All the courses will be run by specialist trainers from Valiant Technologies Consultancy LLC, UAE. At the end of each course and upon successful completion of an exam, participants will receive a professional certificate from the Information Security and Digital Forensics Research Foundation (ISDFRF), USA.
Venue: ICT Academy, Cyber Tower 1, Ebene
About the Training Course
Digital Forensics Investigation Professional (DFIP)
This program lays a lot of emphasis on lab work and a minimum of 8 lab sessions are to be completed to attain the DFIP credentials. These lab exercises are spread throughout the course so that the candidates are familiar with various forensic processes. In addition to the lab exercises, each candidate will solve a problem that demonstrates their understanding of the principles of digital forensics.
Who should Attend
- Information Security Consultants
- Information Security Officers/Analyst/Engineers
- IT Managers
- Cybercrime Investigators
- Incident Handlers
- System Administrators
- Network Administrators
- Database Administrators
- Introduction to Digital Forensics
- OS Forensics – Windows, Linux and MAC
- Hard Drives, Partitions and Storage
- Data Hiding and Recovery Techniques
- E-mail and Web Forensics
- Live Forensics and Anti-Forensics
- Log Analysis, interpretation & Response
- Network Forensics
- IPR and Digital Forensics
Five full days followed by an examination.
Assessment and Examination
Successful participants will be awarded with the Certificate as “Digital Forensics Investigation Professional” from the Information Security & Digital Forensics Research Foundation, USA.
Lectures, interactive sessions, tool demonstrations and hands-on lab sessions.
About the Trainers
Dr. K. Rama Subramaniam - MBA(UK), Ph.D, FCA, FISC, FCFIP, CISSP, CISA, CISM, CEH, CHFI
Dr Subramaniam has over 25 years of experience in Information security, Digital Forensics. He is also a GRC consultant, audit and assurance professional, trainer and educator. Certified and experienced professional in the areas of creating and implementing full cycle Digital Forensic investigation processes; business continuity and disaster recovery plans; secure information security architecture; risk management systems and processes; internal controls systems and processes; anti-money laundering processes and frameworks; security audits and certification of network infrastructure, GRC systems, ERP application controls review, multifactor authentication (including PKI and X.509 compliant certification infrastructure); and assurance processes for SOX, COSO, COBIT, ITIL, PCI-DSS, ISM3, ISSAF, ISO-27001, ISO-22301, BS-25999, ISO-31000 and ISO-15408 compliant information security management systems.
Mr. A.K. Asokan – MBA (IT), Certified Ethical Hacker (CEH), CCNA, CCSA