Kariwala Towers, 4th Floor, Plot J/1-5, Block EP, Sector V, Salt Lake City, Kolkata - 700091
As per Nasscom, India will need
5 lakhs digital Forensic professionals over the coming 5 years. We currently have only 50,000. There is an acute deficit of skilled digital Forensic professionals in the industry. The demand will rise with Digital India & Industry 4.0 drive.
ISOAH is a group of experienced White-Hat Hackers with individual experience of 10-20 years in Information Security working in India & abroad, providing training & consultancy to MNCs, Government & Academia. Some of the audit clients for ISOAH are Apollo Gleneagles Hospital, CESC, Bandhan Bank, Jadavpur University, AMRI Hospitals, Spencer, Ambuja Realty, ABP Ltd, etc. ISOAH trains around 1200 students per year, who are working at E&Y, PWC, Deloitte, Tata Steel, Intel, Apple, Oracle, Amazon, TCS, CTS, etc. ISOAH is committee member to Nasscom East & CII ICT East.
12 Months
Masters/Graduate – Any science background (Maths / Computer science or application / Chemistry / Physics. BCA, BSc, MSc (Computer science, Cyber Security, Data Science, B.Tech IT or CSE), LAW, Forensic Science)
Rs.10,000/-
Rs.50,000/-
Rs.500/-
Rs.60,500/-
1 Year
of in-depth Training by the Best Digital Forensic Experts
On Campus Placement
Opportunities in Multinational Companies
PG Diploma
from MAKAUT (State Govt University)
Course Duration | 12 Months |
Total Hours | 240 IN Hours |
Total Theory Hours | 100 Hours |
Total Practical Hours | 140 Hours |
SL No | Paper | Hours |
---|---|---|
Theory | ||
SL No: 1 | Paper: Installing Python on Linux and another Operating Systems & Introduction | Hours: 4 Hrs |
SL No: 2 | Paper: Using quotes and escape character, String Concatenation and Repeater Operators | Hours: 2 Hrs |
SL No: 3 | Paper: Using Mathematical Operators with Numbers, len() with Lists | Hours: 2 Hrs |
SL No: 4 | Paper: Deleting List Element, Common list and operations, Accessing Dictionary values | Hours: 2 Hrs |
SL No: 5 | Paper: Adding, Replacing and Deleting key-value pairs, Functions: get(), keys(), values() and items() | Hours: 2 Hrs |
SL No: 6 | Paper: Using for Loops, Using Sequence Operators and Functions with Strings | Hours: 4 Hrs |
SL No: 7 | Paper: Indexing and Slicing Strings, Handling Exceptions | Hours: 4 Hrs |
Practical | ||
SL No: 8 | Paper: Lambda Function (filter(), map()), Functions: Recursive function | Hours: 5 Hrs |
SL No: 9 | Paper: Importing Modules, Writing Modules | Hours: 5 Hrs |
SL No: 10 | Paper: Using Modules in Programs, The open Function, Input from Text Files | Hours: 10 Hrs |
SL No | Paper | Hours |
---|---|---|
Theory | ||
SL No: 1 | Paper: LAN, MAN, WAN, Topology, Bits, Bytes and Octets | Hours: 4 Hrs |
SL No: 2 | Paper: What is Packet Tracer? & Packet Tracer Installation | Hours: 4 Hrs |
SL No: 3 | Paper: Introduction to IP and MAC Address, Use of IP and MAC Address | Hours: 2 Hrs |
SL No: 4 | Paper: IPv4(Classful Addressing), Public IP Private IP, Loopback Address and APIPA | Hours: 2 Hrs |
SL No: 5 | Paper: Default Subnet Mask, Calculate FLSM for Class C Address | Hours: 2 Hrs |
SL No: 6 | Paper: Calculate VLSM for 4-6 Network Requirement with variable Host, Brief explanation for TCP Header | Hours: 2 Hrs |
SL No: 7 | Paper: Comparison between OSI and TCP/IP Model, DHCP Configuration using 4pcs (Classful & Classless) | Hours: 4 Hrs |
Practical | ||
SL No: 8 | Paper: Configure DHCP Snooping with 2 Servers (DHCP Configured inside) and 4 PCs, Configure Port Security (Restrict, Protect, Shutdown Mode) (Sticky, Dynamic MAC Address, Maximum Address) | Hours: 10 Hrs |
SL No: 9 | Paper: Explain Different WAN Technologies (Leased Line, Circuit Switching, Packet Switching), Explain and Configure different Point to Point Link 5encapsulation technology (HDLC, PPP --> PAP, CHAP) | Hours: 5 Hrs |
SL No: 10 | Paper: Explain AAA and the working, Discuss the differences between TACACS+ and RADIUS | Hours: 5 Hrs |
SL No | Paper | Hours |
---|---|---|
Theory | ||
SL No: 1 | Paper: Brush up Linux (Optional), Brush up networking (Optional), What are the different types of hackers | Hours: 4 Hrs |
SL No: 2 | Paper: Information Gathering, Scanning | Hours: 4 Hrs |
SL No: 3 | Paper: System Hacking, System Hacking (Cont.), Reverse connection in different network using port forwarding | Hours: 2 Hrs |
SL No: 4 | Paper: Show software-based vulnerabilities (Badblue/iceblaster), Explain LDAP | Hours: 2 Hrs |
SL No: 5 | Paper: Explain how Kerberos works (Authentication Server, Ticket Granting Server, TGT etc.) | Hours: 2 Hrs |
SL No: 6 | Paper: Malware (Different types of Malware, Virus and Trojan) | Hours: 2 Hrs |
SL No: 7 | Paper: Man In the Middle Attack using the concept of ARP poisoning, Steganography | Hours: 4 Hrs |
Practical | ||
SL No: 8 | Paper: Wireless Attacks, Website Attacks, Prevention | Hours: 5 Hrs |
SL No: 9 | Paper: Explain different kinds of sql injection attacks, explain cookie stealing, session hijacking | Hours: 5 Hrs |
SL No: 10 | Paper: File upload vulnerability, Phishing Attack, DOS and DDOS attacks, Cloud based attacks | Hours: 10 Hrs |
SL No | Paper | Hours |
---|---|---|
Theory | ||
SL No: 1 | Paper: Computer Forensics in Today’s World | Hours: 4 Hrs |
SL No: 2 | Paper: Computer Forensics Investigation Process | Hours: 4 Hrs |
SL No: 3 | Paper: Understanding Hard Disks and File Systems | Hours: 2 Hrs |
SL No: 4 | Paper: Data Acquisition and Duplication | Hours: 2 Hrs |
SL No: 5 | Paper: Defeating Anti-Forensics Techniques | Hours: 2 Hrs |
SL No: 6 | Paper: Windows Forensics | Hours: 2 Hrs |
SL No: 7 | Paper: Linux and Mac Forensics | Hours: 4 Hrs |
Practical | ||
SL No: 8 | Paper: Linux and Mac Forensics | Hours: 5 Hrs |
SL No: 9 | Paper: Linux and Mac Forensics | Hours: 5 Hrs |
SL No: 10 | Paper: Computer Forensics Investigation Process | Hours: 10 Hrs |
SL No | Paper | Hours |
---|---|---|
Theory | ||
SL No: 1 | Paper: Network Forensics | Hours: 4 Hrs |
SL No: 2 | Paper: Investigating Web Attacks | Hours: 4 Hrs |
SL No: 3 | Paper: Mobile Data Recovery | Hours: 2 Hrs |
SL No: 4 | Paper: Dark Web Forensics | Hours: 2 Hrs |
SL No: 5 | Paper: Database Forensics | Hours: 2 Hrs |
SL No: 6 | Paper: Cloud Forensics | Hours: 2 Hrs |
SL No: 7 | Paper: Investigating Email Crimes | Hours: 4 Hrs |
Practical | ||
SL No: 8 | Paper: Mobile Data Recovery, IoT Forensics | Hours: 5 Hrs |
SL No: 9 | Paper: Dark Web Forensics | Hours: 5 Hrs |
SL No: 10 | Paper: Investigating Email Crimes, Malware Forensics | Hours: 10 Hrs |
Fields marked with * are mandatory.
Furthermore, we have working CA & Lawyers taking up our course. With rise in cybercrime, Digital Forensic professionals will be the most in demand experts in the industry.
Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5 lakhs digital Forensic professional over coming 5 years. Currently INDIA has only 50,000. Click on APPLY NOW to check ACTIVE DIGITAL Forensic JOBS.
Governmental initiative for digital India is a further impetus for increased demand for digital Forensic jobs.
Financial services institutions including banks, payment gateways and ecommerce organisations are the biggest employers in digital Forensic, according to Sunil Goel, managing director at GlobalHunt. In certain cases digital Forensic experts are reporting to the company boards directly.
The course duration is 12 months.
The course is administered in equal measures of practical and theory.
Masters/Graduate – Any science background (Maths / Computer science or application / Chemistry / Physics. BCA, BSc, MSc (Computer science, Cyber Security, Data Science, B.Tech IT or CSE), LAW, Forensic Science).
India is confronted with a scarcity of digital forensic professionals, especially at the top corporate levels. Hence the field has seen increased salaries offered for such roles by 25-35% over the past year.
Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5 lakhs digital Forensic professional over coming 5 years. Currently INDIA has only 50,000. Click on APPLY NOW to check DIGITAL Forensic JOBS.
Rs.10,000/-
Rs.50,000/-
Rs.500/-
Rs.60,500/-