All the courses will be run by specialist trainers from Valiant Technologies Consultancy LLC, UAE. At the end of each course and upon successful completion of an exam, participants will receive a professional certificate from the Information Security and Digital Forensics Research Foundation (ISDFRF), USA.
Venue: ICT Academy, Cyber Tower 1, Ebene
Who should Attend
- Information Security Consultants
- Information Security Officers/Analyst/Engineers
- IT Managers
- Cybercrime Investigators
- Incident Handlers
- System Administrators
- Network Administrators
- Database Administrators
- Introduction to Protocol Analysis
- The functions of a Protocol Analyser
- Traffic capturing methods
- Analyse ARP Traffic
- Analyse ICMP traffic
- Filtering traffic using Display Filters
- Analyse DNS Traffic
- Analysing IPV4 Traffic
- Analysing SSL Encrypted Traffic
Three full days followed by an examination.
Assessment and Examination
Successful participants will be awarded with a Professional Certificate in Network Forensics via Packet Analysis from the Information Security & Digital Forensics Research Foundation, USA.
Lectures, interactive sessions, tool demonstrations and hands-on lab sessions.
About the Trainers
Dr. K. Rama Subramaniam - MBA(UK), Ph.D, FCA, FISC, FCFIP, CISSP, CISA, CISM, CEH, CHFI
Dr Subramaniam has over 25 years of experience in Information security, Digital Forensics. He is also a GRC consultant, audit and assurance professional, trainer and educator. Certified and experienced professional in the areas of creating and implementing full cycle Digital Forensic investigation processes; business continuity and disaster recovery plans; secure information security architecture; risk management systems and processes; internal controls systems and processes; anti-money laundering processes and frameworks; security audits and certification of network infrastructure, GRC systems, ERP application controls review, multifactor authentication (including PKI and X.509 compliant certification infrastructure); and assurance processes for SOX, COSO, COBIT, ITIL, PCI-DSS, ISM3, ISSAF, ISO-27001, ISO-22301, BS-25999, ISO-31000 and ISO-15408 compliant information security management systems.
Mr. A.K. Asokan – MBA (IT), Certified Ethical Hacker (CEH), CCNA, CCSA