ADP named to Forbes’ list of World’s Most Innovative Companies for second consecutive year

ADP, a leading provider of human capital management (HCM) services, announced that it has been named to Forbes magazine’s 2012 list of the World’s Most Innovative Companies, a ranking of the top 100 companies that investors expect to be innovative today and in the future. This is the second straight year that ADP has been honored, moving up 19 spots to number 68 on this year’s list.

The rankings, which appear on Forbes.com and in the September 5 issue of Forbes magazine, are determined by the publication’s Innovation Premium, a formula based on a company’s income, anticipated growth and cash flow valuations, among other factors. The data for this year’s analysis was taken from HOLT ValueSearch, a corporate performance and valuation advisory service of Credit Suisse.

NASDAQ congratulates ADP for being one of Forbes’ Most Innovative Companies in the World.

ADP has been present in the Philippines since 2010 and currently has a workforce close to 900 associates who provide implementation, payroll services, tax services, technical service, time and labor management, IT support and benefits administration for ADP Clients in the United States. Being a captive organization, ADP Philippines ensures that all key core and common practices of its parent company are integrated in its service delivery and operations. Inspiring innovation is one of the company’s corporate values and its associates in both the U.S. and the Philippines continue to search for new and better ways to serve the clients and grow the business.

Christmas Comes Early to ZALORA Philippines

ZALORA Philippines—the country’s first fashion retail website carrying a wide range of local and international brands for men, women, and kids—helps you beat the holiday rush with its Gift Ideas tab featuring present-worthy items for everyone in your Christmas gift list.

Located on the ZALORA Philippines homepage (www.ZALORA.com.ph), the Gift Ideas tab showcases ZALORA’s top picks for the gift-giving season. Purchase gifts for your mom, dad, kids, grandparents, pets, girlfriend, boyfriend, and colleagues. The eclectic and quality selection includes apparel, shoes, accessories, home, beauty, sports, and swimwear, to name a few.

Visit ZALORA Philippines at www.ZALORA.com.ph. Follow them on Twitter (@ZALORAPH), Instagram (@ZALORAPH), and tumblr (www.ZALORA-ph.tumblr.com).

Keeping the Flame of Learning Alive

The scholars along with Berjaya Foundation officials (seated, 2nd row from left: Tan Eng Hwa, Leo Laca, Paul Soo, Atty. Bong Bernas, and Resty Perez

Berjaya Philippines Inc. through its corporate social responsibility (CSR) arm, the Berjaya Foundation, has successfully chosen a new second batch of Filipino scholars who will have the opportunity to a good collegiate education with the help of scholarships and educational assistance provided by the Berjaya Group.

The 18 scholars were given a testimonial send-off lunch by officers of the Berjaya Philippines and the Berjaya Foundation before they left the country last September 27 for Kuala Lumpur in Malaysia to attend classes at the Berjaya University College of Hospitality. They are expected to earn their diplomas after finishing their courses in culinary arts, events management, hospitality management, tourism and travel management, and retail management.

Scholars were chosen from among the more-than-a-thousand applicants all over the country with the Foundation giving priority to the lesser-privileged but deserving students who have passed the examination and interview process. 15 more scholars will be leaving by end of the year to follow the second batch.

Aside from the tuition and miscellaneous fees, the Foundation also provides the students’ a monthly allowance of Malaysian Ringgit 1,500 to cover their accommodation and living expenses plus RM500 per semester for books.

Some of the members of the first batch of Berjaya scholars have already finished their courses and received their precious diplomas last August 2012. This pleased Berjaya Group Berhad’s founder and advisor Tan Sri Dato’ Seri Vincent Tan that he gives it a long-term commitment to sending more Filipino scholars to Malaysia.

“I started life in a poor family and could not even afford a proper tertiary education,” explained the Malaysian philanthropist, who retired early this year and passed the leadership of one of Malaysia’s biggest conglomerates to his son, Robin, in order to concentrate on his charitable activities. “I know what it is like not to have a lot of things that the average person these days will take for granted. I therefore consider myself very blessed to be where I am today despite the difficult early days, and ever since I achieved financial success I have felt a sense of responsibility to help those who are less fortunate,” he said in an interview with Forbes magazine.

“The graduation of the first batch of Berjaya scholars from the Philippines only shows that given the opportunity for a person in the marginalized sector of society to achieve his dreams when there is someone ready to help them,” said Paulino Soo, country head of Berjaya Group in the Philippines and president of the Berjaya Foundation on this recent development.

Linux Expert+ Security Program

on August 11-15, 2008

Course Fee: 22,500+12%VAT

Duration: 5days; 9am-5pm; M-F

Objective

This course looks at the network security in defensive view. The Linux Security program is designed to provide Expert skills needed to analyze the internal and external security threats against a network, and to develop / design / configure, security systems / appliances / applications that will protect an organization's information.

Students will learn how to evaluate network and Internet security issues and design. In addition, they will learn how to build a security appliance using the Linux OS and GPL Application.

This Course covers following courses:

· EC-Council Linux Security

· Novell SuSE Linux Administration

Course Outline/Agenda

Module1: General Considerations & Definition of Terms

Creating a security concept

Understanding the basics of a security concept

Performing a communication analysis

Analyzing protection requirements

Analyzing the current security situation and necessary enhancements

Module2: Designing Linux box for UTM Appliance

Installation & Configuration of Linux OS for Security Device

Hardening OS & Kernel

Installation for required services

Module3: Linux Networking Fundamentals

Explain the purposes and development of computer networking

Identify common types of networking hardware

Describe how networking software operates

Understand when popular networking protocols are used

Define network routing and describe the purpose of popular routing protocols

Module4: Configuring Basic Linux Networking

Describe how networking devices differ from other Linux devices

Configure Linux networking using scripts and text-mode utilities

Configure Linux networking using popular graphical utilities

Effectively use networking utilities to test a network and troubleshoot networking problems

Module5: Designing Firewalls over Linux

General Firewall Design

Understanding Firewall Concepts and Purpose

Describing firewall components

Packet Filters

Application-Level Gateways

Demilitarized Zone

Understanding Advantages and Disadvantages of firewall configurations

Packet Filters

Application-Level Gateways

Packet Filters

Understanding Packet Filters

Routing

Stateful Packet Filters

Understanding Advanced Firewall Features & Server

Design Firewall Appliance

Design / Configure smart GUI for Firewall Appliance

Understanding Network Address Translation (NAT)

Masquerading

NAT

PAT (Port Address Translation)

Module6: Designing VPN Appliances

Site to Site VPN Appliance

Client to Site VPN Appliance

Discussing

Module7: Setting up Secure Device Administration

Module8: Designing Internet Content Filter

Module9: Configuring Secure DNS Server

Module10: Designing IDS / IPS Appliance

Host Based Intrusion Detection System

Network Based Intrusion Detection System

Placing IDS / IPS to the Network

Module11: Configuring Secure DHCP Server

Module12: Design Vulnerability Scanning Appliance

Module13: Design Secure Email Server

Module14: Setting up secure sFTP Server

Module15: Design Security Audit Appliance

Module16: Security, Ethics and Privacy

List security risks typical in modern networked computer systems

Understand how to assess risk and create a security policy

Describe the function of top security-awareness organizations

Outline the role of the government in security and privacy

Module17: Making Data Secure

Explain commonly used cryptographic systems

Understand digital certificates and certificate authorities

Use the PGP and CPG data-encryption utilities

Describe different ways in which cryptography is applied to make computer systems more secure.

Module18: User Security

Follow good password security practices

Use Common utilities to promote user security

Module19: File Security

Correctly set up special Linux file permissions

Monitor log files to check for suspicious system activity

Automate checks for file integrity and unauthorized modifications

Module20: UTM Appliance deployment in real life scenarios

Positioning UTM Appliances

Deployment of appliance in production network

About the Speaker:

Mr. Islam is something of an expert when it comes to evaluating security products"

said Juniper Networks (2006)

Professional Profile

Almost 10 years of experience in designing networks and IT Security Infrastructure. Extensive knowledge and hands-on experience on Information Security for mission critical environments, Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for more than 25 enterprises & various Mid-level enterprises all around the world. Awarded as Master of IT by Juniper http://www.masterofit.net in 2006, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst).


Currently Mr. Islam is serving one of the largest Govt. Ministry of Kuwait as Network Security Consultant / Architect

Mr. Islam did consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall, IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances etc., Juniper, Snort / SAM / ACID names of few

ENROLL NOW!

GLOBAL KNOWLEDGE ASSOCIATES INC.

25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City, 1605 Philippines

Tel. No. (632) 683-0969 / 637-3657 Mobile: +63 920-709-8298

Email: sandra@globalknowledgeph.com Email2: sandramedalla@gmail.com

URL: www.gkphilippines.com

--
Network Security Consultant
CEH (Certified Ethical Hacker), ECSA (EC-Security Analyst) , Juniper Networks Master of IT
http://www.masterofit.net/index.php?filter=deck&cid=1

EC-Council ECSA/LPT Certification Bootcamp

Schedule

June 23-27, 2008


Duration / Course fee
5 days (9:00 – 5:00) php65,000.00+VAT/person, inclusive of ECSA Exam, Kit and Meal.

Exam
The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric exam 412-79 to receive the ECSA certification. The Student also will be prepared for the LPT certification.

Discount:

Please call 683-0969 / 637-3657 / 0920-709-8298 and look for Sandra.

Course Description

ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.

EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Who Should Attend
Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.

Course Outline v3

Module 1: The Need for Security Analysis

Module 2: Advanced Googling

Module 3: TCP/IP Packet Analysis

Module 4: Advanced Sniffing Techniques

Module 5: Vulnerability Analysis with Nessus

Module 6: Advanced Wireless Testing

Module 7: Designing a DMZ

Module 8: Snort Analysis

Module 9: Log Analysis

Module 10: Advanced Exploits and Tools

Module 11: Penetration Testing Methodologies

Module 12: Customers and Legal Agreements

Module 13: Penetration Testing Planning and Scheduling

Module 14: Pre Penetration Testing Checklist

Module 15: Information Gathering

Module 16: Vulnerability Analysis

Module 17: External Penetration Testing

Module 18: Internal Network Penetration Testing

Module 19: Router Penetration Testing

Module 20: Firewall Penetration Testing

Module 21: IDS Penetration Testing

Module 22: Wireless Network Penetration Testing

Module 23: Denial of Service Penetration Testing

Module 24: Password Cracking Penetration Testing

Module 25: Social Engineering Penetration Testing

Module 26: Stolen Laptop Penetration Testing

Module 27: Application Penetration Testing

Module 28: Physical Security Penetration Testing

Module 29: Database Penetration testing

Module 30: VoIP Penetration Testing

Module 31: VPN Penetration Testing

Module 32: Penetration Testing Report Analysis

Module 33: Penetration Testing Report and Documentation Writing

Module 34: Penetration Testing Deliverables and Conclusion

Module 35: Ethics of a Licensed Penetration Tester

To Register

Please call 683-0969 / 637-3657 and look for Sandra.

GLOBAL KNOWLEDGE ASSOCIATES INC
25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City , 1605 Philippines
Tel. No. (632) 683-0969 / 637-3657 Mobile No.: (+63) 920-709-8298
Email: sandra@globalknowledgeph.com YM: sandra_medalla@yahoo.com
URL: www.gkphilippines.com