cissp
ceh
ethical hacking
penetration testing
cyber security
information security
it security
cissp training in pakistan
ceh training in pakistan
cissp in pakistan
ceh in pakistan
penetration testing companies in pakistan
penetration testing in pakistan
siem
cyber security operations center
vulnerability assessment
computer forensic
digital forensic
forensic services in pakistan
cyber security pakistan
cert pakistan
pakistan cert
malware analysis
27001
iso 27001
certified ethical hacking
ethical hacking in pakistan
ethical hacking
ethicak hacker
security operations center
csoc
gdpr
security awareness training
security awareness
computer emergency response team
computer emergency response team pakistan
computer forensic in pakistan
threat intelligence
security alerts and advisories
security advisories
computer security alerts
computer security advisories
security policies
information security policies
security policy template
forensic analysis
DIGITAL FORENSIC BOOTCAMP

Learn to recover, analyze, and authenticate forensic data on Windows systems

Understand how to track detailed user activity and how to organize findings for use in incident response, internal investigations, and civil/criminal litigation

Hand-on lab to practice forensic techniques during the training

September, 2019
October, 2019
Starting Date: 5th September, 2019
Starting Date: To be announced
Last Date for Registration: 27th August, 2019
Last Date for Registration: To be announced

Duration: 1 Day (9:00am - 3:00pm daily)

Fee: Rs.50,000 (exclusing tax) **Special Discount for Students. Contact us for details**

Venue: Karachi

Who Teaches the Class?

Mr. Qazi Mohammad Misbahuddin Ahmed is regarded as the pioneer of information security services in Pakistan. He holds the following industry leading certifications:
  • Certified Information Systems Security Professional (CISSP)
  • Certified Penetration Testing Specialist (CPTS)
  • Certified Ethical Hacker (CEH)
  • COBIT based IT Governance Exam (COBIT)
  • Information Technology Infrastructure Library (ITIL)
  • Member of Business Continuity Institute (MBCI)

He has performed several penetration tests, forensic analysis, incident response procedures, security policy implementation, information classification, security governance and ISMS implementations for many national and multi-national companies, government and military organizations.

He served as an Information Security Consultant to State of Qatar's Ministry of Interior, where he was responsible for setting up Qatar's National Cyber Security Opearations Center (NCSOC), government data classification, and develop a response center for information security related issues for Qatar's critical infrastructure. He provided ISMS consultancy to several government ministries and military organizations in Qatar.

Mr. Qazi has also served as a member of Network Security Taskforce, Government of Pakistan.

He has conducted several workshops for high profile companies and is a regular speaker at many IT events and conferences like E-Merge, IT Expo, ProCOM, ITCN Asia ProQuest and also served as a coordinator and Judge at the ITCN Asia ProQuest Hacking Competition. Qazi Ahmed is routinely called to comment and discuss on IT security events and has been featured on several TV channels like GEO, ARY Digital, Indus News, PTV, NEO TV and newspapers, magazines and newsletters like DAWN, Spider, @internet, YAHOO!, CISCO, Newsbytes, Wall Street Journal, India Times, Hindustan Times etc.

Mr. Qazi is also credited for finding the most severe security vulnerability ever in Microsoft .NET Passport services affecting millions of people worldwide. Qazi Ahmed also enjoys the membership of renowned worldwide High IQ society, Mensa.

Who Should Take This Course

  • Information security professionals who want to learn the in-depth concepts of Windows digital forensics investigations
  • Incident response team members who need to use deep-dive digital forensics to help solve their Windows data breach and intrusion cases
  • Law enforcement officers, federal agents, or detectives who want to become a deep subjectmatter expert on digital forensics for Windows-based operating systems
  • Anyone interested in a deep understanding of Windows forensics who has a background in information systems, information security, and computers

Our information security training sessions have been attended by professionals from organizations such as:

  • Ministry of Defence
  • Pakistan Atomic Energy Commission
  • Ernst & Young
  • Juma Al Majid Group (UAE)
  • Unilever
  • Habibsons Bank (UK)
  • Allied Bank Limited
  • Qasim International Container Terminal
  • Agha Khan University
  • Dubai Islamic Bank
  • Qatar Airways
  • Central College London (UK)
  • Union Bank
  • Alliance Frances
  • Central Depository Company
  • Karachi Electricity Supply Corporation
  • Getz Pharma
  • Xpert2go Inc. (USA)
  • Compunet Online (ISP)
  • Lucky Textile Mills
  • Nadra
  • Agha Khan Education Service
  • Hamdard University Network
  • Habib Bank AG Zurich
  • Nakshbandi Industries
  • Sidat Hyder Morshed Associates

COURSE MODULES

  • Overview of Digital Business Security Issues
  • Digital Evidence
  • Chain of Custody
  • Collect evidence by imaging a hard drive using a Write Blocker
  • Mount acquired disk images and evidence
  • Recover critical user data from the evidence
  • Report Writing
cyber security network security
data security companies
information security companies
it security company
information security
it security
cyber security company
it security companies
cyber security companies
cyber security
internet security company
network security companies
security
cyber security services
internet security companies
computer security service
in it security
cybersecurity
it security information
cyber security information
cyber security providers
cyber security firms
it security info
cyber security software
computer security
security
systems security
company security
for security
it security systems
security monitoring
systems and security
home security
information security
it security
security solutions
security companies
security devices
access security
security protection
digital security
home security system
alarm security
security intelligence
best security
it security services
security: security at
security products
in it security
security operations
it security
cyber security services
cyber security
cyber security network security
security
in it security
cyber security information
it security information
cyber security network
information security program
computer security service
security technology
cybersecurity
data security companies
it and cyber security
it security network
cyber security software
digital security
data information security
cyber security risks
cyber security service
computer cyber security
it security companies
business it security
cyber security training
data security companies
information security companies
it security company
it security companies
it security
cyber security company
pakistan jobs
cyber security companies
network security companies
security
internet security company
internet security companies
cyber security services
information security
cyber security network security
cyber security
security technology
in it security
cyber security firms
cyber security providers
computer security service
digital security
it security network
information security website

All rights reserved. Copyright© PakCERT 2000-2024