• About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Events Page >
      • YCMOU
    • My Gallery >
      • News Gallery >
        • आपलं महानगर
        • देशदूत
        • दैनिक दिव्य मराठी
        • दैनिक गांवकरी
        • लोकमत
        • पुढारी
        • सकाळ
        • Tarun Bharat
        • Lokmat Times
        • The Nashik Herald
        • दैनिक लोकनामा
      • Radio
      • Television
      • Past Events >
        • FDP STTTP
        • PPDC
        • GCEKarad
        • KVIC
        • Kopykitab
        • Chandori
        • DACOE
        • Sanjivani Boot Camp
        • Pune Vidyarthi Griha's College of Engineering, Nashik
        • Fake News
        • Government Polytechnic
    • Tanmay's Initiative >
      • AI Digital Content Creation >
        • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Products
    • The Age Identifier
    • Secure Message ​Angel
    • Tools >
      • 1
      • 2
      • 3
    • Basics Knowledge >
      • Types & Skills of Hackers – Cyber Sanskar
      • WIFI
      • AI Bug Bounty
      • Hidden Protect Plus
      • Master Digital Forensics
      • Incident Response & Cyber Crime
      • Data Rescue Techniques for Effective Recovery
    • Blog
  • Contact Us
  • Join
    • Workshop >
      • Certified Ethical Hacker & Bug Bounty Security Researcher
      • Certified Cyber Security Specialist
      • Certified Cyber Crime Investigation
      • Certified Cyber & Digital Forensics Examination
      • Advanced Secure Communication Professional
      • Navjeevan Law College
      • Digital Skills Workshop
    • Cyber Officers >
      • AI Cyber Master >
        • Email Journey Tracker
        • Cryptography
        • Secre Data Analysis
        • Sim Card Guide
        • Micro SD Guide
        • Digital Evidence
    • Internship
    • Apprenticeship
    • Placement
  • AI Career Courses
    • Program Instructions >
      • Artificial Intelligence
      • Encryption Specialist >
        • Cryptography
      • Digital Forensics >
        • Data Recovery
        • Data Recovery Challenge
      • Cyber Investigation >
        • Investigation Guide
        • digital-evidence-education
        • Chain of Custody Management System
      • Ethical Hacker >
        • Cyber Attaks
        • Socill Media Challenge
        • social-engineering
        • digital-devices
        • Malware-education
        • physical-hacking
        • Case Flow
        • legal-sections-identifier
        • Cyber Career Pathway
      • Cyber Security >
        • Password Analyzer
      • Cyber Law >
        • cyber-offences-legal-mapper
      • Hardware & Networking >
        • Network Protocol Analyzer
        • Packet-data-journey
        • Browser Security
        • OS Command
        • System-Information-Dashboard
        • ports
        • sim-card-guide
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative
Cyber Sanskar
  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Events Page >
      • YCMOU
    • My Gallery >
      • News Gallery >
        • आपलं महानगर
        • देशदूत
        • दैनिक दिव्य मराठी
        • दैनिक गांवकरी
        • लोकमत
        • पुढारी
        • सकाळ
        • Tarun Bharat
        • Lokmat Times
        • The Nashik Herald
        • दैनिक लोकनामा
      • Radio
      • Television
      • Past Events >
        • FDP STTTP
        • PPDC
        • GCEKarad
        • KVIC
        • Kopykitab
        • Chandori
        • DACOE
        • Sanjivani Boot Camp
        • Pune Vidyarthi Griha's College of Engineering, Nashik
        • Fake News
        • Government Polytechnic
    • Tanmay's Initiative >
      • AI Digital Content Creation >
        • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Products
    • The Age Identifier
    • Secure Message ​Angel
    • Tools >
      • 1
      • 2
      • 3
    • Basics Knowledge >
      • Types & Skills of Hackers – Cyber Sanskar
      • WIFI
      • AI Bug Bounty
      • Hidden Protect Plus
      • Master Digital Forensics
      • Incident Response & Cyber Crime
      • Data Rescue Techniques for Effective Recovery
    • Blog
  • Contact Us
  • Join
    • Workshop >
      • Certified Ethical Hacker & Bug Bounty Security Researcher
      • Certified Cyber Security Specialist
      • Certified Cyber Crime Investigation
      • Certified Cyber & Digital Forensics Examination
      • Advanced Secure Communication Professional
      • Navjeevan Law College
      • Digital Skills Workshop
    • Cyber Officers >
      • AI Cyber Master >
        • Email Journey Tracker
        • Cryptography
        • Secre Data Analysis
        • Sim Card Guide
        • Micro SD Guide
        • Digital Evidence
    • Internship
    • Apprenticeship
    • Placement
  • AI Career Courses
    • Program Instructions >
      • Artificial Intelligence
      • Encryption Specialist >
        • Cryptography
      • Digital Forensics >
        • Data Recovery
        • Data Recovery Challenge
      • Cyber Investigation >
        • Investigation Guide
        • digital-evidence-education
        • Chain of Custody Management System
      • Ethical Hacker >
        • Cyber Attaks
        • Socill Media Challenge
        • social-engineering
        • digital-devices
        • Malware-education
        • physical-hacking
        • Case Flow
        • legal-sections-identifier
        • Cyber Career Pathway
      • Cyber Security >
        • Password Analyzer
      • Cyber Law >
        • cyber-offences-legal-mapper
      • Hardware & Networking >
        • Network Protocol Analyzer
        • Packet-data-journey
        • Browser Security
        • OS Command
        • System-Information-Dashboard
        • ports
        • sim-card-guide
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative

G K GUJAR MEMORIAL CHARITABLE TRUST'S

Picture
Picture

DR. ASHOK GUJAR TECHNICAL INSTITUTE'S
DR. DAULATRAO AHER COLLEGE OF ENGINEERING, KARAD
( Under Lead College Scheme Shivaji University, Kolhapur )
Department of Computer Science & Engineering Organized
One Week Short Term Training Program “Advance Cyber Forensics
investigation” on 14,15,16,17,18 June 2021

Principal : Dr. Anwar M. Mulla
Principal, Dr. Daulatrao Aher College of Engineering, Karad
Prof. Hanmant M. Kumbhar
Vice Principal, Dr. Daulatrao Aher College of Engineering, Karad
Head of Department :  Mr. Ashish N. Patil
Assistant Professor, Head of  Computer Science & Engineering department, Dr. Daulatrao Aher College of Engineering, Karad
Coordinator : Ms. Sumalatha Dhanraj Bandari
Assistant Professor, Department of Computer Science & Engineering, Dr. Daulatrao Aher College of Engineering, Karad
Ms. Sayali P. Shinde, Assistant Professor, Department of Computer Science & Engineering, Dr. Daulatrao Aher College of Engineering, Karad
Day 1 Awareness
  • Cyber Security
  • Cyber Crime Attacks
  • Real Time Case Studies
  • Network Forensics
  • IOT & Drone Forensics
  • Career Opportunities
Day 2 Techniques
  • Stenography
  • Cryptography
  • Live PC Auditing
  • Live Forensics
  • Hashing
  • Image Analysis
Day 3 Security
  • Tips & Tricks
  • Mobile Security
  • Track The Sender's Identity
  • Finding ISP
  • Email Forensics
  • Network Forensics
Day 4
Affiliate System
Day 5
Brain Computer Interface
Picture
Picture
Picture
Picture

Download Tutorials Files

geolocation_analysis_1.jpg
File Size: 52 kb
File Type: jpg
Download File

geolocation_analysis_2.jpg
File Size: 132 kb
File Type: jpg
Download File

photo.zip
File Size: 4840 kb
File Type: zip
Download File

pktitlesong.mp3
File Size: 11 kb
File Type: mp3
Download File

Download Software

USB Deview
File Size: 184 kb
File Type: exe
Download File

wifiinfoview.exe
File Size: 316 kb
File Type: exe
Download File

winaudit.exe
File Size: 1721 kb
File Type: exe
Download File

urlprotocolview.exe
File Size: 35 kb
File Type: exe
Download File

mylastsearch.exe
File Size: 69 kb
File Type: exe
Download File

Disk Forenscis
File Size: 201414 kb
File Type: zip
Download File

Keystroke
File Size: 310 kb
File Type: exe
Download File

https://www.qfxsoftware.com

http://whois.domaintools.com

Download Presentation

Email Header Analysis
File Size: 7908 kb
File Type: pptx
Download File

Hashing Cloning
File Size: 11293 kb
File Type: pptx
Download File

SMS Bombing
File Size: 4642 kb
File Type: pptx
Download File

    Feedback

    Advanced Cyber Forensics Investigation
    [object Object]
Download Certificate
















  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Events Page >
      • YCMOU
    • My Gallery >
      • News Gallery >
        • आपलं महानगर
        • देशदूत
        • दैनिक दिव्य मराठी
        • दैनिक गांवकरी
        • लोकमत
        • पुढारी
        • सकाळ
        • Tarun Bharat
        • Lokmat Times
        • The Nashik Herald
        • दैनिक लोकनामा
      • Radio
      • Television
      • Past Events >
        • FDP STTTP
        • PPDC
        • GCEKarad
        • KVIC
        • Kopykitab
        • Chandori
        • DACOE
        • Sanjivani Boot Camp
        • Pune Vidyarthi Griha's College of Engineering, Nashik
        • Fake News
        • Government Polytechnic
    • Tanmay's Initiative >
      • AI Digital Content Creation >
        • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Products
    • The Age Identifier
    • Secure Message ​Angel
    • Tools >
      • 1
      • 2
      • 3
    • Basics Knowledge >
      • Types & Skills of Hackers – Cyber Sanskar
      • WIFI
      • AI Bug Bounty
      • Hidden Protect Plus
      • Master Digital Forensics
      • Incident Response & Cyber Crime
      • Data Rescue Techniques for Effective Recovery
    • Blog
  • Contact Us
  • Join
    • Workshop >
      • Certified Ethical Hacker & Bug Bounty Security Researcher
      • Certified Cyber Security Specialist
      • Certified Cyber Crime Investigation
      • Certified Cyber & Digital Forensics Examination
      • Advanced Secure Communication Professional
      • Navjeevan Law College
      • Digital Skills Workshop
    • Cyber Officers >
      • AI Cyber Master >
        • Email Journey Tracker
        • Cryptography
        • Secre Data Analysis
        • Sim Card Guide
        • Micro SD Guide
        • Digital Evidence
    • Internship
    • Apprenticeship
    • Placement
  • AI Career Courses
    • Program Instructions >
      • Artificial Intelligence
      • Encryption Specialist >
        • Cryptography
      • Digital Forensics >
        • Data Recovery
        • Data Recovery Challenge
      • Cyber Investigation >
        • Investigation Guide
        • digital-evidence-education
        • Chain of Custody Management System
      • Ethical Hacker >
        • Cyber Attaks
        • Socill Media Challenge
        • social-engineering
        • digital-devices
        • Malware-education
        • physical-hacking
        • Case Flow
        • legal-sections-identifier
        • Cyber Career Pathway
      • Cyber Security >
        • Password Analyzer
      • Cyber Law >
        • cyber-offences-legal-mapper
      • Hardware & Networking >
        • Network Protocol Analyzer
        • Packet-data-journey
        • Browser Security
        • OS Command
        • System-Information-Dashboard
        • ports
        • sim-card-guide
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative