Forensic Certifications

Cyberspace is becoming an evermore dangerous place, especially to IT organizations that are charged with protecting sensitive data and maintaining web sites that generate revenue. Along with these dangers, studies show that internal threats are just as dangerous, particularly to applications that are readily accessible over intranets. Since locking down all networks is not a viable option, the only response that security managers can realistically execute is to harden their networks, applications and operating systems to a reasonable level of safety, and go on conducting business. A critical tool in the battle to identify IT infrastructure vulnerabilities is the ethical hack, which simulates an attack in order to truly understand the effectiveness of current security controls. Trying to secure a network without conducting an ethical hack is little more than guess work. Without proper validation, real assurance of security is impossible. Regular ethical hacks can create value beyond just identifying vulnerabilities. They can also help comply with regulatory mandates, protect against lawsuits and justify security investments. This latter benefit is particularly important as gaining the support of corporate management can be a major obstacle, particularly when using third-party ethical hacking vendors that provide an objectivity and expertise that internal resources simply can’t guarantee. Ethical hacks are truly a necessity in today’s computing environment, and any IT organization that forgoes this activity for long risks putting the entire enterprise in jeopardy.

EnCase® Computer Forensics Certification Training 4 days

Day 1
Day one starts with an introduction to EnCase® Forensic v6 and
examination methodology. Attendees are shown how to use EnCase
Forensic to acquire a complete copy of the data from a removable
disk in a forensically sound manner. The concept of digital evidence
and how computers work (paying particular regard to the associated
impact on forensic examination) are also included.
The main areas covered on Day 1 include:
• EnCase Forensic methodology
– Creating an EnCase Forensic case file
• Navigating within the EnCase Forensic environment
• EnCase Forensic concepts
– Safeguarding and preserving evidential data
• Understanding the concept of digital evidence and its
impact on an investigation
• The basics of acquiring a forensically sound copy of data
from a removable disk
• Understanding how computers work
– Hardware and associated terminology
– The CMOS, BIOS and boot sequence
– Interpreting binary and hexadecimal data
– The basics of text encoding

Day 2
Day two expands upon the information provided in day one, and begins with
a detailed discussion of the FAT file systems as well as an overview of the
NT file system. Hard disk acquisition is covered, using both a forensically
sound Linux CD, as well as the use of a hardware write-blocking device.
Attendees will learn how to properly preview a computer system prior to
acquisition as well as explore keyword searching and bookmarking of
relevant data.
The main areas covered on Day 2 include:
• NT/FAT File Systems
– How these file systems track data on their respective volumes
as well as what occurs when a file is created as well as deleted
• Acquisition of a hard disk
– Write-blocking technologies
– Acquisition using a forensically sound Linux operating system
» Drive-to-drive acquisition
» Network crossover-cable acquisition
– Previewing computer systems
– Creation of keywords and searching
– Basic bookmarking

Day 3
Day three includes more complex bookmarking of data. Instruction is given on the use of file signatures to properly identify file types. The principal and practical usage of digital fingerprints (hash value) to identify files of interest and exclude known files is also covered. Attendees will install external viewers within EnCase Forensic and learn how to copy data from within an evidence file. Restoring an evidence file back to physical media is also covered.
The main areas covered on Day 3 include:
• File types
– Discussion of the categories of files/folders and the icons
employed by EnCase F
orensic
• Reviewing search hits and bookmarking
– A more detailed discussion of b
ookmarking
and related options
• Signature analysis
– An automated comparison of the displayed file
e
xtension with the actual content of the file
• Hash analysis
– Using digital signatures to identify/e
xclude files
without visually e
xamining each one
• Installing external viewers
• Detailed copy/UnErase options
• Restoring evidence
– Often required by court order; necessary to
recover data and/or e
xamine the operation of the
host system in real-time

Day 4
Day four explores how to reacquire evidence in order to modify evidence-file parameters but still maintain data integrity. Attendees are given advice and guidance for archiving as well as instruction on how to restore and open an archived case. Attendees will observe first hand how EnCase Forensic can detect and identify any changes to the content of an evidence file. Practical instruction will then be given concerning the use of the Timeline viewer within EnCase Forensic and the recovery of deleted data from the unallocated space of a computer disk. Following this the importance of proper evidence handling will be discussed with the attendees being shown examples of good practice in this area.
The main areas covered on Day 4 include:
• Archiving and reopening an archived case
• Verification of an evidence file
• Timeline view
• Location and recovery of evidence in unallocated space
– Manually
– Using EnScript® programs
• The importance and practicalities of evidence handling

Other certifications

EnCase Training

EnCase Advanced Computer Forensics
EnCase Advanced Internet Examinations
EnCase Computer Forensics I
EnCase Computer Forensics II
EnCase Field Intelligence Model
Encase Network Intrusion Investigations
EnCase NTFS Cursus

ADF Training

ADF - Digital First Responder 2-daagse training

rsCASE Training

rsCASE Cursus

InfoZoom Workshop

InfoZoom Workshop

Analyst's Notebook Training

Analyst's Notebook Additional (2 dagen) -> vanaf 2011
Analyst's Notebook Basic (3 dagen) -> vanaf 2011
Analyst's Notebook Basiscursus V7
Analyst's Notebook Basiscursus V8
Analyst's Notebook Oefendag (1 dag) -> vanaf 2011
Analyst's Notebook Professional (5 dagen) -> vanaf 2011
Analyst's Notebook Upgrade cursus V8

iBase Training

iBase Designer (5 dagen) -> vanaf 2011
iBase Gebruikerscursus
iBase Oefendag (1 dag) -> vanaf 2011
iBase Ontwerperscursus
iBase User (3 dagen) -> vanaf 2011

Analyst's Workstation Training

GIS Basiscursus

TextChart Training

TextChart Cursus

ChartExplorer Training

ChartExplorer Cursus

AccessData Training

AccessData BootCamp Training
AccessData Mac Forensics Training
FTK 3.0 Upgrade training
Internet Forensics Training (Advanced)
Windows Forensics 7 Workshop
Windows Forensics Training - VISTA
Windows Forensics Training - XP

MicroSystemation training

XACT Training
XRY iPhone Forensics
XRY Training

Computer Hacking Forensics Investigator syllabus

Module I: Computer Forensics in Today’s World

  • Introduction
  • History of Forensics
  • Definition of Forensic Science
  • Definition of Computer Forensics
  • What Is Computer Forensics?
  • Need for Computer Forensics
  • Evolution of Computer Forensics
  • Computer Forensics Flaws and Risks
  • Corporate Espionage Statistics
  • Modes of Attacks
  • Cyber Crime
  • Examples of Cyber Crime
  • Reason for Cyber Attacks
  • Role of Computer Forensics in Tracking Cyber Criminals
  • Rules of Computer Forensics
  • Computer Forensics Methodologies
  • Accessing Computer Forensics Resources
  • Preparing for Computing Investigations
  • Maintaining professional conduct
  • Understanding Enforcement Agency Investigations
  • Understanding Corporate Investigations
  • Investigation Process
  • Digital Forensics

Module II: Law And Computer Forensics

  • What Is Cyber Crime?
  • What Is Computer Forensics?
  • Computer Facilitated Crimes
  • Reporting Security Breaches to Law Enforcement
  • National Infrastructure Protection Center
  • FBI
  • Federal Statutes
  • Cyber Laws
  • Approaches to Formulate Cyber Laws
  • Scientific Working Group on Digital Evidence (SWGDE)
  • Federal Laws
  • The USA Patriot Act of 2001
  • Freedom of Information Act
  • Building Cyber Crime Case
  • How the FBI Investigates Computer Crime?
  • How to Initiate an Investigation?
  • Legal Issues Involved in Seizure of Computer Equipments
  • Searching With a Warrant
  • Searching Without a Warrant
  • Privacy Issues Involved in Investigations
  • International Issues Related to Computer Forensics
  • Crime Legislation of EU
  • Cyber Crime Investigation

Module III: Computer Investigation Process

  • Investigating Computer Crime
  • Investigating a Company Policy Violation
  • Investigation Methodology
  • Evaluating the Case
  • Before the Investigation
  • Document Everything
  • Investigation Plan
  • Obtain Search Warrant
  • Warning Banners
  • Shutdown the Computer
  • Collecting the Evidence
  • Confiscation of Computer Equipments
  • Preserving the Evidence
  • Importance of Data-recovery Workstations and Software
  • Implementing an Investigation
  • Understanding Bit-stream Copies
  • Imaging the Evidence Disk
  • Examining the Digital Evidence
  • Closing the Case
  • Case Evaluation

Module IV: Computer Security Incident Response Team

  • Present Networking Scenario
  • Vulnerability
  • Vulnerability Statistics
  • What Is an Incident?
  • A Study by CERT Shows Alarming Rise in Incidents (security Breach
  • How to Identify an Incident
  • Whom to Report an Incident?
  • Incident Reporting
  • Category of Incidents
  • Handling Incidents
  • Procedure for Handling Incident
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Follow up
  • What Is CSIRT?
  • Why an Organization Needs an Incident Response Team?
  • Need for CSIRT
  • Example of CSIRT
  • CSIRT Vision
  • Vision
  • Best Practices for Creating a CSIRT
  • Step 1: Obtain Management Support and Buy-In
  • Step 2: Determine the CSIRT Development Strategic
  • Step 3: Gather Relevant Information
  • Step 4: Design your CSIRT Vision
  • Step 5: Communicate the CSIRT Vision
  • Step 6: Begin CSIRT Implementation
  • Step 7: Announce the CSIRT
  • Other Response Teams Acronyms and CSIRTs around the world
  • World CSIRT

Module V: Computer Forensic Laboratory Requirements

  • Budget Allocation for a Forensics Lab
  • Physical Location Needs of a Forensic Lab
  • Work Area of a Computer Forensics Lab
  • General Configuration of a Forensic
  • Equipment Needs in a Forensics Lab
  • Ambience of a Forensics Lab
  • Environmental Conditions
  • Recommended Eyestrain Considerations
  • Structural Design Considerations
  • Electrical Needs
  • Communications
  • Basic Workstation Requirements in a Forensic Lab
  • Consider stocking the following hardware peripherals
  • Maintain Operating System and Application Inventories
  • Common Terms
  • Physical Security Recommendations for a Forensic Lab
  • Fire-Suppression Systems
  • Evidence Locker Recommendations
  • Evidence Locker Combination Recommendations
  • Evidence Locker Padlock Recommendations
  • Facility Maintenance
  • Auditing a Computer Forensics Lab
  • Auditing a Forensics Lab
  • Forensics Lab
  • Mid Sized Lab
  • Forensic Lab Licensing Requisite
  • Forensic Lab Manager Responsibilities

Module VI: Understanding File systems and Hard disks

  • Disk Drive Overview - I
  • Hard Disk
  • Disk Platter
  • Tracks
  • Tracks Numbering
  • Sector
  • Sector addressing
  • Cluster
  • Cluster Size
  • Slack Space
  • Lost Clusters
  • Bad Sector
  • Understanding File Systems
  • Types of File System
  • List of Disk File Systems
  • List of Network file systems
  • Special Purpose File systems
  • Popular Linux File systems
  • Sun Solaris 10 File system - ZFS
  • Windows File systems
  • Mac OS X File system
  • CD-ROM / DVD File system
  • File system Comparison
  • Boot Sector
  • Exploring Microsoft File Structures
  • Disk Partition Concerns
  • Boot Partition Concerns
  • Examining FAT
  • NTFS
  • NTFS System Files
  • NTFS Partition Boot Sector
  • NTFS Master File Table (MFT)
  • NTFS Attributes
  • NTFS Data Stream
  • NTFS Compressed Files
  • NTFS Encrypted File Systems (EFS)
  • EFS File Structure
  • Metadata File Table (MFT)
  • EFS Recovery Key Agent
  • Deleting NTFS Files
  • Understanding Microsoft Boot Tasks
  • Windows XP system files
  • Understanding Boot Sequence DOS
  • Understanding MS-DOS Startup Tasks
  • Other DOS Operating Systems
  • Registry Data
  • Examining Registry Data

Module VII: Windows Forensics

  • Locating Evidence on Windows Systems
  • Gathering Volatile Evidence
  • Pslist
  • Forensic Tool: fport
  • Forensic Tool - Psloggedon
  • Investigating Windows File Slack
  • Examining File Systems
  • Built-in Tool: Sigverif
  • Word Extractor
  • Checking Registry
  • Reglite.exe
  • Tool: Resplendent Registrar 3.30
  • Microsoft Security ID
  • Importance of Memory Dump
  • Manual Memory Dumping in Windows 2000
  • Memory Dumping in Windows XP and Pmdump
  • System State Backup
  • How to Create a System State Backup?
  • Investigating Internet Traces
  • Tool - IECookiesView
  • Tool - IE History Viewer
  • Forensic Tool: Cache Monitor
  • CD-ROM Bootable Windows XP
  • Bart PE
  • Ultimate Boot CD-ROM
  • List of Tools in UB CD-ROM
  • Desktop Utilities
  • File Analysis Tools
  • File Management Tools
  • File Recovery Tools
  • File Transfer Tools
  • Hardware Info Tools
  • Process Viewer Tools
  • Registry Tools

Module VIII: Linux and Macintosh Boot processes

  • UNIX Overview
  • Linux Overview
  • Understanding Volumes -I
  • Exploring Unix/Linux Disk Data Structures
  • Understanding Unix/linux Boot Process
  • Understanding Linux Loader
  • Linux Boot Process Steps
  • Step 1: The Boot Manager
  • Step 2: init
  • Step 2.1: /etc/inittab
  • runlevels
  • Step 3: Services
  • Understanding Permission Modes
  • Unix and Linux Disk Drives and Partitioning Schemes
  • Mac OS X
  • Mac OS X Hidden Files
  • Booting Mac OS X
  • Mac OS X Boot Options
  • The Mac OS X Boot Process
  • Installing Mac OS X on Windows XP
  • PearPC
  • MacQuisition Boot CD

Module IX: Linux Forensics

  • Use of Linux as a Forensics Tool
  • Recognizing Partitions in Linux
  • File System in Linux
  • Linux Boot Sequence
  • Linux Forensics
  • Case Example
  • Step-by-step approach to Case 1 (a)
  • Step-by-step approach to Case 1 (b)
  • Step-by-step approach to Case 1 (c)
  • Step-by-step approach to Case 1 (d)
  • Case 2
  • Challenges in disk forensics with Linux
  • Step-by-step approach to Case 2 (a)
  • Step-by-step approach to Case 2 (b)
  • Step-by-step approach to Case 2 (c)
  • Popular Linux Tools

Module X: Data Acquisition and Duplication

  • Determining the Best Acquisition Methods
  • Data Recovery Contingencies
  • MS-DOS Data Acquisition Tools
  • DriveSpy
  • DriveSpy Data Manipulation Commands
  • DriveSpy Data Preservation Commands
  • Using Windows Data Acquisition Tools
  • Data Acquisition Tool: AccessData FTK Explorer
  • FTK
  • Acquiring Data on Linux
  • dd.exe (Windows XP Version)
  • Data Acquisition Tool: Snapback Exact
  • Data Arrest
  • Data Acquisition Tool: SafeBack
  • Data Acquisition Tool: Encase
  • Need for Data Duplication
  • Data Duplication Tool: R-drive Image
  • Data Duplication Tool: DriveLook
  • Data Duplication Tool: DiskExplorer

Module XI: Recovering Deleted Files

  • Introduction
  • Digital Evidence
  • Recycle Bin in Windows
  • Recycle Hidden Folder
  • Recycle folder
  • How to Undelete a File?
  • Tool: Search and Recover
  • Tool: Zero Assumption Digital Image Recovery
  • Data Recovery in Linux
  • Data Recovery Tool: E2undel
  • Data Recovery Tool: O&O Unerase
  • Data Recovery Tool: Restorer 2000
  • Data Recovery Tool: Badcopy Pro
  • Data Recovery Tool: File Scavenger
  • Data Recovery Tool: Mycroft V3
  • Data Recovery Tool: PC Parachute
  • Data Recovery Tool: Stellar Phoenix
  • Data Recovery Tool: Filesaver
  • Data Recovery Tool: Virtual Lab
  • Data Recovery Tool: R-linux
  • Data recovery tool: Drive and Data Recovery
  • Data recovery tool: active@ UNERASER - DATA recovery
  • Data recovery tool: Acronis Recovery Expert
  • Data Recovery Tool: Restoration
  • Data Recovery Tool: PC Inspector File Recovery

Module XII: Image Files Forensics

  • Introduction to Image Files
  • Recognizing an Image File
  • Understanding Bitmap and Vector Images
  • Metafile Graphics
  • Understanding Image File Formats
  • File types
  • Understanding Data Compression
  • Understanding Lossless and Lossy Compression
  • Locating and Recovering Image Files
  • Repairing Damaged Headers
  • Reconstructing File Fragments
  • Identifying Unknown File Formats
  • Analyzing Image File Headers
  • Picture Viewer: Ifran View
  • Picture Viewer: Acdsee
  • Picture Viewer: Thumbsplus
  • Steganography in Image Files
  • Steganalysis Tool: Hex Workshop
  • Steganalysis Tool: S-tools
  • Identifying Copyright Issues With Graphics

Module XIII: Steganography

  • Introduction
  • Important Terms in Stego-forensics
  • Background Information to Image Steganography
  • Steganography History
  • Evolution of Steganography
  • Steps for Hiding Information in Steganography
  • Six Categories of Steganography in Forensics
  • Types of Steganography
  • What Is Watermarking
  • Classification of Watermarking
  • Types of Watermarks
  • Steganographic Detection
  • Steganographic Attacks
  • Real World Uses of Steganography
  • Steganography in the Future
  • Unethical Use of Steganography
  • Hiding Information in Text Files
  • Hiding Information in Image Files
  • Process of Hiding Information in Image Files
  • Least Significant Bit
  • Masking and Filtering
  • Algorithms and Transformation
  • Hiding Information in Audio Files
  • Low-bit Encoding in Audio Files
  • Phase Coding
  • Spread Spectrum
  • Echo Data Hiding
  • Hiding Information in DNA
  • TEMPEST
  • The Steganography Tree
  • Steganography Tool: Fort Knox
  • Steganography Tool: Blindside
  • Steganography Tool: S- Tools
  • Steganography Tool: Steghide
  • Steganography Tool: Digital Identity
  • Steganography Tool: Stegowatch
  • Tool : Image Hide
  • Data Stash
  • Tool: Mp3Stego
  • Tool: Snow.exe
  • Tool: Camera/Shy
  • Steganography Detection

Module XIV: Computer Forensic Tools

  • Dump Tool: DS2DUMP
  • Dump Tool: Chaosreader
  • Slack Space & Data Recovery Tools: Drivespy
  • Slack Space & Data Recovery Tools: Ontrack
  • Hard Disk Write Protection Tools: Pdblock
  • Hard Disk Write Protection Tools: Nowrite & Firewire Drivedock
  • Permanent Deletion of Files:pdwipe
  • Disk Imaging Tools: Image & Iximager
  • Disk Imaging Tools: Snapback Datarrest
  • Partition Managers: PART & Explore2fs
  • Linux/unix Tools: Ltools and Mtools
  • Linux/UNIX tools: TCT and TCTUTILs
  • Password Recovery Tool: @Stake
  • ASRData
  • SMART Screenshot
  • Ftime
  • Oxygen Phone Manager
  • Multipurpose Tools: Byte Back & Biaprotect
  • Multipurpose Tools: Maresware
  • Multipurpose Tools: LC Technologies Software
  • Multipurpose Tools: Winhex Specialist Edition
  • Multipurpose Tools: Prodiscover DFT
  • Toolkits: NTI tools
  • Toolkits: R-Tools-I
  • Toolkits: R-Tools-II
  • Toolkits: DataLifter
  • Toolkits: AccessData
  • LC Technology International Hardware
  • Screenshot of Forensic Hardware
  • Image MASSter Solo and FastBloc
  • RMON2 Tracing Tools and MCI DoStracker
  • EnCase

Module XV: Application password crackers

  • Password - Terminology
  • What is a Password Cracker?
  • How Does A Password Cracker Work?
  • Various Password Cracking Methods
  • Classification of Cracking Software
  • System Level Password Cracking
  • Application Password Cracking
  • Application Software Password Cracker
  • Distributed Network Attack-I
  • Distributed Network Attack-II
  • Passware Kit
  • Accent Keyword Extractor
  • Advanced Zip Password Recovery
  • Default Password Database
  • http://phenoelit.darklab.org/
  • http://www.defaultpassword.com/
  • http://www.cirt.net/cgi-bin/passwd.pl
  • Password Cracking Tools List

Module XVI: Investigating Logs

  • Audit Logs and Security
  • Audit Incidents
  • Syslog
  • Remote Logging
  • Linux Process Accounting
  • Configuring Windows Logging
  • Setting up Remote Logging in Windows
  • NtSyslog
  • EventReporter
  • Application Logs
  • Extended Logging in IIS Server
  • Examining Intrusion and Security Events
  • Significance of Synchronized Time
  • Event Gathering
  • EventCombMT
  • Writing Scripts
  • Event Gathering Tools
  • Forensic Tool: Fwanalog
  • End-to End Forensic Investigation
  • Correlating Log files
  • Investigating TCPDump
  • IDS Loganalyais:RealSecure
  • IDS Loganalysis :SNORT

Module XVII: Investigating network traffic

  • Overview of Network Protocols
  • Sources of Evidence on a Network
  • Overview of Physical and Data-link Layer of the OSI Model
  • Evidence Gathering at the Physical Layer
  • Tool: Windump
  • Evidence Gathering at the Data-link Layer
  • Tool: Ethereal
  • Tool: NetIntercept
  • Overview of Network and Transport Layer of the OSI Model
  • Evidence Gathering at the Network and Transport Layer-(I)
  • Gathering Evidence on a Network
  • GPRS Network Sniffer : Nokia LIG
  • NetWitness
  • McAffee Infinistream Security Forensics
  • Snort 2.1.0
  • Documenting the Gathered Evidence on a Network
  • Evidence Reconstruction for Investigation

Registration Details

Course Fee:
Single Nomination:
USD 400/- OR INR 18000/-

Avail Special Discounts Avail Special Discounts Avail Special Discounts Avail Special Discounts
5% Discount for Early Bird Registrations (15 Days in advance to the program date) 5% Discount on Task force of 4 to 7 10% Discount on task Force of 8 and above 10% discount applicable to /SANS/ GIAC/CSWE/CDFE/CIHE/CISSP/CISA/ Qualified Professionals, Mile2/BA/PMI /SEG /CII/SPIN /CSI and NASSCOM Members

NOTE: Only one discount option is applicable at any time

Course Dates, Venue & Timings:

Sl.No. State City Batch1-Date Batch1-Date Batch2-Date Batch2-Date Batch3-Date Batch3-Date Batch4-Date Batch4-Date Venue Contact
01 AP Hyderabad 2-May'11 6-May'11 7-JUN'11 10-JUN'11 2-JUL'11 6-JUL'11 2-Aug'11 6-Aug'11 Flat 617, Annapurna block, Aditya enclave, Ameerpet, Hyd-16 Jason-91-40-64568797
02 Delhi Delhi/Gurgaon/Noida 24-Apr'11 25-Apr'11 28-May'11 29-May'11 25-JUN'11 26-JUN'11 23-JUL'11 24-JUL'11 Orange Business services, Equant Solutions IndiaPvt. Ltd, Tower B, 8th Floor, DLF Infinity Tower -Phase II, DLF Cybercity, Sector 25, Gurgaon -122002, India Arun : 9810 328046
03 Karnataka Bangalore 7-May'11 8-May'11 4-JUN'11 5-JUN'11 2-JUL'11 3-JUL'11 6-Aug'11 7-Aug'11 DBS House 26, Cunningham Road ,Opp Indian Express Building, Bangalore - 560 052 Vijay : 96636 06107
04 Maharashtra Mumbai 21-May'11 22-May'11 18-JUN'11 19-JUN'11 16-JUL'11 17-JUL'11 20-Aug'11 21-Aug'11 DBS Heritage,Prescot Road,Opp. Cathedral Sr. School,Fort, Mumbai 400001. DBS Heritage (From Airport instruct the car / cab driver to drive to Fort, Fashion Street. It’s near Siddharth College, Budha Bhavan. Also there are schools like J. P. Pettit School & Cathedral Sr. School Mr.Vasudev
05 Maharashtra Pune 30-Apr'11 1-May'11 2-JUN'11 3-JUN'11 30-JUL'11 31-JUL'11 2-Aug'11 3-Aug'11 Hotel Raviraj , Deccan Gymkhana Mr.sameer
06 Tamilnadu Chennai 14-May'11 15-May'11 11-JUN'11 12-JUN'11 9-JUL'11 10-JUL'11 13-Aug'11 14-Aug'11 DBS House 31A, Cathedral Garden Rd ,Between Hotel Palmgrove and Valluvarkottam Nugambakkam,Chennai - 600034 Mr.Solomon
07 Westbengal Kolkata 30-Apr'11 1-May'11 2-JUN'11 3-JUN'11 30-JUL'11 31-JUL'11 2-Aug'11 3-Aug'11 DBS House 10/2, Hungerford Street,Opp. Exit Gate of Saturday Club,Kolkata - 700017 Mr.Sandeep
08 Kerala Trivandrum 21-May'11 22-May'11 18-JUN'11 19-JUN'11 16-JUL'11 17-JUL'11 20-Aug'11 21-Aug'11 DBS center Mr.Manoj
09 Kerala Cochin 24-Apr'11 25-Apr'11 28-May'11 29-May'11 25-JUN'11 26-JUN'11 23-JUL'11 24-JUL'11 DBS center Mr.Manoj
10 Tamilnadu Coimbatore 7-May'11 8-May'11 4-JUN'11 5-JUN'11 2-JUL'11 3-JUL'11 6-Aug'11 7-Aug'11 DBS center Mr.Balaji
11 Gujarat Baroda 2-May'11 6-May'11 7-JUN'11 10-JUN'11 2-JUL'11 6-JUL'11 2-Aug'11 6-Aug'11 DBS House Mr.Alok
12 Gujarat Ahmedabad 14-May'11 15-May'11 11-JUN'11 12-JUN'11 9-JUL'11 10-JUL'11 13-Aug'11 14-Aug'11 DBS center Mr.Alok

Kindly register for the courses in your cities at least 2 days in advance.
Timings: 0900 - 2100 hrs

Contact Details:

Mr. Vijay

Mobile: 0 94400 89341

Phone: 040-6456 8797

Register Online: moc.snoitulosdnimartceps|ofni#moc.snoitulosdnimartceps|ofni
Email: ni.oc.oohay|pmpaqscyajiv#ni.oc.oohay|pmpaqscyajiv

Yahoo chat : vijaycsqapmp
Google chat/Skype chat/AOL chat/ICQ chat : tiptopten2000
Hotmail/Live chat / Rediff chat : tiptopten

http://spectramindsolutions.com


Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License