Skip Ribbon Commands
Skip to main content
Computer Security Day

As new technologies develop, criminals find ways to apply these technologies to commit crimes. With the explosion of web technologies, almost all major businesses in the world have web presence thus exposing their data to legitimate and illegitimate users. With the proliferation of computers in our everyday lives, the need to include computer contents or traces as part of formal evidence has become inevitable. Computerized devices are part of our world in the form of laptops, desktop computers, servers, etc., but there are also many other storage devices that may contain forensic evidence. Devices such as memory cards, personal digital assistants, and video gaming systems, are among a myriad of devices that have the ability to accept input, provide output, and also store data. It is this data or the usage of these devices that is at the centre of Digital Forensics. In this regards, the National Computer Board, operating under the aegis of the Ministry of Technology, Communication and Innovation is planning to organise the following training programme.
 
 
​Training Course
 
    
 
Course: Network Forensics (Packet Analysis)​

Date​: 1st -3rd December 2015
 
    
 
Fees (per person)​:  Rs 23,000
 
 
All the courses will be run by specialist trainers from Valiant Technologies Consultancy LLC, UAE. At the end of each course and upon successful completion of an exam, participants will receive a professional certificate from the Information Security and Digital Forensics Research Foundation (ISDFRF), USA.
 
 
 
MQA approved.
 
 
 
Venue: ICT Academy, Cyber Tower 1, Ebene
 
 
 
Who should Attend
 
 
 
-   Information Security Consultants
 
-   Information Security Officers/Analyst/Engineers
 
-   IT Managers
 
-   Cybercrime Investigators
 
-   Incident Handlers
 
-   System Administrators
 
-   Network Administrators
 
-   Database Administrators
 
 
 
Course Contents
 
 

- Introduction to Protocol Analysis

- The functions of a Protocol Analyser

- Traffic capturing methods

- Analyse ARP Traffic

- Analyse ICMP traffic

- Filtering traffic using Display Filters

- Analyse DNS Traffic

- Analysing IPV4 Traffic

- Analysing SSL Encrypted Traffic

 
 
Duration
 
 
Three full days followed by an examination.
 
 
Assessment and Examination
 
 
Successful participants will be awarded with a Professional Certificate in Network Forensics via Packet Analysis from the Information Security & Digital Forensics Research Foundation, USA.
 
 
Methodology
 
 
Lectures, interactive sessions, tool demonstrations and hands-on lab sessions.
 
 
About the Trainers
 
 
Dr. K. Rama Subramaniam -  MBA(UK), Ph.D, FCA, FISC, FCFIP, CISSP, CISA, CISM, CEH, CHFI
 
 
Dr Subramaniam has over 25 years of experience in Information security, Digital Forensics. He is also a GRC consultant, audit and assurance professional, trainer and educator. Certified and experienced professional in the areas of creating and implementing full cycle Digital Forensic investigation processes; business continuity and disaster recovery plans; secure information security architecture; risk management systems and processes; internal controls systems and processes; anti-money laundering processes and frameworks; security audits and certification of network infrastructure, GRC systems, ERP application controls review, multifactor authentication (including PKI and X.509 compliant certification infrastructure); and assurance processes for SOX, COSO, COBIT, ITIL, PCI-DSS, ISM3, ISSAF, ISO-27001, ISO-22301, BS-25999, ISO-31000 and ISO-15408 compliant information security management systems.
 
 
 
Mr. A.K. Asokan – MBA (IT), Certified Ethical Hacker (CEH), CCNA, CCSA
 
 
Mr Asokan has over 8 years of experience in Training Digital Forensics, Networks and Information Security domain. He was also Commissioned by ISDFRF to write the first edition of DFIP Courseware and Lab manuals. He has also conducted more than 50 workshops in Digital Forensics and Information Security, Networking, Cryptography & VPN, etc. Engineers working in various organizations. His skills ranges from Networking (LAN/WAN), Check Point Firewall, Cisco Routers to Cryptography, Authentication , NAT, VPN and  Content Security.