Gargee S Hiray
Digital Forensic Speaker and Handwriting Analyst
  • Home
    • Education
    • Media
  • Workshop
    • Color Analysis
    • Digital Security
    • Forensics Analyst
    • Logo Analysis
    • Live Website Building
    • Handwriting & Signature
    • Smart Digital User
    • Virtual ID & Law
  • Student Area
    • Website
    • Android
    • Safe Surfing
    • Internship
  • Services
    • Investigation & Laws
    • Multimedia
    • Handwriting Analysis
  • Contact us

Basic

Computer Hardware
Network Hardware

Mobile & Computer Operating System
Boot Sequence & POST
Types of Software
Cache and Internet
Network protocols
Internet Corporation for Assigned Names
 and Numbers

IP / MAC / IMEI

Advance

Searching
Who is, People, Location, Website,
IMEI, MAC, IP
Port Scanning
Understanding Communication Protocol

Case Study

The Cases in
  1. Kidnapping,
  2. Cyber bulling,
  3. Virus Attacks,
  4. Cyber Pornography,
  5. Phishing,
  6. Social networking sites related,
  7. Email Scams,
  8. Music Piracy,
  9. Theft of Confidential Information,
  10. Software Piracy,
  11. Email Account Hacking,
  12. Credit Card Fraud,
  13. Web Defacement,
  14. Use of Internet and Computers by Terrorists,
  15. Online Sale of Illegal Articles,
  16. Source Code Theft,
  17. Tax Evasion and Money Laundering,
  18. Online Share Trading Fraud

Forensics

HDD
Collecting Digital Evidence,
Imaging & Cloning,
File Extensions,
Windows Files and Partitions

Analysis Files
Analyzing logs files,
Analyzing thumbs.db files,
SIM Contact, Messages,
Digital Media files,
Browser, Website

Recovery
Password
( Email, Office file, PDF File)
Recycle bin forensics
Delete data


Techniques

Email
Verification, Spoofing, Tracking,
Header Analysis, Auto Responder,
Log monitoring

Mobile
Call Recording & Logging
Caller ID
Protection, Spoofing, Blocking, 

Analysis

IP Address Filters
Analyzing Web Server Log
Viewing Local Windows Firewall Log
Viewing Windows Event Log
Protocol Analysis

Security

Laptop Security and PC Security,
Mobile Security and Tab Security,
Internet Protocol and CCTV Security,
Credit Card Security,
Browser Privacy & Security,
Online Banking & E-Shopping Security,
E-mail Security and Website Security,

Encryption and Decryption

Mobile & Computer Stenography,
Cryptography,
Symmetric and Asymmetric.


Investigation

Website Analysis,
IP Tracking,
Mobile Tracking,
Demo Case Studies,
Checklist,
Generating MD5 hash values.

Opportunity

How to become a expert in this filed?
How to get a job and where ?
Career Guidance..
Graduation.. in this field


Workshop Highlights

  1. Hands on Demonstrations of Latest Techniques and Tools.
  2. Presentation, Live Demos and Video.
  3. Interactive Question and Answer sessions.
  4. Education receive with personal one to one attention
  5. Latest and Updated Topics are covered
  6. Very useful for Students seeking a career in Information Security

Benefits

  1. all Participants received Certificate or Logo of Participation
  2. Education DVD
  3. How to daily update your self Technique?
  4. Industrial Training with us
  5. Industrial visit
  6. Career Guidance with scientific test 20%
.

Powered by Create your own unique website with customizable templates.