Pakistan Computer Emergency Response Team

The Security Standard


Copyright | Disclaimer






Learn to recover, analyze, and authenticate forensic data on Windows systems

Understand how to track detailed user activity and how to organize findings for use in incident response, internal investigations, and civil/criminal litigation

Hand-on lab to practice forensic techniques during the training

April, 2018
May, 2018
Starting Date: 12th April, 2018
Starting Date: 12th May, 2018
Last Date for Registration: 9th April, 2018
Last Date for Registration: 10th May, 2018

Duration: 1 Day (9:00am - 3:00pm daily)

Fee: Rs.50,000 **Special Discount for Students. Contact us for details.**

Venue: Shahrah-e-Faisal, Karachi

Who Teaches the Class?

Mr. Qazi Mohammad Misbahuddin Ahmed is regarded as the pioneer of information security services in Pakistan. He holds a Bachelor in Computer Science and MBA-MIS along with the following industry leading certifications:
  • Certified Information Systems Security Professional (CISSP)
  • Certified Penetration Testing Specialist (CPTS)
  • Certified Ethical Hacker (CEH)
  • COBIT based IT Governance Exam (COBIT)
  • Information Technology Infrastructure Library (ITIL)
  • Member of Business Continuity Institute (MBCI)

He has performed several penetration tests, forensic analysis, incident response procedures, security policy implementation, information classification, security governance and ISMS implementations for many national and multi-national companies, government and military organizations.

He served as an Information Security Consultant to State of Qatar's Ministry of Interior, where he was responsible for setting up Qatar's National Cyber Security Opearations Center (NCSOC), government data classification, and develop a response center for information security related issues for Qatar's critical infrastructure. He provided ISMS consultancy to several government ministries and military organizations in Qatar.

Mr. Qazi has also served as a member of Network Security Taskforce, Government of Pakistan.

He has conducted several workshops for high profile companies and is a regular speaker at many IT events and conferences like E-Merge, IT Expo, ProCOM, ITCN Asia ProQuest and also served as a coordinator and Judge at the ITCN Asia ProQuest Hacking Competition. Qazi Ahmed is routinely called to comment and discuss on IT security events and has been featured on several TV channels like GEO, ARY Digital, Indus News, PTV and newspapers, magazines and newsletters like Spider, @internet, YAHOO!, CISCO, Newsbytes, Wall Street Journal, India Times, Hindustan Times etc.

Mr. Qazi is also credited for finding the most severe security vulnerability ever in Microsoft .NET Passport services affecting millions of people worldwide. Qazi Ahmed also enjoys the membership of renowned worldwide High IQ society, Mensa.

Who Should Take This Course

  • Information security professionals who want to learn the in-depth concepts of Windows digital forensics investigations
  • Incident response team members who need to use deep-dive digital forensics to help solve their Windows data breach and intrusion cases
  • Law enforcement officers, federal agents, or detectives who want to become a deep subjectmatter expert on digital forensics for Windows-based operating systems
  • Anyone interested in a deep understanding of Windows forensics who has a background in information systems, information security, and computers

Our information security training sessions have been attended by professionals from organizations such as:

  • Ministry of Defence
  • Pakistan Atomic Energy Commission
  • Ernst & Young
  • Juma Al Majid Group (UAE)
  • Unilever
  • Habibsons Bank (UK)
  • Allied Bank Limited
  • Qasim International Container Terminal
  • Agha Khan University
  • Dubai Islamic Bank
  • Qatar Airways
  • Central College London (UK)
  • Union Bank
  • Alliance Frances
  • Central Depository Company
  • Karachi Electricity Supply Corporation
  • Getz Pharma
  • Xpert2go Inc. (USA)
  • Compunet Online (ISP)
  • Lucky Textile Mills
  • Nadra
  • Agha Khan Education Service
  • Hamdard University Network
  • Habib Bank AG Zurich
  • Nakshbandi Industries
  • Sidat Hyder Morshed Associates


  • Overview of Digital Business Security Issues
  • Digital Evidence
  • Chain of Custody
  • Collect evidence by imaging a hard drive using a Write Blocker
  • Mount acquired disk images and evidence
  • Recover critical user data from the evidence
  • Report Writing

All rights reserved. Copyright© PakCERT 2000-2018