Support: Security Awareness Training


security
awareness
training
access
control
security
solutions
auditing
infsec
medical
records
HIPAA
social
engineering
people
hacking

industrial
espionage
business
intelligence

hackers for hire
competitive
intelligence
operational
physical
technical
personnel
security
systems
Gramm-Leach-Bliley Act
GLBA
employee
training
requirements
infosec
counter
surveillance
countermeasures
information
warfare
spyware
information
security
education
industrial
spying
corporate

spies
privacy
consultants
identity
theft
confidential
private
cryptography
coersion
fear
compassion

Do those words mean anything to you?
They will.

About People Hacking: Security Awareness Training to prevent industrial espionage, competitive intelligence and corporate sabotage
Training: People Hacking: Security Awareness Training to prevent industrial espionage, competitive intelligence and corporate sabotage
Support for People Hacking: Information Security Awareness Training to prevent industrial espionage, competitive intelligence and corporate sabotage
Opportunities for hackers or franchise.
Contact Us: People Hacking Information Security Awareness Training to stop information warfare.
People Hacking: Information Security Awareness Training and Alternate Security Solutions to fight information warfare.
People Hacking: Information Security Awareness Training to prevent industrial espionage, competitive intelligence and corporate sabotage
More Info
Security Awareness Training
Support
Opportunities
Contact Us
Site Map and Links
People Hacking Home

security
awareness
training
access
control
security
solutions
auditing
infsec
medical
records
HIPAA
social
engineering
people
hacking

industrial
espionage
business
intelligence

hackers for hire
competitive
intelligence
operational
physical
technical
personnel
security
systems
Gramm-Leach-Bliley Act
GLBA
employee
training
requirements
infosec
counter
surveillance
countermeasures
information
warfare
spyware
information
security
education
industrial
spying
corporate

spies
privacy
consultants
identity
theft
confidential
private
cryptography
coersion
fear
compassion

Do those words mean anything to you?
They will

Support

Here is information about the support policy for the People Hacking services. As well as some Frequently Asked Questions(FAQs) for those who are interested in training.

OnLine support

Past and existing clients have online access to:


People Hacking: Security Awareness Training to prevent industrial espionage, competitive intelligence and corporate sabotage
Tutorials

People Hacking: Security Awareness Training to prevent industrial espionage, competitive intelligence and corporate sabotage
Frequently Asked Questions (FAQs) about prior training.

People Hacking: Security Awareness Training to prevent industrial espionage, competitive intelligence and corporate sabotage
OnLine Manuals

Support Phone Numbers

You don't really think that we keep this kind of information available online, do you? If you're a paid client, this number was given to you in your original evaluation dossier.

Frequently Asked Questions(FAQs)

Do you guys have [blah] certification?

No. Hackers don't need certification to do their "jobs" and neither do we. Look at it this way, by the time that someone writes up a test that could certify a hacker, the information is already outdated in this day and age. Our trainers do have their skills tested before they can join our team and it's a "real world" skill; they have to succeed via tenacity and ingenuity or else they can't join our ranks.

Isn't this illegal somehow?

No. For starters, it does not break any laws for you to audit your own security or to hire someone to do it for you. Secondly, the techniques that are used by the social engineers are completely legal themselves a large percentage of the time.

Do you have Training Courses on Video?

We license copies of our training course on DVD, VHS, or CDROM and online seminars/conferences are in the planning stages. Contact Us for more information.

Do you handle our Network Security?

While we will have special training set aside for your network administrators, we will not do any work to your computer systems because our focus is not on your computers but your employees. We can only recommend contractors that we've worked with before as we won't put ourselves in the position to be responsible for software errors.

How about Eavesdropping?

Electronic eavesdropping devices have increased in availability over the past few years and protecting your privacy against room and phone bugs, infinity transmitters, among others, is fastly becoming popular. Intermediate to advanced level counter-surveillance training is available.


Information Security Awareness Training, Alternate Security Solutions, Access Control, Infosec, HIPAA, Medical Records
[News] [Training] [Hackers] [Support] [Opportunities] [Contact Us] [Site Map]