About
!!! Be Smart and Creative in the Cyber World !!!
With over 15 years of robust…
Articles by DR. DEEPAK (D3)
Activity
-
https://lnkd.in/gCWWi5Bq In any cybercrime, one of the root vectors is the 'origination'. It is common to receive daily messages for alerts, KYC…
https://lnkd.in/gCWWi5Bq In any cybercrime, one of the root vectors is the 'origination'. It is common to receive daily messages for alerts, KYC…
Shared by DR. DEEPAK (D3) FORENSICS 🕵️
Experience
Licenses & Certifications
-
-
-
-
-
-
-
-
-
Certified Counter-Terrorism & National Security
Kenya institute of security & criminal justice
Issued -
Certified Fraud Detection & Investigation
Kenya Institute of Security and Criminal Justice
Issued -
Certificate of Achievement on Advance Security in the Field
UNDSS (United nations Department of Safety and Security)
Issued -
Certificate of Achievement on Basic Security in the Field
UNDSS (United nations Department of Safety and Security)
Issued -
Certificate of Achievement on Information Security Awareness - Additional
UNDSS (United nations Department of Safety and Security)
Issued -
Certificate of Achievement on Information Security Awareness - Advanced
UNDSS (United nations Department of Safety and Security)
Issued -
Certificate of Achievement on Information Security Awareness Foundational Assessment
UNDSS (United nations Department of Safety and Security)
Issued -
Certified Cyber-Security for Industrial Control Systems
Industrial Control Systems Cyber Emergency Response Team U.S. Department of Homeland Security (ICS-CERT)
Issued -
Certified Operational Security (OPSEC) for Control Systems
Industrial Control Systems Cyber Emergency Response Team U.S. Department of Homeland Security (ICS-CERT
Issued -
-
-
-
Certification in Computer Forensics
Gujarat Forensic Sciences University
Issued -
Certification in Cyber Security
National institute of financial management | Academic alliance with MICROSOFT (MSDNAA)
Issued
Volunteer Experience
-
Active Member - Digital Forensics & Risk Management
ICTTF International Cyber Threat Task Force
- Present 8 years 10 months
Civil Rights and Social Action
The ICTTF International Cyber Threat Task Force is a not for profit group established in order to create an global community of experts to deal with cyber risks and threats.
My role is to contribute specifically in digital forensics.
https://www.icttf.org/ -
Team Coordinator
Data Security Council of India
- Present 6 years 8 months
Science and Technology
DSCI hosted the CTF Hackathon on the side-lines of Annual Information Security Summit 2017 at Hotel Leela, Ambience, Gurugram. Capture the flag (CTF) is an information security exercise/drill composed of various challenges related to web application, network, forensic, crypto, reverse engineering etc. It can be conducted both ways Attack-Defence mechanism.
https://www.dsci.in/content/hackathon
Publications
-
21st Century Cyber Forensics
Digital Forensics Journal
Overview of 21st Cyber forensics scenarios and challenges.
Courses
-
ADCET : Advance diploma in computer engineering technology
A+
-
ADCST : Advance diploma in computer software technology
A+
Honors & Awards
-
Appreciated on Cyber Security & Counterintelligence Training
Haryana Gurugram Police (LEA)
Gurugram Police Summer Internship 2017 delivered Session on C3: Cyber, Cyber Forensics, Cyber Warfare. https://d3pakblog.wordpress.com/2017/06/27/gurugram-police-cyber-intern-2017/
-
Appreciation Letter for VAPT & Forensic Audit
E2-Labs
As i was the Team lead for the Project :
Vulnerability Assessment : For the Effort and Efficiency in finishing a VA-PT(Grey Box) of the client within time frame and providing with a proficient Report.
Forensic Audit : The task was to investigate the computer systems of suspect and the victim. After conducting the Non-Live forensics on suspect’s computer revealed the processes used in conducting the crime and e-mail investigation was also done. After conducting internal audit of…As i was the Team lead for the Project :
Vulnerability Assessment : For the Effort and Efficiency in finishing a VA-PT(Grey Box) of the client within time frame and providing with a proficient Report.
Forensic Audit : The task was to investigate the computer systems of suspect and the victim. After conducting the Non-Live forensics on suspect’s computer revealed the processes used in conducting the crime and e-mail investigation was also done. After conducting internal audit of the company it was found that somebody was involved internally.
From www.E2-Labs.com
-
Appreciation Letter
Additional Superintendent of Police : Lucknow Cyber cell
-
Merit Recognition Certificate on 4th National IT Aptitude Test
NIIT
NITAT ID: W08ZZZZ060660
This achievement places me in the top 14 % of the canditates who participated in this NITAT exam in india.
Recommendations received
45 people have recommended DR. DEEPAK (D3)
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More