SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
DIS10.3Data and Information security | Council of India
DIS10.3:Cyber Forensics and Investigation Certification
HACKERS ARE NOT BORN, THEY BECOME HACKER
Online Training | Classroom Training |Workshops | Seminars
About DIS :Data and Internet
Security Council
www.disconsultants.org
What is DIS ?
www.bytecode.in
DIS is the Globally trusted Brand in Information security
and Ethical Hacking Training in world. DIS Consultants
include group of Advanced Security Researchers from
round the world who are real world Masters in Information
Security. DIS is Providing Training via Live Classroom,
Virtual Training Labs, Workshops, Webinars, Corporate
Training’s, and Training’s via DIS Certified Training
Centers (Authorized Training Partners).
DIS’S Digital Badge Program
DIS10.3:Cyber Forensics
and Investigation
Certification
www.disconsultants.orgwww.bytecode.in
DIS10.3 : Premium Cyber Forensics Certification
DIS10.3 : Cyber Forensics and Investigation Certification focuses on in-depth skill required for Computer
forensics Experts, Ethical hackers, Cyber Security Analysts, Penetrations Testers and Various Information
Security Experts to deeply analyze and extract the data from various Operating Systems in forensic Phase.
This course can be done by both working professionals and Colleges Students who wants to make there
career in the field of Computer hacking and Cyber Crime Investigations.
After attaining the Given Certification (DIS10.3 : Cyber Forensics and Investigation Certification) students
will be able to conduct Cyber forensics and investigations and can handle forensics Evidences as per
industry Standards. Candidates can handle various cyber crime incidences from various backgrounds. He
could detect intrusions and attacks from any outside or internal sources. Forensics is a science where we
have to backtrack the malicious hacker by using various forensics and anti- forensics Techniques.
CourseContent www.disconsultants.orgwww.bytecode.in
What Is Computer Forensics
Methods by which Computer gets Hacked
Computer Forensics Investigation Process
Digital Evidence Gathering
Computer Forensics Lab
Setting Up Forensics Lab
Understanding Hard Disks
File Systems Analysis: Linux/Windows/Mac
Windows File system Forensics
Data Acquisition Tools and Techniques
Data Imaging Techniques and Tool
Recovering Deleted Files and Folders
Deleted Partitions Recovery Technique
Forensics Investigations Using Forensics Tool Kit (FTK)
Forensics Investigations Using Forensics Tool Kit (Oxygen)
Forensics Investigations Using Encase Tool
Stenography and Image File Forensics
Application Password Crackers
Log Capturing and Event Correlation
Network Forensics Tools and Techniques
Mobile Forensics Tools : Cellebrite Tool Introduction
Investigating Logs.
Investigating Network Traffic : Wireshark
Investigating Wireless Attacks
Investigating Web Application Attacks via Logs
Tracking and Investigating Various Email Crimes
Detailed Investigative Reporting
Cyber Forensics
Certification
Who can Attend This Training ?
www.disconsultants.orgwww.bytecode.in
1. Students/Individuals
2. College going Students
3. Industry Expert
4. Network Specialist
5. Army/Navy Officials
6. Intelligence Agencies(Forensics Analyst)
7. College Faculties
8. Government and Corporate IT Managers
9. CEO/CTO and Higher Management Personals.
10. Security Tester who need to find network
based vulnerabilities and re-mediate them.
11. Penetration Testers
12. Ethical Hackers
13. RED OR BLUE team Members
14. Computer geeks who wants deep knowledge
about Computer Forensics
What Will You Get in DIS10.3 ?
www.disconsultants.orgwww.bytecode.in
1. ALL Virtual Machines and Virtual Environment for
Students who attend trainings.
2. DVD with tools , Videos , Practice Tests , Virtual
Labs.
3. Audio and Video Tutorials which will help in doing
practical sessions at your study desk also.
4. Written Test Voucher Code
5. Online Test Voucher Code
DIS10.3: Exam Details
www.disconsultants.orgwww.bytecode.in
Training Mode : Offensive/Cyber Crime Analysis
Course Duration : 60-80 Hours(Instructor-Led Training) 2
Hours /8 Hours /4 Hours Per Day
Exam Code : DIS10.3
Exam Duration: 4 Hours (Written)
Exam Duration: 8 Hours (Lab Challenge)
Exam Fee : 300 USD (Written + Lab Challenge) Credits: 25
Credits (Towards DIS10:Diploma in Information Security)
DIS Trainings and Exam's are only available at *Authorized Training Centers
Hands-on Training
www.disconsultants.orgwww.bytecode.in
•Understanding Forensics Investigations
•Digital evidence Gathering using various tools
•Hard disk Forensics and Imaging
•Computer Forensics using FTK/OXYGEN/Cellebrite Tool
•TCP Analysis Using Wireshark.
•Recovering Hard Disk Partitions, Files, Folders.
•Encase Forensics: For files, folders, stegnography, partition
recovery etc.
•File system Analysis: Linux/windows/Mac
•Tracing email /Email Header Reading/Spoof Email Detection
•Network and Wireless Attack Detection
•Web Applications Attack Forensics via Log Analysis
Techniques
www.disconsultants.orgwww.bytecode.in
Cyber Forensics and Investigator Certification DIS10.3 FAQS
What is Cyber Forensics?
Computer Forensics is a science in which Crime Investigators deeply analyze Cyber Crime evidences
and Cyber Crime Scene. In this Phase investigation should be conducted in an unbiased manner and
take out minor to minors of findings without affecting the original evidence.
What I will learn in this Cyber Forensics Testing certification DIS10.2 ?
In this certification you will learn how to start Cyber Crime Investigation Process. Finding the hidden
elements in Cyber world. How to go with Investigation Process. Understanding Computer Logs, Network
Logs and taking out the important evidences which could be presented in the court of Law.
Who will teach this Course?
This course is taught to you by industry professionals and is designed by industry well known security
consultants from round the world. Course is been taught by well experienced DIS Certified Trainers only.
How it’s different from other certifications Vendors in market?
This course is completely practical based approach it is not just slide based trainings or big huge books
based. This is completely a new practical full time approach for people who wants to get into security
domain. This is the most advanced security certification trainings in the world.
Workshop Trainings /Corporate Trainings
Placement Partners
www.disconsultants.orgwww.bytecode.in
www.disconsultants.orgwww.bytecode.in
Author Statement
A Forensics Investigation is a process of finding
evidences and catching the real malicious hacker
behind the Cyber Crime
DIS Consultants(Content Contributor)
– Mr Deepak Kumar, DIS Content Contributor
Cyber Forensics Investigator
www.disconsultants.orgwww.bytecode.in
How do I Pay for this Course ?
NEFT/RTGS/ Cash/Cheque/Demand Draft
Deposit to:
Acc. Name: "Bytecode Cyber Security Pvt Ltd"
Account No.: 00922560003606
IFSC Code: HDFC0000092
Swift Code: HDFCINBB
What next after this Course?
www.disconsultants.orgwww.bytecode.in
This Course will help you Understand
Advanced Computer Networking
Thank You
Call Us at 011-64601115
Mobile : +919210001115
Email: info@bytecode.in
Address: 72 B Third Floor Vikas Marg, Laxmi Nagar New
Delhi-110092
website: www.bytecode.in
website: www.bytec0de.com
INDIA|USA|Nigeria|Dubai|
Australia|UAE|Germany
www.disconsultants.orgwww.bytecode.in

Mais conteúdo relacionado

Destaque

1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"Rita Patri
 
Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010 Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010 Sukarya
 
Sleeping beauty (play script)
Sleeping beauty (play script)Sleeping beauty (play script)
Sleeping beauty (play script)Maia Teliashvili
 
LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR orlando jaramillo
 

Destaque (8)

1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"
 
Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010 Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010
 
Weeding Presentation
Weeding PresentationWeeding Presentation
Weeding Presentation
 
Sleeping beauty (play script)
Sleeping beauty (play script)Sleeping beauty (play script)
Sleeping beauty (play script)
 
Slideshare
SlideshareSlideshare
Slideshare
 
cost ch(5)
cost ch(5)cost ch(5)
cost ch(5)
 
Audio cassete
Audio casseteAudio cassete
Audio cassete
 
LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR
 

Último

31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Último (20)

31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Dis10.3 forensics and investigation Training and Certificaiton Course

  • 1. DIS10.3Data and Information security | Council of India DIS10.3:Cyber Forensics and Investigation Certification HACKERS ARE NOT BORN, THEY BECOME HACKER Online Training | Classroom Training |Workshops | Seminars
  • 2. About DIS :Data and Internet Security Council www.disconsultants.org What is DIS ? www.bytecode.in DIS is the Globally trusted Brand in Information security and Ethical Hacking Training in world. DIS Consultants include group of Advanced Security Researchers from round the world who are real world Masters in Information Security. DIS is Providing Training via Live Classroom, Virtual Training Labs, Workshops, Webinars, Corporate Training’s, and Training’s via DIS Certified Training Centers (Authorized Training Partners). DIS’S Digital Badge Program
  • 3. DIS10.3:Cyber Forensics and Investigation Certification www.disconsultants.orgwww.bytecode.in DIS10.3 : Premium Cyber Forensics Certification DIS10.3 : Cyber Forensics and Investigation Certification focuses on in-depth skill required for Computer forensics Experts, Ethical hackers, Cyber Security Analysts, Penetrations Testers and Various Information Security Experts to deeply analyze and extract the data from various Operating Systems in forensic Phase. This course can be done by both working professionals and Colleges Students who wants to make there career in the field of Computer hacking and Cyber Crime Investigations. After attaining the Given Certification (DIS10.3 : Cyber Forensics and Investigation Certification) students will be able to conduct Cyber forensics and investigations and can handle forensics Evidences as per industry Standards. Candidates can handle various cyber crime incidences from various backgrounds. He could detect intrusions and attacks from any outside or internal sources. Forensics is a science where we have to backtrack the malicious hacker by using various forensics and anti- forensics Techniques.
  • 4. CourseContent www.disconsultants.orgwww.bytecode.in What Is Computer Forensics Methods by which Computer gets Hacked Computer Forensics Investigation Process Digital Evidence Gathering Computer Forensics Lab Setting Up Forensics Lab Understanding Hard Disks File Systems Analysis: Linux/Windows/Mac Windows File system Forensics Data Acquisition Tools and Techniques Data Imaging Techniques and Tool Recovering Deleted Files and Folders Deleted Partitions Recovery Technique Forensics Investigations Using Forensics Tool Kit (FTK) Forensics Investigations Using Forensics Tool Kit (Oxygen) Forensics Investigations Using Encase Tool Stenography and Image File Forensics Application Password Crackers Log Capturing and Event Correlation Network Forensics Tools and Techniques Mobile Forensics Tools : Cellebrite Tool Introduction Investigating Logs. Investigating Network Traffic : Wireshark Investigating Wireless Attacks Investigating Web Application Attacks via Logs Tracking and Investigating Various Email Crimes Detailed Investigative Reporting Cyber Forensics Certification
  • 5. Who can Attend This Training ? www.disconsultants.orgwww.bytecode.in 1. Students/Individuals 2. College going Students 3. Industry Expert 4. Network Specialist 5. Army/Navy Officials 6. Intelligence Agencies(Forensics Analyst) 7. College Faculties 8. Government and Corporate IT Managers 9. CEO/CTO and Higher Management Personals. 10. Security Tester who need to find network based vulnerabilities and re-mediate them. 11. Penetration Testers 12. Ethical Hackers 13. RED OR BLUE team Members 14. Computer geeks who wants deep knowledge about Computer Forensics
  • 6. What Will You Get in DIS10.3 ? www.disconsultants.orgwww.bytecode.in 1. ALL Virtual Machines and Virtual Environment for Students who attend trainings. 2. DVD with tools , Videos , Practice Tests , Virtual Labs. 3. Audio and Video Tutorials which will help in doing practical sessions at your study desk also. 4. Written Test Voucher Code 5. Online Test Voucher Code
  • 7. DIS10.3: Exam Details www.disconsultants.orgwww.bytecode.in Training Mode : Offensive/Cyber Crime Analysis Course Duration : 60-80 Hours(Instructor-Led Training) 2 Hours /8 Hours /4 Hours Per Day Exam Code : DIS10.3 Exam Duration: 4 Hours (Written) Exam Duration: 8 Hours (Lab Challenge) Exam Fee : 300 USD (Written + Lab Challenge) Credits: 25 Credits (Towards DIS10:Diploma in Information Security) DIS Trainings and Exam's are only available at *Authorized Training Centers
  • 8. Hands-on Training www.disconsultants.orgwww.bytecode.in •Understanding Forensics Investigations •Digital evidence Gathering using various tools •Hard disk Forensics and Imaging •Computer Forensics using FTK/OXYGEN/Cellebrite Tool •TCP Analysis Using Wireshark. •Recovering Hard Disk Partitions, Files, Folders. •Encase Forensics: For files, folders, stegnography, partition recovery etc. •File system Analysis: Linux/windows/Mac •Tracing email /Email Header Reading/Spoof Email Detection •Network and Wireless Attack Detection •Web Applications Attack Forensics via Log Analysis Techniques
  • 9. www.disconsultants.orgwww.bytecode.in Cyber Forensics and Investigator Certification DIS10.3 FAQS What is Cyber Forensics? Computer Forensics is a science in which Crime Investigators deeply analyze Cyber Crime evidences and Cyber Crime Scene. In this Phase investigation should be conducted in an unbiased manner and take out minor to minors of findings without affecting the original evidence. What I will learn in this Cyber Forensics Testing certification DIS10.2 ? In this certification you will learn how to start Cyber Crime Investigation Process. Finding the hidden elements in Cyber world. How to go with Investigation Process. Understanding Computer Logs, Network Logs and taking out the important evidences which could be presented in the court of Law. Who will teach this Course? This course is taught to you by industry professionals and is designed by industry well known security consultants from round the world. Course is been taught by well experienced DIS Certified Trainers only. How it’s different from other certifications Vendors in market? This course is completely practical based approach it is not just slide based trainings or big huge books based. This is completely a new practical full time approach for people who wants to get into security domain. This is the most advanced security certification trainings in the world.
  • 10. Workshop Trainings /Corporate Trainings Placement Partners www.disconsultants.orgwww.bytecode.in
  • 11. www.disconsultants.orgwww.bytecode.in Author Statement A Forensics Investigation is a process of finding evidences and catching the real malicious hacker behind the Cyber Crime DIS Consultants(Content Contributor) – Mr Deepak Kumar, DIS Content Contributor Cyber Forensics Investigator
  • 12. www.disconsultants.orgwww.bytecode.in How do I Pay for this Course ? NEFT/RTGS/ Cash/Cheque/Demand Draft Deposit to: Acc. Name: "Bytecode Cyber Security Pvt Ltd" Account No.: 00922560003606 IFSC Code: HDFC0000092 Swift Code: HDFCINBB
  • 13. What next after this Course? www.disconsultants.orgwww.bytecode.in This Course will help you Understand Advanced Computer Networking
  • 14. Thank You Call Us at 011-64601115 Mobile : +919210001115 Email: info@bytecode.in Address: 72 B Third Floor Vikas Marg, Laxmi Nagar New Delhi-110092 website: www.bytecode.in website: www.bytec0de.com INDIA|USA|Nigeria|Dubai| Australia|UAE|Germany www.disconsultants.orgwww.bytecode.in