MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by



Similar documents
Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

New-Age Master s Programme

Workshop Designed & Powered by TCIL IT, Chandigarh

Toll Free: Official Web:

Ethical Hacking & Cyber Security Workshop

IT and Cyber Security Training Courses

New-Age Undergraduate Programme

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Programme In Information Security Management

Dr. Shrishti Rrajhesh Gangalay, Assistant Professor, Mob: ,

CALLIDUS CORPORATE & MARITIME CONSULTING (CCMC)

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM

Prepare for success in the real world with practical learning. Presenting Certification in Equity Trading and Investment.

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Mitchell D. Kajzer B09 Flanner Hall Notre Dame, IN

Certified Cyber Security Analyst VS-1160

ITU-IMPACT Training and Skills Development Course Catalogue

3 day Workshop on Cyber Security & Ethical Hacking

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

Selected Students for Rass Capital, MBA 2014 Batch, on 2 nd December, S. No Name Branch Result. 1 Amit Sinha MBA Selected

Project Management Professional (PMP ) Exam Preparation

Venue : MCA Lab, PG Building, Tecnia Institute of Advanced Studies Program : MBA-I Year No. of Students : 47. Objectives:

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

ENTREPRENEURSHIP DEVELOPMENT

Certified Cyber Security Analyst VS-1160

JAYMAN INFOTECH PRIVATE LIMITED

HackINFINITY Workshop (A two day workshop on Ethical Hacking & Information Security)

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Train Like You Will Fight

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

Cyber Security, Cyber Crimes and Cyber Laws

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Computer Security and Investigations

1. ACADEMIC REPORT. 1 MCA DSS, DBMS, ADBMS, DCN, Operating System, MIS& DSS Projects guided for MCA- VI Sem (10 in , 10 in )

University Institute of Technology, Burdwan University

HIGHER EDUCATION AND TRAINING

ISO Information Security Management Services (Lot 4)

Information Security & Intelligence

How To Become A Policy Analyst

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

THE OSCEOLA COUNTY MEDICAL PIPELINE HEALTH LEADERS SUMMER ACADEMY WEEK ONE: July 7 th 11 th, 2014 WEEK TWO: July 14 th 18 th, 2014

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

A Two days workshop on Information Security & Ethical Hacking Workshop Designed & Conceptualised by:

Certificate in Management and Leadership/ MQF level 5

UNIVERSITY OF PUNE. Application for Admission for the degree of Doctor of Philosophy (Ph.D.) (To be forwarded through the Head, Place of Research)

FORBIDDEN - Ethical Hacking Workshop Duration

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

FAQs Post Graduate Certificate Program in Financial Economics ( ) Q1. Why a Post Graduate Certificate Program in Financial Economics (PGCP-FE)?

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

Information Systems and Tech (IST)

ADMISSION FOR POST GRADUATE DIPLOMA IN BANKING TECHNOLOGY (July 2016 Session)

Polish your potential and let your CFA dream shine. With ICICIdirect Centre for Financial Learning s CFA Level 1 training programme.

WORKSHOP ON SUPPLY CHAIN MANAGEMENT 4 th February 2015 to 8 th February 2015 at IIT Kanpur, INDIA CONDUCTED BY

New in online. Ground Realities. admission table. DULEEP DEOSTHALE, PhD

Section B. FACULTY OF COMPUTER APPLICATIONS SPECIFIC REGULATIONS APPLICABLE TO THE DEGREES OF B.C.A., M.C.A. and M.Phil. (COMPUTER APPLICATIONS)

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Scoping Questionnaire for Penetration Testing

TEQIP Workshop for Computer Science Teachers July 14-16, 2014

M. D. University Campus, Rohtak, Haryana Mobile:

Network Engineering Technology

AICTE SPONSORED SHORT TERM COURSE ON. Planning and Managing Human Resources: Tools & Techniques. (Under the Scheme of QIP, Min of HRD, Govt.

A Quality Assurance Model for Continuing Technical Education

1.0 Introduction. 2.0 DFD Activities. 2.1 Statistic of cases

Jawaharlal Nehru University, New Delhi Communication and Information Services. Report on Digital India Week

Two Weeks Faculty Development Programme on Entrepreneurship

Curriculum Vitae Ms. Lakshmi Kumar

ACHARYA INSTITUTE OF TECHNOLOGY Acharya Dr. Sarvepalli Radhakrishnan Road, Bangalore DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

CYBERTRON NETWORK SOLUTIONS

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Unit 3 Cyber security

Proposal for Communication Skills Program

Venue IIT Kharagpur Extension Centre HC Block, Sector III Salt Lake City, Kolkata

NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES & CONCERNS 27 TH & 28 TH DECEMBER 2014

SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

Faculty Details proforma for DU Web-site

ACBA. Advanced Certificate in Business Administration

Department of Computer Engineering. NNSC-14 Report

S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:

ACBA. Advanced Certificate in Business Administration. A Joint Program by Institute of Business Administration (IBA), University of Dhaka

Transcription:

MET s Institute of Engineering, Department of MCA Faculty Development Programme on Digital Forensic & Cyber Security Conducted by Department of MCA

MCA department has conducted Faculty Development Program on Digital Forensics & Cyber Security on 5 th May, 2015 to 9 th May, 2015. The main purpose of this Faculty development Program is to get keen knowledge of Digital Forensics and Cyber security with hands-on practice by using various tools. This workshop was taken by Mr. Paresh Chitnis, Director of CPAG, Nashik and Mr. Tanmay Dikshit, Nashik. Mr. Paresh Chitnis is a trainer and speaker on the subjects like Forensic Document Examination and fraud forgery investigation. He is a Graphologist and also delivers lectures on Digital Forensics. He has been a resource person for Digital Forensics workshops at Government Colleges and other institutions of Pune and Mumbai University. He has completed Masters in Chemistry from the reputed Dept of Chemistry, University of Pune. He is also a MBA from the reputed Dept of Management Science, University of Pune (PUMBA). Paresh Chitnis has completed graduation courses of Bachelor in Microbiology and Chemistry. He has worked for various organizations like CIPLA, Forbes Marshall, Camlin Pharma, Market Search etc. Presently he is the director at Centre for Personality Assessment and Graphology at Nashik. He has delivered seminars at Indian Medical Association, NIMA, NMA and MCCIA, IIT Mumbai and IIT Kanpur. He has been invited regularly as a trainer for the last four years at the Indian Armed Forces, Devlali. Mr. Tanmay dikshit is handwriting & signature analyst, Certified Computer Forensic (US), Certified Cyber Crime Investigator (India), certified ethical hacker (USA). He is a certified Trainer, Cyber security expert, digital forensic expert & competent to conduct seminars & workshops for info. Security, Comp & network security, internet threats & mob. Security & case study. He regularly trains Indian Army officers, Staff of detectives, advocates & cellular companies. He has been awarded as Young IT achiever in field of Cyber Crime investigation & information Security. He has been also awarded by State award & President Award by Government of India.. There were 46 participants participated in this faculty development program. This Faculty Development Program was divided into 5 days on Digital Forensics and cyber Security and it s various related concepts which were scheduled as follows-

Day1:- This day session starts on 9.00am. Felicitation of Mr. Paresh Sir and Mr. Tanmay Sir was done by Dr. M. U. Kharat and Prof. A. D. Deogire respectively. The session was divided into two parts- theory learning and practical implementation with hands-on experience. In first session, Digital Forensics and its types, email investigation, spoofing was explained by Mr. Paresh Sir. After lunch practical session was taken by Mr. Tanmay Sir by using various software for understanding how exactly emails spoofing and investigation is done. Case study based on 1 st day content were solved successfully by all participants. Day2:- This day session started on 9.30am. The session was divided into two parts- theory learning and practical implementation with hands-on experience. In first session, penetration testing was learned in which ethical hacking, SQL Injection were taught by Mr. Paresh Sir which created interest among participant. After lunch, practical session was taken by Mr. Tanmay Sir by using various software for understanding how exactly penetration testing is done. Also, performed practicals based on ethical hacking and SQL Injection. Case study based on 2 nd day content were solved successfully by all participants. Day 3:- The session was divided into two parts- theory learning and practical implementation with hands-on experience. In first session was having very interesting topic i.e. Forensics, in which image forensics & ISDF was taught by Mr. Paresh Sir. After lunch, practical session was taken by Mr. Tanmay Sir by using various software for understanding how exactly image forensics is done. Also, performed practicals based on image forensics. Case study based on 3 rd day content were solved successfully by all participants. Day4:- In this session, Forensics topic was continued with next sub-topic of it, i.e. Mobile forensics & Network Forensics, which were taught by Mr. Paresh Sir. After lunch, practical session was taken by Mr. Tanmay Sir by using various software for understanding how exactly Mobile forensics & Network Forensics is done. Also, performed practicals based on Mobile forensics & Network Forensics. Case study based on 4 th day content were solved successfully by all participants.

Day5:- On the 5 th day of FDP, an industrial expert, Mr. Jambotkar was called as a guest by Mr. Paresh Chitnis who guided & created awareness about digital interface & forensics. After that, SN & S Apps Forensics was taught by Mr. Tanmay Sir. Case study was solved by participants and presentations were given by participants which was given as assignment to all. After completing the session participants had given very good feedback about session. the