SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
DIS10.3Data and Information security | Council of India
DIS10.3:Cyber Forensics and Investigation Certification
HACKERS ARE NOT BORN, THEY BECOME HACKER
Online Training | Classroom Training |Workshops | Seminars
About DIS :Data and Internet
Security Council
www.disconsultants.org
What is DIS ?
www.bytecode.in
DIS is the Globally trusted Brand in Information security
and Ethical Hacking Training in world. DIS Consultants
include group of Advanced Security Researchers from
round the world who are real world Masters in Information
Security. DIS is Providing Training via Live Classroom,
Virtual Training Labs, Workshops, Webinars, Corporate
Training’s, and Training’s via DIS Certified Training
Centers (Authorized Training Partners).
DIS’S Digital Badge Program
DIS10.3:Cyber Forensics
and Investigation
Certification
www.disconsultants.orgwww.bytecode.in
DIS10.3 : Premium Cyber Forensics Certification
DIS10.3 : Cyber Forensics and Investigation Certification focuses on in-depth skill required for Computer
forensics Experts, Ethical hackers, Cyber Security Analysts, Penetrations Testers and Various Information
Security Experts to deeply analyze and extract the data from various Operating Systems in forensic Phase.
This course can be done by both working professionals and Colleges Students who wants to make there
career in the field of Computer hacking and Cyber Crime Investigations.
After attaining the Given Certification (DIS10.3 : Cyber Forensics and Investigation Certification) students
will be able to conduct Cyber forensics and investigations and can handle forensics Evidences as per
industry Standards. Candidates can handle various cyber crime incidences from various backgrounds. He
could detect intrusions and attacks from any outside or internal sources. Forensics is a science where we
have to backtrack the malicious hacker by using various forensics and anti- forensics Techniques.
CourseContent www.disconsultants.orgwww.bytecode.in
What Is Computer Forensics
Methods by which Computer gets Hacked
Computer Forensics Investigation Process
Digital Evidence Gathering
Computer Forensics Lab
Setting Up Forensics Lab
Understanding Hard Disks
File Systems Analysis: Linux/Windows/Mac
Windows File system Forensics
Data Acquisition Tools and Techniques
Data Imaging Techniques and Tool
Recovering Deleted Files and Folders
Deleted Partitions Recovery Technique
Forensics Investigations Using Forensics Tool Kit (FTK)
Forensics Investigations Using Forensics Tool Kit (Oxygen)
Forensics Investigations Using Encase Tool
Stenography and Image File Forensics
Application Password Crackers
Log Capturing and Event Correlation
Network Forensics Tools and Techniques
Mobile Forensics Tools : Cellebrite Tool Introduction
Investigating Logs.
Investigating Network Traffic : Wireshark
Investigating Wireless Attacks
Investigating Web Application Attacks via Logs
Tracking and Investigating Various Email Crimes
Detailed Investigative Reporting
Cyber Forensics
Certification
Who can Attend This Training ?
www.disconsultants.orgwww.bytecode.in
1. Students/Individuals
2. College going Students
3. Industry Expert
4. Network Specialist
5. Army/Navy Officials
6. Intelligence Agencies(Forensics Analyst)
7. College Faculties
8. Government and Corporate IT Managers
9. CEO/CTO and Higher Management Personals.
10. Security Tester who need to find network
based vulnerabilities and re-mediate them.
11. Penetration Testers
12. Ethical Hackers
13. RED OR BLUE team Members
14. Computer geeks who wants deep knowledge
about Computer Forensics
What Will You Get in DIS10.3 ?
www.disconsultants.orgwww.bytecode.in
1. ALL Virtual Machines and Virtual Environment for
Students who attend trainings.
2. DVD with tools , Videos , Practice Tests , Virtual
Labs.
3. Audio and Video Tutorials which will help in doing
practical sessions at your study desk also.
4. Written Test Voucher Code
5. Online Test Voucher Code
DIS10.3: Exam Details
www.disconsultants.orgwww.bytecode.in
Training Mode : Offensive/Cyber Crime Analysis
Course Duration : 60-80 Hours(Instructor-Led Training) 2
Hours /8 Hours /4 Hours Per Day
Exam Code : DIS10.3
Exam Duration: 4 Hours (Written)
Exam Duration: 8 Hours (Lab Challenge)
Exam Fee : 300 USD (Written + Lab Challenge) Credits: 25
Credits (Towards DIS10:Diploma in Information Security)
DIS Trainings and Exam's are only available at *Authorized Training Centers
Hands-on Training
www.disconsultants.orgwww.bytecode.in
•Understanding Forensics Investigations
•Digital evidence Gathering using various tools
•Hard disk Forensics and Imaging
•Computer Forensics using FTK/OXYGEN/Cellebrite Tool
•TCP Analysis Using Wireshark.
•Recovering Hard Disk Partitions, Files, Folders.
•Encase Forensics: For files, folders, stegnography, partition
recovery etc.
•File system Analysis: Linux/windows/Mac
•Tracing email /Email Header Reading/Spoof Email Detection
•Network and Wireless Attack Detection
•Web Applications Attack Forensics via Log Analysis
Techniques
www.disconsultants.orgwww.bytecode.in
Cyber Forensics and Investigator Certification DIS10.3 FAQS
What is Cyber Forensics?
Computer Forensics is a science in which Crime Investigators deeply analyze Cyber Crime evidences
and Cyber Crime Scene. In this Phase investigation should be conducted in an unbiased manner and
take out minor to minors of findings without affecting the original evidence.
What I will learn in this Cyber Forensics Testing certification DIS10.2 ?
In this certification you will learn how to start Cyber Crime Investigation Process. Finding the hidden
elements in Cyber world. How to go with Investigation Process. Understanding Computer Logs, Network
Logs and taking out the important evidences which could be presented in the court of Law.
Who will teach this Course?
This course is taught to you by industry professionals and is designed by industry well known security
consultants from round the world. Course is been taught by well experienced DIS Certified Trainers only.
How it’s different from other certifications Vendors in market?
This course is completely practical based approach it is not just slide based trainings or big huge books
based. This is completely a new practical full time approach for people who wants to get into security
domain. This is the most advanced security certification trainings in the world.
Workshop Trainings /Corporate Trainings
Placement Partners
www.disconsultants.orgwww.bytecode.in
www.disconsultants.orgwww.bytecode.in
Author Statement
A Forensics Investigation is a process of finding
evidences and catching the real malicious hacker
behind the Cyber Crime
DIS Consultants(Content Contributor)
– Mr Deepak Kumar, DIS Content Contributor
Cyber Forensics Investigator
www.disconsultants.orgwww.bytecode.in
How do I Pay for this Course ?
NEFT/RTGS/ Cash/Cheque/Demand Draft
Deposit to:
Acc. Name: "Bytecode Cyber Security Pvt Ltd"
Account No.: 00922560003606
IFSC Code: HDFC0000092
Swift Code: HDFCINBB
What next after this Course?
www.disconsultants.orgwww.bytecode.in
This Course will help you Understand
Advanced Computer Networking
Thank You
Call Us at 011-64601115
Mobile : +919210001115
Email: info@bytecode.in
Address: 72 B Third Floor Vikas Marg, Laxmi Nagar New
Delhi-110092
website: www.bytecode.in
website: www.bytec0de.com
INDIA|USA|Nigeria|Dubai|
Australia|UAE|Germany
www.disconsultants.orgwww.bytecode.in

Mais conteúdo relacionado

Destaque

1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"Rita Patri
 
Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010 Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010 Sukarya
 
Sleeping beauty (play script)
Sleeping beauty (play script)Sleeping beauty (play script)
Sleeping beauty (play script)Maia Teliashvili
 
LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR orlando jaramillo
 

Destaque (8)

1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"1º parte del libro "Déjalo ir"
1º parte del libro "Déjalo ir"
 
Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010 Sukarya and The Airtel Delhi Half marathon 2010
Sukarya and The Airtel Delhi Half marathon 2010
 
Weeding Presentation
Weeding PresentationWeeding Presentation
Weeding Presentation
 
Sleeping beauty (play script)
Sleeping beauty (play script)Sleeping beauty (play script)
Sleeping beauty (play script)
 
Slideshare
SlideshareSlideshare
Slideshare
 
cost ch(5)
cost ch(5)cost ch(5)
cost ch(5)
 
Audio cassete
Audio casseteAudio cassete
Audio cassete
 
LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR LOS MEJORES MONIGOTES DEL ECUADOR
LOS MEJORES MONIGOTES DEL ECUADOR
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Último (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Dis10.3 forensics and investigation Training and Certificaiton Course

  • 1. DIS10.3Data and Information security | Council of India DIS10.3:Cyber Forensics and Investigation Certification HACKERS ARE NOT BORN, THEY BECOME HACKER Online Training | Classroom Training |Workshops | Seminars
  • 2. About DIS :Data and Internet Security Council www.disconsultants.org What is DIS ? www.bytecode.in DIS is the Globally trusted Brand in Information security and Ethical Hacking Training in world. DIS Consultants include group of Advanced Security Researchers from round the world who are real world Masters in Information Security. DIS is Providing Training via Live Classroom, Virtual Training Labs, Workshops, Webinars, Corporate Training’s, and Training’s via DIS Certified Training Centers (Authorized Training Partners). DIS’S Digital Badge Program
  • 3. DIS10.3:Cyber Forensics and Investigation Certification www.disconsultants.orgwww.bytecode.in DIS10.3 : Premium Cyber Forensics Certification DIS10.3 : Cyber Forensics and Investigation Certification focuses on in-depth skill required for Computer forensics Experts, Ethical hackers, Cyber Security Analysts, Penetrations Testers and Various Information Security Experts to deeply analyze and extract the data from various Operating Systems in forensic Phase. This course can be done by both working professionals and Colleges Students who wants to make there career in the field of Computer hacking and Cyber Crime Investigations. After attaining the Given Certification (DIS10.3 : Cyber Forensics and Investigation Certification) students will be able to conduct Cyber forensics and investigations and can handle forensics Evidences as per industry Standards. Candidates can handle various cyber crime incidences from various backgrounds. He could detect intrusions and attacks from any outside or internal sources. Forensics is a science where we have to backtrack the malicious hacker by using various forensics and anti- forensics Techniques.
  • 4. CourseContent www.disconsultants.orgwww.bytecode.in What Is Computer Forensics Methods by which Computer gets Hacked Computer Forensics Investigation Process Digital Evidence Gathering Computer Forensics Lab Setting Up Forensics Lab Understanding Hard Disks File Systems Analysis: Linux/Windows/Mac Windows File system Forensics Data Acquisition Tools and Techniques Data Imaging Techniques and Tool Recovering Deleted Files and Folders Deleted Partitions Recovery Technique Forensics Investigations Using Forensics Tool Kit (FTK) Forensics Investigations Using Forensics Tool Kit (Oxygen) Forensics Investigations Using Encase Tool Stenography and Image File Forensics Application Password Crackers Log Capturing and Event Correlation Network Forensics Tools and Techniques Mobile Forensics Tools : Cellebrite Tool Introduction Investigating Logs. Investigating Network Traffic : Wireshark Investigating Wireless Attacks Investigating Web Application Attacks via Logs Tracking and Investigating Various Email Crimes Detailed Investigative Reporting Cyber Forensics Certification
  • 5. Who can Attend This Training ? www.disconsultants.orgwww.bytecode.in 1. Students/Individuals 2. College going Students 3. Industry Expert 4. Network Specialist 5. Army/Navy Officials 6. Intelligence Agencies(Forensics Analyst) 7. College Faculties 8. Government and Corporate IT Managers 9. CEO/CTO and Higher Management Personals. 10. Security Tester who need to find network based vulnerabilities and re-mediate them. 11. Penetration Testers 12. Ethical Hackers 13. RED OR BLUE team Members 14. Computer geeks who wants deep knowledge about Computer Forensics
  • 6. What Will You Get in DIS10.3 ? www.disconsultants.orgwww.bytecode.in 1. ALL Virtual Machines and Virtual Environment for Students who attend trainings. 2. DVD with tools , Videos , Practice Tests , Virtual Labs. 3. Audio and Video Tutorials which will help in doing practical sessions at your study desk also. 4. Written Test Voucher Code 5. Online Test Voucher Code
  • 7. DIS10.3: Exam Details www.disconsultants.orgwww.bytecode.in Training Mode : Offensive/Cyber Crime Analysis Course Duration : 60-80 Hours(Instructor-Led Training) 2 Hours /8 Hours /4 Hours Per Day Exam Code : DIS10.3 Exam Duration: 4 Hours (Written) Exam Duration: 8 Hours (Lab Challenge) Exam Fee : 300 USD (Written + Lab Challenge) Credits: 25 Credits (Towards DIS10:Diploma in Information Security) DIS Trainings and Exam's are only available at *Authorized Training Centers
  • 8. Hands-on Training www.disconsultants.orgwww.bytecode.in •Understanding Forensics Investigations •Digital evidence Gathering using various tools •Hard disk Forensics and Imaging •Computer Forensics using FTK/OXYGEN/Cellebrite Tool •TCP Analysis Using Wireshark. •Recovering Hard Disk Partitions, Files, Folders. •Encase Forensics: For files, folders, stegnography, partition recovery etc. •File system Analysis: Linux/windows/Mac •Tracing email /Email Header Reading/Spoof Email Detection •Network and Wireless Attack Detection •Web Applications Attack Forensics via Log Analysis Techniques
  • 9. www.disconsultants.orgwww.bytecode.in Cyber Forensics and Investigator Certification DIS10.3 FAQS What is Cyber Forensics? Computer Forensics is a science in which Crime Investigators deeply analyze Cyber Crime evidences and Cyber Crime Scene. In this Phase investigation should be conducted in an unbiased manner and take out minor to minors of findings without affecting the original evidence. What I will learn in this Cyber Forensics Testing certification DIS10.2 ? In this certification you will learn how to start Cyber Crime Investigation Process. Finding the hidden elements in Cyber world. How to go with Investigation Process. Understanding Computer Logs, Network Logs and taking out the important evidences which could be presented in the court of Law. Who will teach this Course? This course is taught to you by industry professionals and is designed by industry well known security consultants from round the world. Course is been taught by well experienced DIS Certified Trainers only. How it’s different from other certifications Vendors in market? This course is completely practical based approach it is not just slide based trainings or big huge books based. This is completely a new practical full time approach for people who wants to get into security domain. This is the most advanced security certification trainings in the world.
  • 10. Workshop Trainings /Corporate Trainings Placement Partners www.disconsultants.orgwww.bytecode.in
  • 11. www.disconsultants.orgwww.bytecode.in Author Statement A Forensics Investigation is a process of finding evidences and catching the real malicious hacker behind the Cyber Crime DIS Consultants(Content Contributor) – Mr Deepak Kumar, DIS Content Contributor Cyber Forensics Investigator
  • 12. www.disconsultants.orgwww.bytecode.in How do I Pay for this Course ? NEFT/RTGS/ Cash/Cheque/Demand Draft Deposit to: Acc. Name: "Bytecode Cyber Security Pvt Ltd" Account No.: 00922560003606 IFSC Code: HDFC0000092 Swift Code: HDFCINBB
  • 13. What next after this Course? www.disconsultants.orgwww.bytecode.in This Course will help you Understand Advanced Computer Networking
  • 14. Thank You Call Us at 011-64601115 Mobile : +919210001115 Email: info@bytecode.in Address: 72 B Third Floor Vikas Marg, Laxmi Nagar New Delhi-110092 website: www.bytecode.in website: www.bytec0de.com INDIA|USA|Nigeria|Dubai| Australia|UAE|Germany www.disconsultants.orgwww.bytecode.in