cissp
ceh
ethical hacking
penetration testing
cyber security
information security
it security
cissp training in pakistan
ceh training in pakistan
cissp in pakistan
ceh in pakistan
penetration testing companies in pakistan
penetration testing in pakistan
siem
cyber security operations center
vulnerability assessment
computer forensic
digital forensic
forensic services in pakistan
cyber security pakistan
cert pakistan
pakistan cert
malware analysis
27001
iso 27001
certified ethical hacking
ethical hacking in pakistan
ethical hacking
ethicak hacker
security operations center
csoc
gdpr
security awareness training
security awareness
computer emergency response team
computer emergency response team pakistan
computer forensic in pakistan
threat intelligence
security alerts and advisories
security advisories
computer security alerts
computer security advisories
security policies
information security policies
security policy template
forensic analysis
|
DIGITAL
FORENSIC BOOTCAMP |
Learn to recover, analyze,
and authenticate forensic data on Windows systems
Understand how to track
detailed user activity and how to organize findings for
use in incident response, internal investigations, and
civil/criminal litigation
Hand-on lab to practice
forensic techniques during the training
|
September,
2019
|
October,
2019
|
Starting
Date: 5th September, 2019
|
Starting
Date: To be announced
|
Last
Date for Registration: 27th August, 2019
|
Last
Date for Registration: To be announced
|
Duration:
1 Day (9:00am - 3:00pm daily)
Fee:
Rs.50,000 (exclusing tax) **Special Discount
for Students. Contact us for details**
Venue:
Karachi
|
Mr.
Qazi Mohammad Misbahuddin Ahmed is regarded as
the pioneer of information security services in
Pakistan. He holds the following industry leading
certifications:
-
Certified
Information Systems Security Professional
(CISSP)
-
Certified
Penetration Testing Specialist (CPTS)
-
Certified
Ethical Hacker (CEH)
-
COBIT
based IT Governance Exam (COBIT)
-
Information
Technology Infrastructure Library (ITIL)
-
Member of Business Continuity Institute (MBCI)
He has performed
several penetration tests, forensic analysis,
incident response procedures, security policy
implementation, information classification,
security governance and ISMS implementations
for many national and multi-national companies,
government and military organizations.
He served as
an Information Security Consultant to State
of Qatar's Ministry of Interior, where he was
responsible for setting up Qatar's National
Cyber Security Opearations Center (NCSOC), government
data classification, and develop a response
center for information security related issues
for Qatar's critical infrastructure. He provided
ISMS consultancy to several government ministries
and military organizations in Qatar.
Mr. Qazi has
also served as a member of Network Security
Taskforce, Government of Pakistan.
He has conducted
several workshops for high profile companies
and is a regular speaker at many IT events and
conferences like E-Merge, IT Expo, ProCOM, ITCN
Asia ProQuest and also served as a coordinator
and Judge at the ITCN Asia ProQuest Hacking
Competition. Qazi Ahmed is routinely called
to comment and discuss on IT security events
and has been featured on several TV channels
like GEO, ARY Digital, Indus News, PTV, NEO
TV and newspapers, magazines and newsletters
like DAWN, Spider, @internet, YAHOO!, CISCO,
Newsbytes, Wall Street Journal, India Times,
Hindustan Times etc.
Mr. Qazi is also
credited for finding the most severe security
vulnerability ever in Microsoft .NET Passport
services affecting millions of people worldwide.
Qazi Ahmed also enjoys the membership of renowned
worldwide High IQ society, Mensa.
|
Who Should Take This Course
- Information security
professionals who want to learn the in-depth concepts
of Windows digital forensics investigations
-
Incident
response team members who need to use deep-dive digital
forensics to help solve their Windows data breach
and intrusion cases
-
Law
enforcement officers, federal agents, or detectives
who want to become a deep subjectmatter expert on
digital forensics for Windows-based operating systems
-
Anyone
interested in a deep understanding of Windows forensics
who has a background in information systems, information
security, and computers
|
Our information security training
sessions have been attended by professionals from organizations
such as:
|
- Pakistan Atomic Energy
Commission
|
|
- Juma Al Majid Group
(UAE)
|
|
|
|
- Qasim International
Container Terminal
|
|
|
|
- Central College London
(UK)
|
|
|
- Central Depository
Company
|
- Karachi Electricity
Supply Corporation
|
|
|
|
|
|
- Agha Khan Education
Service
|
- Hamdard University
Network
|
|
|
- Sidat Hyder Morshed
Associates
|
COURSE
MODULES
- Overview of Digital
Business Security Issues
- Digital Evidence
- Chain of Custody
- Collect evidence by
imaging a hard drive using a Write Blocker
- Mount acquired disk
images and evidence
- Recover critical user
data from the evidence
- Report Writing
|
|
cyber
security network security
data security companies
information security companies
it security company
information security
it security
cyber security company
it security companies
cyber security companies
cyber security
internet security company
network security companies
security
cyber security services
internet security companies
computer security service
in it security
cybersecurity
it security information
cyber security information
cyber security providers
cyber security firms
it security info
cyber security software
computer security
security
systems security
company security
for security
it security systems
security monitoring
systems and security
home security
information security
it security
security solutions
security companies
security devices
access security
security protection
digital security
home security system
alarm security
security intelligence
best security
it security services
security: security at
security products
in it security
security operations
it security
cyber security services
cyber security
cyber security network security
security
in it security
cyber security information
it security information
cyber security network
information security program
computer security service
security technology
cybersecurity
data security companies
it and cyber security
it security network
cyber security software
digital security
data information security
cyber security risks
cyber security service
computer cyber security
it security companies
business it security
cyber security training
data security companies
information security companies
it security company
it security companies
it security
cyber security company
pakistan jobs
cyber security companies
network security companies
security
internet security company
internet security companies
cyber security services
information security
cyber security network security
cyber security
security technology
in it security
cyber security firms
cyber security providers
computer security service
digital security
it security network
information security website
|