1. JC Shield( A C y b e r S e c u r i t y d i v i s i o n o f J C V e n t u r e s )
Cyber Security Academy
2. About JC ShieldA C y b e r S e c u r i t y d i v i s i o n o f J C V e n t u r e s
2
We are JC Ventures, an ISO 9001–2015 certified company, having
national and international presence. Our clients are spread across the
country. We are registered under MSME, providing technology-based
solutions. We have always been driven by science and its application to
create superior technology. And with this superior technology, we
provide services far and wide.
These technology-based services are availed by our clients of diverse
domains. They range from banking, financial services and insurance
(BFSI) to cyber security services and training, security and surveillance
solutions, anti-drone technology and digital learning solutions.
Currently, we have a presence in 400 districts, with a growing network
of more than 3500 touch points, and serving 1 million customers across
the nation.
With an experienced professional team, the company is taking the
initiative in enhancing the GDP. At JC Ventures, we are all committed to
serve our clients in the best possible way through our expertise, reach
and resources which includes the latest in technology.
A member of DSCI (NASCOM), FICCI, CII.
9. JCS Certified Computer
Forensics Specialist (40 Hrs)
• What is digital forensics?
• What is digital forensic science?
• The role of digital forensics
• The role of the forensic scientist in law
• Essentials of digital acquisition & duplication
• Digital forensics evidence methodology
• Digital forensics analysis and research
• Digital Forensics protocols
• Digital Incident response, reporting and presenting in court
• OS Forensics fundamentals (Windows & Linux)
9
10. JCS Certified Windows Forensics
Professional(40 Hrs)
• Windows Operating Systems Focus
• Windows File Systems (NTFS, FAT, exFAT)
• Advanced Evidence Acquisition Tools and Techniques
• Registry Forensics
• Shell Item Forensics
• Windows Artifacts Analysis
• File and Metadata examination
• Email Forensics (Host, Server, Web)
• Event Log File Analysis
• Firefox, Chrome, Edge, and Internet Explorer Browser Forensics
• Deleted Registry Key and File Recovery
• Recovering Missing Data From Registry and ESE Database .Log Files
• String Searching and File Carving
• Media Analysis and Exploitation
• Recovery deleted files and partitions
• Tools and case study
• Expert witness
10
11. THANK YOU
w w w . j c s h i e l d . n e t
l e a r n @ j c s h i e l d . n e t
vp@jcventures.in