exploiting known vulnerabilities in a network. Most if not all government agencies around the globe test their network perimeter defense mechanisms continuously to ensure safe cyber boundaries. Cyber attacks did exist a decade ago but they did not create financial mayhem or threatened a nation's economy to the level in which it is being seen today. Today, as organizations are increasingly becoming networked, information is being exchanged electronically at the speed of thought. Routine tasks rely on computing power for accessing, providing, and storing information. Today an organization's lackadaisical information security posture may have a negative effect on its profitability or even it's existence.

Resource Person:

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer. 


A few of his major global professional accreditation are:

  • Certified Inform...

Date: 2011-12-20 - 2011-12-21

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Resource Person:

...

Date: 2012-01-06 - 2012-01-08

To ensure IT security in any system or any application is one of the most challenging task nowadays. As day progress new threats have identified. As Bangladesh has just entered into the digitization process and still system automation is just going on, it needs a number of efficient & technologically sound people to maintain those systems both in Government sector & private sector. There are a number globally renowned IT security certification courses for different level of users & professionals.

Resource Person:

Motashim Al Razi completed his graduation in Computer Science at Bangalore University, India and completed his MS in Information Security and Computer Forensics from University of East London, UK. He worked as a Digital Forensics analyst at IBM, UK for several years. Prior to joining IBM he worked as a system administrator in The Central College of London and Titan telecom, UK. He also attended magistrate court for IPR case proceedings. He is a Certified Ethical Hacker from EC-council and Cisco Certified Network Associate. During his working tenure with IBM he served as an IT security auditor in NHS (National Health Service), UK.

Currently he is involved in creating National Information Security policy for Bangladesh. He is an enlisted security auditor of Controller of Certifying Authority (CCA) of Bangladesh.  He is a IT security trainer a...

Date: 2012-01-20 -

The CNDA course has been specially designed for Government Agencies around the world. Other than the name the content is exactly the same as the CEH.

Resource Person:

...

Date: 2012-01-27 -

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system.  The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods, and incident recovery techniques in detail.

The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler.

Resource Person:

...

Date: 2012-01-30 - 2012-02-03

Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSs have become a necessary addition to the security infrastructure of nearly every organization.

Resource Person:

...

Date: 2012-01-31 -

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

Information security plays a vital role in most of the organizations. Information security is a state of affairs where information, information processing, and communication are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.

Network security plays a vital role in most of the organizations. It is the process of preventing and detecting the unauthorized use of your computer. It protects the networks and their services from the unauthorized modification, destruction, or disclosure. Network security provides assurance that a network performs its critical functions correctly and there are no harmful side effects.

Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases.

Resource Person:

...

Date: 2012-02-03 -

This course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.

Resource Person:

...

Date: 2012-02-10 -

EC-Council Certified Secure Programmer lays the basic foundation required by all application developers and development organizations to produce applications with greater stability and posing lesser security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.

The distinguishing aspect of ECSP is that unlike vendor or domain specific certifications, it exposes the aspirant to various programming languages from a security perspective. This drives greater appreciation for the platform / architecture / language one specializes on as well as an overview on related ones.

Resource Person:

...

Date: 2012-03-27 -

The EC-Council’s Network Security Administrator certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

The ENSA Course is for experienced hands in the industry and is backed by a curriculum designed by the best in the field. Students can gain greater industry acceptance as seasoned Network Security professional. Students learn to configure firewalls, intrusion detection systems and AV systems. Develop effective security policy in the company.

This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

Resource Person:

Mr. Motashim Al Razi

Mr. Motashim Al Razi, a renowned ICT security professional having vast experience in working with IT security & forensic nationally & abroad. He has completed his graduation in Computer Science at Bangalore University, India and completed his MS in Information Security and Computer Forensics from University of East London, UK.
He worked as a Digital Forensics analyst at IBM, UK for several years & was the team lead for digital forensic lab, He Deployed various programmes for HIDS and NIDS and also developed rules and subroutines for HIDS and NIDS (especially for OSSEC and Snort). He used to supervise the IT security audit team by extracting hidden data and forensic analysis of SAN systems, Blade servers, RAID and Quorum disks including system fault and fault tolerance rep...

Date: 2013-01-18 -

Globally Recognized Expertise in the Field of Information Security If you plan to build a career in information security – one of today’s most visible professions –the Certified Information Systems Security Professional (CISSP®) credential should be your next career goal.

A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

CISSP was the first credential in the field of information to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of  chievement.

Resource Person:

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer.

A few of his major global professional accreditation are:

Date: 2013-07-20 - 2013-07-25

EC Council Certified Security Analyst, ECSA an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker  certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these  tools  and  technologies. Through groundbreaking network penetration testing methods and techniques, this pen testing computer security  certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.

This makes the Certified Security Analyst "Pen Testing" certification a relevant milestone toward achieving EC Council’s Licensed penetration Tester, which also ingrains the learner in the business aspect of network penetration testing. The Licensed Penetration Tester standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.

The objective of Certified Security Analyst “pen testing” certification is to add value to experienced Information security professionals by providing computer security training that will help them analyze the outcomes of their Vulnerability Assessments. Network Penetration Testing Training leads the learner into the advanced stages of ethical hacking.

Resource Person:

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer.

A few of his major global professional accreditation are:

Date: 2013-09-20 - 2013-09-20

CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Learn from Experts in the field of Information Security We don't just have great instructors, our instructors have years of industry experience and are recognized as experts. The instructor is from the direct Security industry and has a vast experience in this field.

Why is this training so important in this Industry?

  • The most advanced course in the world that covers cutting edge of hacking technology. IT security researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community .The researches report and update advanced hacking tools every day on the member's portal and on www.hackerjournals.com
  • The CEH class deals with real life scenario and real threats by real life experts in the field.
  • Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests.
  • Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/ penetration tester.
  • Play with real life tools that are used by the hacking underground. The courseware is over 4,410 pages, covering 63 modules with over 60 GB of real life underground tools that are not found in any other training course anywhere in the world plus evaluation copies for Core Impact and Immunity in classes and security software that can be taken home!!!
  • Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space.
  • Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment.

Resource Person:

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer.

Date: 2013-09-21 - 2013-09-21

Globally Recognized Expertise in the Field of Information Security If you plan to build a career in information security – one of today’s most visible professions –the Certified Information Systems Security Professional (CISSP®) credential should be your next career goal.

A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

CISSP was the first credential in the field of information to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of  chievement.

Resource Person:

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer.

A few of his major global professional accreditation are:

Date: 2013-11-16 - 2013-11-16

CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Learn from Experts in the field of Information Security We don't just have great instructors, our instructors have years of industry experience and are recognized as experts. The instructor is from the direct Security industry and has a vast experience in this field.

Why is this training so important in this Industry?

  • The most advanced course in the world that covers cutting edge of hacking technology. IT security researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community .The researches report and update advanced hacking tools every day on the member's portal and on www.hackerjournals.com
  • The CEH class deals with real life scenario and real threats by real life experts in the field.
  • Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests.
  • Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/ penetration tester.
  • Play with real life tools that are used by the hacking underground. The courseware is over 4,410 pages, covering 63 modules with over 60 GB of real life underground tools that are not found in any other training course anywhere in the world plus evaluation copies for Core Impact and Immunity in classes and security software that can be taken home!!!
  • Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space.
  • Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment.

Resource Person:

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer.

Export to ical format

Training Calendar

<<  October  2017  >>
 S  M  T  W  T  F  S 
  1  2  3  4  5  6  7
  8  91011121314
15161718192021
22232425262728
293031    

Newsletter

AMS Campus Facilities

  • Two Air conditioned seminar halls with projector & audio system [Maximum Capacity up to 50 persons] including video recording capacity.
  • Two different PC Labs (Air conditioned)
  • Centralized server
  • Internet / WIFI facilities
  • Practice facilities in LABS
  • Online Exam Centre
  • Cafeteria & Own cook facility
  • Large lobby with natural surroundings
  • Huge Parking Space
  • Waiting Lounge
  • Distance education facilities
  • Printer, Scanner etc logistics facilities
  • Special Guest Room
  • Registration Booth Arrangement Space
  • 3 Star Accommodation arrangements for foreign guests on demand in walking distance from the center.
    ………and many more

Contact AMS

Academy of Management & Science (AMS)
House #450, Road # 31, New DOHS,Mohakhali, Dhaka-1206, Bangladesh
Cell No: (88) 01616004108
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

Academy Location

Testimonials

Show