IT Audit Comprehensive

The IT Audit course is designed to provide practical view in conducting IT audit and assurance in one organization.

The course is designed to support professional staffs to expand their understanding of information technology (IT) audit. The course presents a more in-depth view on the fundamentals of IT auditing by highlighting on topics such as: IT audit and control analysis, examination of control evidence in conducting IT audit, application control, and management of IT audit.

The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, students will gain a working understanding of the process of developing audit work programs.

Participants will be expected to gain a working understanding of how to identify reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process..

Each class session will include discussion on an IT audit management, security, control or audit issues that participants should be familiar with.

This course will delivered in Indonesian and/or English by Our Master Trainer:
DR, Ir. Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG)

Objectives

At the completion of this course, the participants should be able to :

  • Participants shall obtain an expanded understanding the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization
  • Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements
  • Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
  • Participants shall obtain the working ability to plan, conduct, and report on information technology audits
  • Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards

Target Audience

  • IT Managers
  • Security Managers
  • Auditing Staffs
  • IT Operation Staffs

Course Contents & Description

  1. Introduction to Information Technology Audit
    •The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit.
    •The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the IT audit or assurance report.
  2. Conducting Information Technology Audit
    •The class session shall describe on practical methodology in conducting the effective and efficient IT audit, expand upon the need for appropriate controls and assurance processes for business and IT environment. The participants will be geared toward gaining a working understanding of the content and value of the management guidelines and assurance methodology.
    •Discussion will focus on the importance of measurement in achieving organizational and IT objectives. The session will also focus on the business and IT environments subject to operational and control assessments (audit).
  3. Management Controls
    •The session will provide an overview of the control model such as: internal control, control analysis methodology from the Closing the Loop Framework, identification of business processes, considerations regarding materiality, and the assessment of IT value by which all these tools will be used assessing the appropriateness of IT processes.
    •The class session will also expand upon the audit process by providing methodology for developing audit strategies and developing audit work programs with reference to best practices (CobiT, BS 17799,etc).
    •In this regard, the participant will cover organizational structure, accountability, role of the IT steering committee and oversight functions, and method for ensuring that appropriate policies and procedures are in place.
  4. Application Controls
    •The class session will expand upon the requirements for application system audits, use of audit software, and IT service delivery.
    •From an audit perspective, the objective is to provide assurance that application systems have integrity, and that IT service management practices will ensure the delivery of the level of services required to meet the business organization’s objectives.
    •Topic areas will include such as: types of application systems, application control assessment, evaluating IT service agreements, problem management, help desk functions, and network standards.
  5. Evidence Collection and Evaluation
    •The class session will expand the methods in conducting the evidence collection, evaluation and reporting which cover the observed processes, documentary audit and analysis of evidence using appropriate tools such as: sampling, CAAT, and etc.
    •The participants will be driven towards having the capability in conducting effective evidence collection and evaluation which are essential
  6. Managing the IT Audit Function
    •The class session will focus on management issues regarding how to manage IT audit and assurance functions. The class material will include developing and assessing staff knowledge and skills, competency measurement, assignment of staff, documentation and continuing education requirements.
    •Discussion will be on best approaches for involvement in professional organizations, obtaining certifications, and professional development. The class will also focus on the key issues surrounding audit and assurance engagements, such as establishing auditee /auditor protocols, oral and written communication requirements, engagement administration, and follow-up requirements.

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Audit Comprehensive> atau klik di sini!
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax:021-5748888;  SMS/WA/Mobile: 08815608163 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

The Comprehensive IT Security Audit

Training IT Project

The IT Security Audit course is designed to provide practical view  in conducting IT audit and assurance in one organization. The course is designed to support professional staffs   to expand their understanding of information technology (IT) audit.
The course presents a more in-depth view on the fundamentals of IT auditing by highlighting  on topics such as:  IT  audit and control analysis, examination of control evidence in conducting IT audit, application control, Operating System and IT Infrastructure audit, and management of IT audit.
The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, participants will gain a working understanding of the process of developing audit work programs encompassing all elements of IT infrastructures.
Participants  will be expected to gain a working understanding of how to identify, reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process.
IT Security  Auditing covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Each class session will include discussion on an IT audit  management, security, control or audit issues that participants   should be familiar with.

This course will delivered in Indonesian and/or English by Our Master Trainer:
DR, Ir. Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG)

Course Objectives & Benefits

At the completion of this course, the participants should be able to :

  • Participants shall obtain an expanded understanding on  the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization, with the focus on IT infrastructures
  • The participants shall obtain the capability on  how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, participants  get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobIT standard.
  • Participants shall obtain the capability in conducting IT audit and implement  techniques in performing assurance, attestation, and audit engagements
  • Capability to build  and maintain an IT audit function within the organization with maximum effectiveness and value
  • Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
  • Participants shall obtain the working ability to plan, conduct, and report on information technology audits with specific focus on infrastructure vulnarability assesment and assurance, and drill down upon application vulnarabilities
  • Participants shall obtain  an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards
  • Capability to use  best prractices  and methodologies such as: COSO, CobiT, ITIL, ISO, and NSA INFOSEC

Who Should Attend

  • IT Managers
  • Security Managers
  • Auditing Staffs
  • IT Operation Staffs.

What You Will Learn

  1. Audit Overview
    The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit. The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the  IT audit or assurance report.
  2. Building an Effective Internal IT Audit Function
    The class session will focus on management issues regarding how to manage IT audit and assurance functions. The class material will include developing and assessing staff knowledge and skills, competency measurement, assignment of staff, documentation and continuing education requirements.
  3. The Audit Process
    Perform IT audit in accordance with IT audit standards, guidelines and best practices to assist the organizations in ensuring that its information technology and business system are protected and controlled.
  4. Auditing Techniques
    Describing all techniques which are available to implemented for IT infrastructure auditing
  5. Auditing Entity-Level Controls
    Describing all entities control level which encompassing embedded controls in the areas such as:

    • Operating system control in UNIX-, Linux-, and Windows-based operating systems
    • Controls in  network routers, switches, firewalls, WLANs, and mobile devices
    • Entity-level controls, data centers, and disaster recovery plans
    • Controls in  Web servers, platforms, and applications
    • Database  critical controls
  6. Auditing Data Centers and Disaster Recovery
    Describe how to conduct data center as disaster recovery site with all supporting infrastructures
  7. Auditing Switches, Routers, and Firewalls
    Describe how to perform auditing on network infrastructure and network appliances
  8. Auditing Windows Operating Systems
    Describe how to conduct auditing on operating system using effective and control-piercing methodology within the Windows operating system environment
  9. Auditing Unix and Linux Operating Systems
    Describe how to conduct auditing on operating system using reliant and control-focus  methodology within the Unix  operating system environment
  10. Auditing Web Servers
    Describe how to perform auditing on Web Servers  infrastructure and net     DMZ devices
  11. Auditing Databases
    Describe how to perform auditing on organization’s Database  and all operating support elements
  12. Auditing Applications
    Describe how to perform auditing on organization’s Enterprise Applications and the supporting modules
  13. Auditing WLAN and Mobile Devices
    Describe how to perform auditing on Wide Area Network infrastructure and interface able mobile devices.

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <The Comprehensive IT Security Audit>
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

Policies and Procedures To Prevent Fraud

Teknik Penyusunan Prosedur dan Kebijakan Pencegahan Kecurangan dan Penyelewengan

This manual is designed to help auditing CPAs, internal auditors, fraud investigators, and management understand how to thoroughly evaluate the system of internal controls, expose weaknesses that could lead to fraud, and take corrective action to reduce the possibility of victimization.

Pelatihan untuk Anda:

  • Internal and independent auditors seeking to increase their anti-fraud effectiveness
  • Professionals who want to help deter fraud within their entities
  • Employees and educators seeking the knowledge necessary to detect fraudulent activities

Pelatihan ini bertujuan untuk:

  • Membantu peserta dalam melakukan evaluasi terhadap sistem pengendalian internal
  • Membantu peserta dalam menyusun sistem pengendalian yang berorientasi pada pencegahan kecurangan
  • Membantu peserta menyusun prosedur dan kebijakan perusahaan dalam mencegah fraud
  • Membekali peserta dengan berbagai form dan manual yang relevan.

Pokok-Pokok Bahasan

  1. Embezzlement: Who Does It and When
  2. Consideration of Fraud in a Financial Statement Audit (SAS No.99)
  3. Essential Internal Control and Administrative Procedures to Avoid Embezzlement
  4. Clever Examples of Embezzlement
  5. Steps to Take if You Have Been Victimized by Fraud
  6. Identity Theft
  7. Internal Control Analysis, Documentation, and Recommendations for Improvement

Related Topics:

Informasi & Registrasi:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di < Policies And Procedures To Prevent Fraud>.
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila Anda membutuhkan inhouse training silahkan download Inhouse Training Request Form
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

Auditing the Enterprise Risk Management (ERM) Process

Dengan lahirnya strategi-strategi tata kelola perusahaan yang harus merangkul keseluruhan organisasi, risiko perusahaan secara keseluruhan telah menjadi dimensi yang sangat penting. Selain itu, sebagaimana telah disimpulkan bahwa kunci menuju pematuhan yang efektif adalah “pendekatan berbasis risiko dari atas ke bawah.” Bila dipahami dan diimplementasikan dengan benar, ERM merupakan dasar yang ideal bagi proses ini.

Pada seminar dua hari yang intensif ini Anda akan mempelajari metode-metode, struktur-struktur, dan alat-alat alternatif yang bisa digunakan untuk mengadakan ERM. Anda akan belajar bagaimana menetapkan aspek-aspek mana yang perlu diaudit dan bagaimana itu seharusnya dilakukan, mendapatkan pemahaman mengenai sifat-sifat kunci yang seharusnya dimiliki ERM, dan mengetahui mengapa sifat-sifat itu penting. Anda akan menjelajahi integrasi antara pengendalian dan risiko bisnis dan mengetahui bagaimana alat pengawasan dapat diciptakan yang bisa dimiliki oleh operasional dan yang akan memberikan hasil bisnis yang riil.
Pada hari terakhir dari pelatihan ini, kita akan mendiskusikan bagaimana menerapkan apa yang telah Anda pelajari ketika Anda ditantang untuk menentukan alat-alat, teknik-teknik, dan proses audit yang paling tepat untuk mengevaluasi sebuah situasi nyata ERM. Anda akan meninggalkan sesi ini dengan pemahaman yang solid mengenai bagaimana proses ERM yang berstruktur baik seharusnya beroperasi, apa yang penting bagi keberhasilan atau kegagalannya, dan bagaimana mengauditnya untuk menentukan efektivitasnya.

Pelatihan untuk Anda:

  • Auditor Internal atau Satuan Pengendalian Internal pada seluruh tingkatan: manajerial, supervisor, ketua tim, dan anggota tim
  • Staf profesional yang ingin memiliki pengetahuan tentang tatacara pelaksanaan audit operasional atas pelaksanaan ERM

Pelatihan ini bertujuan untuk:

  • Memberikan wawasan pemahaman peserta mengenai tatacara pelaksanaan audit operasional atas aktifitas dan efektifitas Enterprise Risk Management (ERM)
  • Membekali peserta dengan teknik dan pendekatan Audit Internal terhadap proses ERM
  • Secara umum pelatihan ini diharapkan akan memberikan pengetahuan dan wawasan baru bagi auditor dalam melakukan tugas-tugas audit yang bernilai tambah

Pokok-Pokok Pembahasan:

  1. Menetapkan unsur-unsur kunci ERM
    • mengidentifikasikan peristiwa-peristiwa risiko
    • menilai risiko, probabilitas, dan dampak
    • respon-respon risiko
    • memonitor proses ERM secara terus-menerus
  2. Pendekatan berbasis risiko dari atas ke bawah untuk mengadakan proses ERM
    • mapping the organisation to determine the natural risk assessment structure
    • struktur organisasi risiko
    • metode-metode untuk mengembangkan inventaris risiko yang akan digunakan sebagai dasar bagi ERM
    • mencari kelaziman
    • menilai struktur-struktur ERM alternatif: subjektif vs. objektif
  3. Mengembangkan proses pengauditan ERM
    • memperoleh pemahaman mengenai lingkungan ERM
    • menilai risiko lingkungan ERM
    • memfokuskan pengauditan dan menetapkan ruang lingkup pengauditan
    • menentukan pendekatan/alat-alat/teknik-teknik/strategi pengauditan
    • menentukan format laporan yang efektif untuk menghasilkan perubahan
  4. Mengaudit proses ERM
    • mengaudit struktur organisasi risiko: siapa, apa, di mana, bagaimana, dan mengapa
    • mengaudit kelengkapan dan pencakupan prasarana risiko
    • mengaudit arus informasi lingkungan ERM
  5. Mengaudit efektivitas ERM di organisasi
    • mengaudit kriteria evaluasi keberhasilan untuk ERM
    • Mengevaluasi dampak organisasi riil dari proses ERM dalam menghentikan atau meminimalisir risiko
    • mengaudit bidang-bidang yang menjadi perhatian khusus dalam ERM, termasuk outsourcing
    • mengaudit pemeliharaan dan inisiatif-inisiatif strategis masa depan di dalam ERM untuk membuatnya mutakhir dan terbaru

Related Topics:

Informasi & Registrasi:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <Auditing the Enterprise Risk Management (ERM) Process.
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila Anda membutuhkan inhouse training silahkan download Inhouse Training Request Form
  • Anda juga dapat menghubungi langsung penyelenggaranya – LPAI Indonesia – melalui Tel: 021-5748889; Fax:021-5748888;  SMS/WA: 08815608163 atau Email: lpai.indonesia<at>gmail.com

Project Management for Internal Auditor

Secara sederhana dapat dikatakan bahwa kegiatan audit merupakan sebuah proyek. Namun demikian masih sedikit auditor yang mampu menggunakan teknik sebagaimana manajer proyek menyelesaikan pekerjaannya secara on-time dan on-budget.
Pada intensive course dua hari ini Anda akan belajar bagaimana meningkatkan pengendalian biaya, pemanfaatan sumberdaya, dan penyelesaian audit yang tepat waktu dengan menggunakan teknik manajemen proyek yang sesuai (applicable) dengan internal audit. Dengan menggunakan contoh yang spesifik di bidang audit, Anda akan belajar bagaimana mengaplikasikan project planning, scheduling, controlling, and decision support concept and methodologies – dasar-dasar dari manajemen proyek.
Outline pelatihan ini dirancang untuk meningkatkan secara signifikan produktifitas Anda dalam perencanaan dan pengelolaan proyek-proyek audit dimasa datang.

Pelatihan untuk Anda:

  • Auditor Internal atau Satuan Pengendalian Internal yang ingin mengetahui bagaimana menjalankan kegiatan audit sebagai suatu proyek dengan menggunakan pendekatan metodologi manajemen proyek.
  • Financial, Operational, Information Systems, and External Auditors dengan pengalaman lebih dari dua tahun di bidang audit.

Tujuan dan Manfaat Pelatihan:

  • Memberikan pemahaman kepada peserta mengenai pengelolaan audit dengan menggunakan pendekatan metodologi manajemen proyek
  • Membekali peserta dengan dasar-dasar manajemen proyek yang mencakup initiating, planning, executing, controlling, dan closing
  • Pelatihan ini diharapkan akan meningkatkan secara signifikan produktifitas peserta dalam perencanaan dan pengelolaan proyek-proyek audit dimasa datang
  • Secara umum pelatihan ini diharapkan akan meningkatkan wawasan peserta dalam menjalankan tugas-tugas audit yang bernilai tambah

Pokok-Pokok Pembahasan:

  1. Project Management and Audit
    • defining project management
    • project management’s relevance to internal audit
    • standards for the professional practice of internal auditing and how they apply to project management
    • the project management process
  2. Fundamentals of Project Management
    • initiating
    • planning
    • executing
    • controlling
    • closing
  3. Communication Skills in Project Management
    • interviewing, negotiating, and facilitating techniques
    • managing meetings
  4. The Critical Role of Automation in Project Management
    • the world-class project management entity
    • B2B and systems thinking
  5. Variations in Organizational Roles in Project Management
    • management vs. internal audit
    • domestic vs. multi-national
    • team vs. individual engagements
    • large vs. small teams
    • operational/financial vs. IT
    • internal vs. outsourced
  6. Audit/Project Management
    • audit team variations
    • audit/project planning
    • audit/project leader’s responsibilities
    • controlling time management issues
    • managing multiple projects
  7. Using Project Management Throughout the Audit Process
    • pre-conferences
    • opening conferences
    • closing conferences
    • fieldwork management
    • workpaper review
    • issuing the audit report

Related Topics:

Informasi & Registrasi:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <Project Management for Internal Auditor> atau LPAI-223AI2.Pdf.
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila Anda membutuhkan inhouse training silahkan download Inhouse Training Request Form
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

Business Fraud Prevention Manual

Membahas Prinsip Dasar & Tatacara Penyusunan Manual Pencegahan Kecurangan yang Komprehensif dan Aplikatif disertai Contoh-Contoh

Seberapapun besar dan lamanya perusahaan dalam melakukan bisnis, tidak tertutup kemungkinan risiko adanya kecurangan terutama terhadap asset-asset perusahaan. Sistem yang ketatpun belum tentu dapat menjamin terhindarnya perusahaan dari kecurangan tersebut. Pada pelatihan dengan standard Association of Certification Fraud Exeminers (ACFE) ini, akan mengajak para pelaku bisnis, internal auditor, finance & accounting manager dan staff professional untuk memahami bagaimana mencegah adanya fraud di perusahaan.

Tujuan Pelatihan:

Menjelaskan kepada peserta mengenai:

  • Bagaimana fungsi fraud prevention manual dapat mencegah adanya fraud
  • Teknik mengevaluasi tingkat risiko yang muncul pada proses bisnis mulai dari pembelian, proses operasional hingga penjualan.
  • Bagaimana asset-asset yang vulnerable
  • Bagaimana membuat Manual yang efektif
  • Bagaimana mengimplementasikan dan mengevaluasi manual tersebut.

Siapa yang Menjadi Peserta?

  • Internal and independent auditors yang ingin meningkatkan efektifitas pencegahan kecurangan yang dijalankan di perusahaannya
  • Professionals finance & accounting yang ingin membantu pencegahan kecurangan di lingkungannya
  • SOP Manager/Officer
  • Employees and educators seeking the knowledge necessary to detect fraudulent activities

Pokok-pokok Bahasan:

  1. Memahami alasan, modus dan profil fraud
  2. Cash Fraud
    • Jenis cash fraud yang sering terjadi
    • Faktor penyebab dan kelemahan system yang ada
    • Manual Cash Fraud Prevention
  3. Inventory, Asset dan Other Asset Fraud
    • Jenis cash fraud yang sering terjadi
    • Red Flags adanya fraud
    • Manual Fraud Prevention
  4. Mencegah Employee Theft
    • Procedure dan Kebijakan pencegahan fraud
    • Manual Fraud Prevention
  5. Check Fraud
    • Tipe check fraud
    • Menditeksi, Menginvestigasi dan Mencegah Check Fraud
    • Manual Fraud Prevention
  6. Computer Fraud
  7. Vendor Fraud
    • Memahami “kickback dan gratitutes”
    • Mendeteksi adanya bribery
    • Teknik mencegah bribery
  8. Fraud dibidang lainnya
  9. Sharing dan Kasus

Related Topics:

Informasi & Registrasi:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <Business Fraud Prevention Manual>
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk Inhouse Training silakan download IHT Request Form dan dikirim kembali kepada kami melalui Fax/email setelah diisi dengan lengkap.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com