You are on page 1of 27

INSTITUTE OF FORENSIC SCIENCE

GUJARAT FORENSIC SCIENCES UNIVERSITY

IFS-GFSU CERTIFIED
INFORMATION SECURITY PROFESSIONAL

ISP

!

IFS$GFSU'Certification'#14001''
Information'Security'Professional'
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!

DATES'FOR'2014'EXAMS'
'
The! exam! for! the! IFSBGFSU! Certification#
#14001#Information#Security#Professional#will!
be!conducted!on!the!following!dates!in!2014:!
'
Sunday'19th'January,'2014'
Sunday'20th'April,'2014'
Sunday'20th'July,'2014'
Sunday'19th'October,'2014'
'
Registration! for! the! exam! closes! 30! days!
prior!to!the!exam!date.!
!
!
!
SUMMARY'OF'EXAM'INFORMATION'

'
Exam!Duration:!3'hours!
Passing!Marks:!70%!
!
OneBtime!registration!fees:!Rs'1,000!
!
Exam!Fees:!Rs'4,500!for!students!
Exam!Fees:!Rs'10,000'for!others!

!

An#objective#of#the#Indian#National#Cyber#Security#Policy#–#2013:#

!
To!create!a!workforce!of!500,000!professionals!skilled!in!
cyber!security!in!the!next!5!years!through!capacity!!
building,!skill!development!and!training.!

!
!
!
!
!
!
!
!

!
!

!

!
!
!
ABOUT'IFS$GFSU'
!
This! certification! is! provided! by! Institute! of!
Forensic! Science,! Gujarat! Forensic! Sciences!
University! (IFSBGFSU).! The! Government! of!
Gujarat,! under! the! flagship! of! the! Home!
Department! of! the! Government! of! Gujarat,!
has! established! GFSU.! GFSU! is! the! only!
university! across! the! world,! dedicated! to!
Forensic!&!Investigative!Science.'!
!
!
ABOUT'THIS'DOCUMENT'
This! document! is! issued! in! pursuance! of! the!
IFSBGFSU!Certification!Policy.!
!
This! document! is! issued! as! a! guide! to!
candidates!
pursuing!
an!
IFSBGFSU!
certification.! IFSBGFSU! does! not! make! any!
representations!or!warranties!that!the!use!of!
this! document! will! assure! candidates! of!
passing!any!IFSBGFSU!certification.!!
!
©!2013!Institute!of!Forensic!Science,!Gujarat!
Forensic! Sciences! University.! All! rights!
reserved.!
!
!
!
Gujarat!Forensic!Sciences!University!
DFS!Head!Quarters,!Sector!18BA,!!
Near!Police!Bhavan,!!
GandhinagarB382007,!!
Gujarat!B!India!

!
1!

!

!Get!upgraded!to!ISP+!after!6!years.!Earn!the!right!to!use!ISP.! ! Earn!your!certification.! Earn!120!Continuing!Education!Units!(CEUs)!every!3!years!and!submit!proof!of!the!same.! Prepare!for!the!exam!by!studying!the!reference!material!comprising!the!IFSBGFSU! Common!Body!of!Knowledge!for!Information!Security!(CBOKIS).Quick'Guide'to'Earning'&'maintaining'your'IFS$GFSU'certification' ' ' Obtain!PRN! Apply!for! Exam! Prepare!for! Exam! Pass!the! exam! Earn!the! certi_ication! Earn!CEUs! ' ' ! ! 1! 2! 3! 4! 5! 6! Obtain!your!oneBtime!Permanent!Registration!Number.!! ! Appear!for!the!certification!exam!and!obtain!70%!in!each!section.! ! ' ' ' ' 2! ! .!! Apply!for!the!examination.

...............................................!11! B15....................................!Criteria!for!renewal!of!certification!.......................................................................................'About'GFSU'..........................!12! Malpractice!or!cheating!...............................................!12! B19.........................!6! B2.........................................................................................!12! B18................................................................................................................................................................!Exam!Duration!...............................................................................................................................................!7! B7................................................!11! Admission!Pass!...................................!7! B8................................................................'Application'Form'for'Permanent'Registration'Number'for'IFS$GFSU' Certification'Programs'..........................................................................................................................................................................................................................................................................................!Type!of!questions!.............!Benefits!to!organizations!..............................................................................................................................................................................................................................................................'22! ' D............................................................................!Subject!Matter!Experts!......................................................................................!Preparation!for!the!Exam!..........................................................................................................................!13! ' C..................................................................................................!8! B10..........................................................!Fees!.................................!8! B11............................................................'The'IFS$GFSU'Continuous'Education'Program'.....................................................................................................!Overview!of!Examination!Syllabus!.....................................................................................................................................'24! ! ! ! ! ! 3! ! ...!7! B5.....................................................................................................................................................................................................................................................................................................................!5! ' B.............!12! B16...............................'6! B1..........Table'of'Contents' ! A..................................................'Benefits'of'IFS$GFSU'Certifications'.................................................................................................................................................................................................!4! A2........................!13! B20......................!7! B9....................!11! Special!Arrangements!...............................................................................................................................................................................!Importance!of!Information!Security!..............................................!Passing!Score!..................!8! B12........!Dates!..........................!11! Entry!to!the!exam!centre!...................................'About'the'Certification'.............................................................!Abilities!..........................................................!11! B13...............................................................................!Development!of!the!exam!.....................................!11! B14.....................................................................!13! B21....................................!Administration!of!the!Exam!...............................................................'23! ' E..................................................................................................................!7! B6.............................................................................!Grounds!for!suspending!and!withdrawing!certification!......................................................................'4! A1.........................................!6! B3....................!11! What!to!carry!into!the!exam!centre!......................!12! What!NOT!to!carry!into!the!exam!centre!.............................................................................................................!Code!of!Professional!Ethics!..........................................................!Required!competence!.....................!Detailed!Examination!Syllabus!.!Common!Body!of!Knowledge!for!Information!Security!(CBOKIS)!..............!Exam!Overview!..............................!Prerequisites!.!6! B4..............................................!Benefits!to!individuals!..............!Criteria!for!initial!certification!.......................................................!12! B17...........................................

! "63%! of! hiring! managers! believe! certified! individuals! are! more! productive!than!their!nonBcertified!counterparts."! ! 3!Your! employer.!Benefits!to!individuals! ! Achieve!a!higher!position.! enhance!your!career ! 4! ! .! employees! and! peers! will! recognize!your!GFSU!credential!as!an!indication!of!the! skills! and! knowledge! you’ve! gained! through! certification.!raise.!and! promotion!faster1! ! Show!that!you!know!the!most! current!principles!and!practices!of! your!field! ! ! Become!more!employable2! ! ! ! Personal!satisfaction!of! accomplishing!a!milestone!in!your! career! ! Affirm!your!professional!expertise3! ! ! Increase!job!security! ! ! ! Demonstrate!that!you!possess! essential!domain!knowledge! ! Stand!out!against!other!applicants!in! a!tough!job!market.! ! 2!According! to! an! IDC! white! paper.! and! that! obtaining! relevant! certifications! often!leads!to!a!salary!increase.! remove!uncertainty!and!widen! market!opportunities! ! Differentiate!yourself!from!your! peers! ! ! ! Boost!your!confidence! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! surveys! show! that! the! majority! of! hiring! managers! consider! certifications! a! factor! in! hiring! decisions.! ! ! ! Get!prepared!for!greater!onBtheBjob! responsibilities! ! Boost!relevance!by!staying!current! in!the!profession!with!continuing! education!requirements.A.! ! Ensure!you!are!continually! improving!and!refining!your! activities! ! ! Become!part!of!a!professional! network! 1 !Salary! ! ! Enjoy!better!career!flexibility! ! ! Be!recognized!as!being! knowledgeable!and!skilled! ! ! Open!the!doors!of!opportunity.!Benefits!of!IFS/GFSU!Certifications! A1.! clients.! ! ! Advance!your!career!potential!due! to!recognition!as!a!certified! professional! ! ! Potentially!earn!higher!income!for! being!formally!recognized!as!a! certified!professional! ! ! ! Demonstrate!Your!Commitment! ! ! Recognition!of!professional! competence!by!professional!peers! and!management! ! ! Build!and!enhance!your!credibility! ! ! Build!&!Showcase!Your!Skills! ! ! Increase!your!value!and!income! ! Become!more!marketable!when!you! compete!for!top!positions! ! ! Keep!up!with!everBchanging! standards!and!technologies! ! ! Validate!your!knowledge! ! ! Raise!your!prestige!among!your! staff!and!your!peers! ! ! ! Improve!overall!performance.

!higher!quality!results!produced!with!increased! efficiency!and!consistency!by!professionals!who!use!industry!standard!techniques.! GFSU! certifications! also! provide! a! recognized! benchmark! of! skills! that! can! be! aligned! to! organisational!skills!frameworks.! ! ! Customer'satisfaction' GFSU! certifications! can! ensure! greater! customer! satisfaction! (internal! and! external! customers).! commitment! and! motivation!and!ensure!competent!employees.! staff! and! investors!that!you!use!industryBstandard!practices.! ! ! Staff'motivation' The! regular! assessment! process! will! improve! staff! responsibility.! ! ! Increased'credibility' GFSU! certifications! demonstrate! to! customers.! ! ! Increased'Productivity' GFSU! certified! professionals! are! typically! more! productive! and! work! to! consistent! standards.! ! ! 5! ! .! ! ! Stakeholder'satisfaction' GFSU! certifications! demonstrate! to! your! stakeholders! that! your! business! is! run! effectively.! measure! and! evaluate! employees’! skills! for! roles! within! the! organization.! ! ! Higher'quality' GFSU!certifications!lead!to!more!reliable.!your!teams!are!trained!to!consistent!skill!levels.! ! ! Consistency' With!GFSU!certifications.! ! ! Culture'of'learning' GFSU! certifications! empower! a! culture! of! learning! and! improvement! that! increases! return!on!investment.!Benefits!to!organizations! ! ! Benchmark' With! GFSU! certifications.! ! ! Employee'satisfaction' GFSU! certifications! provide! professional! development.! ! ! Assurance' GFSU! certifications! assure! that! the! certified! professional! has! the! knowledge! and! skills! needed!to!perform!the!allotted!tasks.! ! ! Performance$related'pay' Gaining!GFSU!certifications!can!be!aligned!to!performanceBrelated!pay.! competitors.! your! organization! will! have! a! benchmark! to! compensate.!This!can!also!lead!to!lower!staff!turnover.! advancement! and! recognition! opportunities!for!staff.! suppliers.A2.

!data!leakage.!mobility!and!other!abilities!must!be!such!that!would!permit!him!to! work!efficiently!in!information!security!in!an!organizational!environment.!candidates!must!take!the!certification!exam!and!obtain!a!minimum!of! 70%!marks.! phishing.! Complications! from! disruptions! of! such! a! magnitude! may! threaten! lives.! and! the! data! exchanged! in! the! cyberspace! can! be!exploited!for!nefarious!purposes!by!both!nationB!states!and!nonBstate!actors.!an!organized! cyber! attack.!Abilities! Candidate’s!vision.!integrity!and!availability!of!the!information!in!cyberspace!is!the! essence!of!a!secure!cyber!space.! denial! of! service.!! ! Some! of! the! examples! of! cyber! threats! to! individuals.!economy!and!national!security.! bot!nets.! ! B2.!supply!chain!attacks.!! ! The! protection! of! information! infrastructure! and! preservation! of! the! confidentiality.!Required!competence! To!earn!this!certification.! an! uncontrolled! exploit! such! as! computer! virus! or! worms! or! any! malicious!software!code.! The! importance! of! Information! Security! can! be! understood! from! the! following! extract! from! the! Indian# National# Cyber#Security#Policy#–#2013:! ! Cyberspace! is! vulnerable! to! a! wide! variety! of! incidents.!etc.! compound! threats! targeting! mobile! devices! and! smart! phone.!Rapid!identification.! advanced! persistent! threats.! businesses! and! government! are! identity! theft.! whether! intentional! or! accidental.!! ! LargeBscale!cyber!incidents!may!overwhelm!the!government.!! ! 6! ! .! compromised! digital! certificates.!a!national!disaster!with!significant!cyber!consequences! or! other! related! incidents! capable! of! causing! extensive! damage! to! the! information!infrastructure!or!key!assets.! ! B3.!! ! A!cyber!related!incident!of!national!significance!may!take!any!form.! social! engineering! .!About!the!Certification! ! B1.!! ! Cyber! attacks! that! target! the! infrastructure! or! underlying! economic! wellBbeing! of!a!nation!state!can!effectively!reduce!available!state!resources!and!undermine! confidence!in!their!supporting!structures.!information!exchange.! manmade! or! natural.!Importance!of!Information!Security! An! Information! Security! Professional! is! skilled! in! understanding! and! analyzing! information! security! threats! and! implementing! best! practices! for! Information! Security.B.! cyber! terrorism.! hactivism! .!public!and!private! sector! resources! and! services! by! disrupting! functioning! of! critical! information! systems.! investigation! and! coordinated! response! and! remediation! can! mitigate! the! damage!caused!by!malicious!cyberspace!activity.!hearing.

!! ! 3.! ! B8. Failure! to! submit! documentary! evidence! every! 3! years! of! CEUs! earned! along! with! the! applicable!administrative!fee.! ! B6.! Submit!administrative!fee!of!Rs. Violating!any!provision!of!the!IFSBGFSU!Code!of!Professional!Ethics.!2.!Prerequisites! The!candidate!must!be!a!graduate!in!any!stream!from!a!recognized!University.! ! B7.! ! Failure! to! comply! with! this! Code! of! Professional! Ethics! may! result! in! suspension! and! subsequent!withdrawal!of!certification. Maintain!high!standards!of!moral!character. Failure!to!obtain!the!required!CEUs!(Continuing!Education!Units)!every!3!years. Being! a! graduate! in! any! stream! from! a! recognized! University.! ! B5. Accepting!the!IFSBGFSU!Code!of!Professional!Ethics. Demonstrating! mastery! of! IFSBGFSU! Common! Body! of! Knowledge! for! Information! Security!by!successfully!taking!the!certification!exam!with!a!score!of!at!least!70%.!Criteria!for!initial!certification!! 1.! Compliance!with!IFSBGFSU!Code!of!Professional!Ethics. Perform!duties!to!the!best!of!their!knowledge.! Submit!documentary!evidence!in!respect!of!CEUs!earned.000!plus!applicable!taxes!(every!3!years).!Criteria!for!renewal!of!certification! 1.! 5.! 2. 4.!Grounds!for!suspending!and!withdrawing!certification! The! Certification! Management! Committee. Ensure!compliance!with!regulatory!and!legal!framework. Violation!of!the!terms!of!any!undertaking!made!to!IFSBGFSU.! 2.! Students! pursuing! graduation!may!appear!for!the!certification!exam!and!on!successfully!passing!the!exam! will! be! issued! a! provisional! certificate. 3. 2.!Code!of!Professional!Ethics! All!IFSBGFSU!certified!professionals!should:! ! 1.! ! 2.!subject!to!regulatory!requirements.B4.! 4.! 4.! Such! applicants! will! be! certified! on! submitting! proof!of!graduation.! 5.! ! ! 7! ! .!! 3.! Institute! of! Forensic! Science.! Gujarat! Forensic! Sciences! University! (IFSBGFSU)! may! suspend! and! withdraw! a! certification! for! any! of! the! following!reasons:! ! 1. Preserve! the! privacy! and! confidentiality! of! information! obtained! in! the! course! of! professional!assignments.!skills!and!capabilities.! 3. Encourage!implementation!of!measures!for!control!of!corporate!crime. Earn!120!CEUs!(Continuing!Education!Units)!every!3!years. Providing!any!false!information!to!IFSBGFSU.

! Penetration! Testing! and! Wireless! Security! assessments.! implementation! of! the! policies! and! procedures.!maintaining.! decisions! on! certification.!Development!of!the!exam! The! Certification! Management! Committee! of! IFSBGFSU! is! responsible! for! operational! policies! and! procedures.! Gujarat!Forensic!Sciences!University!advise!in!the!development!and!review!of!the!certification! scheme4.! Business! &! Technology! Services.! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! 4!This!includes!criteria!for!initial!certification!and!recertification.!Subject!Matter!Experts! Subject! Matter! Experts! for! certification! programs! conducted! by! Institute! of! Forensic! Science.!Subject!Matter!Experts!come!under!the!Certification!Development!Committee.! The! Certification! Development! Committee! of! IFSBGFSU! is! responsible! for! development! and! maintenance! of! the! certification! schemes.! ! B10.! Pharmaceutical.! His! expertise! covers! Digital! Forensic! Data! Analysis.!reducing.!Automotive.! Insurance! and! Steel! Manufacturing.!Exam!Overview! The! Information! Security! Professional! (ISP)! certification! from! Institute! of! Forensic! Science.! premises.! ! 8! ! .! surveillance! methods! and! criteria! (if! applicable).'ISO'27001'Lead'Auditor.!! B11.! Apparels! &! Footwear.!He!has!been!working!in! the!Information!Security!field!for!around!7!years.! He! has! managed! and!directed!consulting!assignments!on!compliance!requirements!like!SOXB404.!An!IFSDGFSU#Certified#Information#Security#Professional#is!skilled!in!understanding!and! analyzing! information! security! threats! and! implementing! best! practices! for! Information! Security.! directing! and! executing! Application! Security! Code! Audits.!suspending! or! withdrawing! of! the! certification.!Micro!Finance.! equipment! and! resources! for! carrying! out! certification! activities).!Consumer!Electronic!manufacturing.! resources! for! certification! activities! (personnel.! ! M'Lingesh.! Information!Technology.!He!has!played!a!key!role!in!establishing! and! managing! Security! Operations! Centre! in! Chennai.!including!the!granting.! contractual! arrangements.! The! Subject! Matter! Experts! for! IFSDGFSU# Certification# #14001# Information# Security# Professional!are!(in!alphabetical!order):! ! Jimmy'Mate.!! ! Nishant'Mohorikar.! Hospitality.'Information'Security'Manager.'Head'of'Security'Operations'Center' ' He! is! a! CISSP! and! GREM! with! 12+! years! of! experience! in! the! domain! of! Information! Security! Consulting!and!establishing!Security!Operations!Centre.! Gujarat!Forensic!Sciences!University!(IFSBGFSU)!proves!specialist!level!expertise!in!information! security.'CPP.'Assistant'Manager.! Computer! Forensics.!Fraud!Investigations!along!with!evaluating!design!&!operating!efficiencies!of!internal! controls!at!the!entity!&!process!level!and!identifying!areas!of!improvement!&!cost!savings.'EY' ' With! over! 7! years! of! experience! in! Forensic! Technology.!submitting!questions!for!inclusion!in!the!certification!examinations!and!tests!(optional).!Media! &! Entertainment.'CFE' ! M!Lingesh!is!a!retired!Naval!Officer!with!20!years!of!military!experience.! assessment! activities.! outsourcing.! assessment! methods! for! initial! certification! and! recertification.B9.! criteria! for! changing! the! scope! or! level! of! certification! (if! applicable).!He!has! addressed! various! sectors! like! Cement! Manufacturing.!expanding.!He!has!also!worked!on!designing!&!execution!of!training!modules!in!the!area!of! Forensic!Technology!for!Government!Organizations!&!Corporates.!recertifying.!curriculum!for!certification!examinations!and!tests.'CISA.! he! currently! holds! the! position! of! Assistant! Manager! with! a! Big4.! including! examination! sites.! criteria! for! suspending! and! withdrawing! certification.

! ! ! ! ! 9! ! .! With! over! 13! years! of! experience! in! the! technology! industry! with! exposure! of! leading! diverse! functions! such! as! IT! Sales.! to! enable! business! processes! while! managing! risk.! ! Olivier'Ruch$Rosanoff.! ! Ram'Gopal'Soni.!managing!projects!in!Information!Security.!Audit!and!Information!Security! Management.! Telecommunication.'Ltd.!Penetration!Testing!and!business!development!activities.'CFE' ' He!has!25+!years!of!experience!in!directing.! IT!Governance.! FMCG.! ISF.! CLASP.!PCIBDSS.!Government!of!India.'CISM.'Head'IT'Governance'&'Chief'Information'Security'Officer.'Religare' Enterprises'Limited' ! He! is! a! technology! manager! with! a! commercial! flair.! OWASP.'Risk'Consulting.! He! is! a! research! fellow! of! Centre! for! Police! Research! on! “Mobile! Technology”.! He! inspires! employees! to! peak! performance.!control!and!information!security!management!professional!with! broad!expertise!in!the!IT/IS!business!risk!and!security!domains.! Information! Security.! He!can!effectively!manage!codes!of!practice.'Associate'Director.! He! has! played! a! key! role! in! setting! up! Computer! Emergency!Response!Team!for!Government!of!India.!Operations.! ! Rishi'Mehta.'Sr.! IT.'CISSP.'Associate'VP'$'Security'Consulting.! Automobile! and! Micro! Finance.'ISO'27001'LA' ' He!is!a!technology!related!risk.! balance! controls! with! risk! and! cultivate! profitable! business!relationships.! Control! Environment.! He! has! expertise! in! designing! Information! Systems! Security! policy! and! procedures.'ControlCase'International'Pvt.'CISA.! Large! Program! Delivery.! penetration! testing.! ISSAF.! ! Ram! Gopal! Soni! is! an! Information! Security! Graduate! with! strong! cognition! and! industry! experience!in!Information!Security!Implementation.! He! is! working! as! QSA! /! Associate! VP! B! Security! Consulting! with! ControlCase! International! Pvt.! secure! coding! practices! and! designing! application!architecture.!He!is!a!visiting!faculty!on! cyber!crime!investigation!at!National!Police!Academy.! Operations.! Fraud! Investigation! and! Risk! Assessment.! He! has! security! expertise! at! both! the! strategic! and! hands! on! levels! to! provide! the! ability! to! strengthen! enterprise! risk! exposure! through! best! practice! planning! and! proBactive! solution! implementation.! application! security! audits! for! Fortune! 100! clients.!Service!Management.!SSEBCMM.! Specialties:! Governance! Framework.!Assessment.! ! R'Vittal'Raj'FCA.'KPMG' ' He! is! a! former! IPS! officer! having! over! 9! years! of! experience! in! cyber! and! fraud! investigation! pertaining! to! industries! such! as! Infrastructure.! NIST.! Ltd! and! is! currently! focused! on! Information! Security! Compliance! Audit! and! Certification! including! PCIBDSS.!taking!advantages!of!over!fifteen! years! experience! in! areas! such! as! Financial! Services.!Ministry!of!Commerce.! Six! Sigma! Quality.!ISO!27001.'CRISC.!National!Academy!of!Direct!Taxes!and!!the! Centre! for! Police! Research.! Risk! and! Security! Management.! Governance! &! Operational! Risk.'CISSP.!Business!Continuity.'CIA.! ! Ravindranath'Patil.'CRISC.! Maritime! /! Shipping! Services! and! Medical! /! Health! Care! industries.'Vice'President.'CGEIT.! He! has! worked! as! an! Assistant! Director! General!of!Foreign!Trade.! Liquor.! IT! Risk! Management.!IS!Audit.!!!!!!!!! ! He! has! directly! managed! and! executed! SarbanesBOxley! IT! compliance! projects! for! Fortune! 500! clients! and! has! directly! managed! vulnerability! assessments.! Individual! /! Family! Office.!which!include!CoBIT.! OSSTM.! PABDSS! and! Computer! Forensics.! He! is! also! involved! in! execution! and! management! of! Technical! Risk! Assessment! including!Application!Security.! Compliance.! Engineering! Goods.'CISM.! Project! and! Change! Management.

! By! becoming! a! skilled! expert! of! both! worlds! B! business! and! information! technology! he! tries! to! discover!control!and!system!errors!and!to!help!them!correct!the!best!possible!way.'Vice'President'&'Chief'Risk'Officer.! with! high! communication! skills! on! senior! level! and! with! endBusers.!COBIT.'CRISC.! Vishal! is! member! of! the! ICC! users! council! in! India.!She!has!produced!4!PhDs!and!is! heading!3!major!projects!from!University!Grants!Commission.! ! Vishal'Salvi.! Specialities:! Expertise! on! the! field! of! IT! Auditing.! USA.! He! was! a! member! of! the! International! Membership! board! of! ISACA.!Working!as!a! team! player! he! never! lost! his! individual! skills.!Risk!Management.!mining.! risk! management! and! information! security! program! management! implementation!for!HDFC!Bank.! ! Sethu'S'Raman.!ITIL.! FMCG.!He!has!earlier!been!Head!OITS!at!Standard!Chartered!Bank.!! ! He! is! also! a! member! of! ISACA! and! was! president! of! its! Pune! chapter.'KPMG' ' ! Vishal! has! a! total! of! over! 9! years! of! experience! in! Dispute! Advisory.!IT!Security.!AML.! MiFID.! He! is! a! Senior! Member! of! the! Computer! Society! of! India! and! was! the! Chairman! of! its! Pune!chapter.! Sunil! has! presented! various! topics! at! many! national! and! international!conferences!organized!by!ISACA.! Mumbai! and! as! Senior! Manager! in! Wipro! consulting! services.!CPP.'CISSP.!Legislation!compliance.! policy.!Due!diligence.'CISA.! She! has! published! many! papers! in! refereed! international!journals!and!at!reputed!international!conferences.! He! also! worked! as! Manager! in! Enterprise! Risk! Services! group! of! Deloitte! Touché! Tohmatsu! India! Private! Limited.!Japan.! Currently! he! is! working! on! CRISC! Certification! committee! of! ISACA! International! and! part! of! QA! team! of! CISA! and! CISM! technical! review! manuals.CBCP.'CGEIT.'CEH.!ICAI.'CITRM.!CSI.! Fraud! Risk! Assessments.! Verma! has! been! working! as! an! academician! and! researcher! for! 13! years.! USA! and! CISM! and! CRISC! Test! Enhancement! committee! of! ISACA.! QA! and! Consultancy.! Sunil! was! CISO! of! National! Stock! Exchange.!IT!governance! ! Vishal'Narula.!General!Internal!Audit.'ISO'27001'LA.! 10! ! .! Currently! she! is! a! researcher! in! wireless! networks! and! security.!ISO!27001/17799/BS7799.!Currently!he!is!a!freeBlance!consultant!and!trainer!in!IT!governance!and!Information! Security.'MphasiS'an'HP'Company' ' ! Sethu!S!Raman!is!an!exBdefence!officer!presently!working!as!the!Chief!Risk!Officer!with!an!MNC! IT! services! company.'C|CISO! ' Szabolcs's!primary!goal!as!an!auditor!and/or!consultant!is!to!reconcile!the!everlasting!dilemma! of! an! IT/ITSEC! being! a! business! based! function! inside! of! a! nonBIT! core! business! entity.!heavy!manufacturing.Dr.! ! Sunil'Bakshi'MCA.'AMIIB.! etc.!ferrous!and!non!ferrous!metals.! He! is! a! senior! risk! management! professional! with! a! strong! academic! background!(MBA.!etc.!CISSP)!and!21!years!of!versatile!experience! in!managing!risk!in!its!‘manifold!manifestation’!especially!in!Banking!and!IT!industries.'ABCI.! CSI! Communications! of! Computer! Society! of! India.!!Sunil!has!written!a!number!of! articles! on! Information! Systems! Security! and! Audit! topics! in! various! national! and! International! publications! like! Information! Systems! Control! Journal! of! ISACA.'PMP.! Risk! Consulting! and! Internal! Audit.!media!&!entertainment.! ! Szabolcs'Hallai.! multitasking.! Experienced! in! governmental! /! multinational! /! equity! /! financials! /! banking! environments.'CISO.!CRMA.'CISA.!He!has!worked!extensively!across!sectors!and!has!vast!experience!is!a!broad!spectrum!of! industries!covering!infrastructure.'Chief'Information'Security'Officer'$'HDFC'Bank' ! As! the! Head! of! Information! Security! for! HDFC! Bank.CISA.!BAL![law].!Policy!Compliance.'Seema'Verma.!financial!services.'Associate'Professor.!He!has!worked!across!geographies!and!has! gained!exposure!in!19!countries!across!the!globe.! Investigations.'BS25999' LI'''''' He! had! been! working! with! State! Bank! of! India! for! 25! years! as! IT! Manager.'Banasthali'Vidyapith' ! Dr.'Associate'Director.'CISM.! Sunil! is! also! member!of!Association!of!Technical!Scholarships!(AOTS).! he! is! accountable! and! responsible! for! strategy.'CISM.

!!! Entry!to!the!exam!centre! Registered! candidates! must! enter! the! exam! centre! 30! minutes! prior! to! the! start! of! the! exam.! On! registering! for! the! certification! exam.'CEH' ! He! has! over! 20! years! of! experience! spreading! across! Information! Technology! services.! Special!Arrangements!! No!food!or!drink!is!permitted!at!the!exam!centre.!preBpost!acquisition!IT!due!diligence.! you! will! be! provided! comprehensive!reference!material!and!the!IFSBGFSU!Guide!to!the!Common!Body!of!Knowledge! for!Information!Security!(CBOKIS)!in!electronic!form.!! B15.!ISO!27001/ISO!22301/BS!25999! implementation!&!compliance!assessment.!registered!candidates!will!be!emailed! an! electronic! Admission! Pass! containing! the! date.!passport.!IT!governance.! Candidates! must! apply! their! knowledge! and! skills! to! choose! the! most! appropriate! option.! CBOKIS! is! a! comprehensive! description! of! the! sum! of! knowledge! and! professional! practices! and! techniques! that! are! generally!accepted!within!the!Information!Security#profession.! South! East! Asia! and! India.!Such!questions!focus!on!testing!a! candidate’s! skill! development.'CPISI.g.!Any!candidate!who!is!late!will!be!denied!entry!to!the!exam!centre!and!will!not!be! permitted!to!take!the!exam.! Contract!compliance.! ! B12.!The!Exam!fees!paid!by!such!a!candidate!will!be!forfeited.!Information!Security!&!Technology!risk!assessments.! Information! risk! management! and! business! continuity! in! various! geographies! including! Middle! East.!etc.!Type!of!questions! The!examination!will!consist!primarily!of!Case!Study!Based!(ProblemBBased)!questions.!These! questions! consist! of! a! practical! problem! followed! by! several! options.!CBOKIS!is!not!static!and!will!be! constantly!evolving!as!the!field!of!Information!Security#develops.! require! thinking! and! do! not! focus! on! purely! theoretical! knowledge.! Business!Continuity/DR!Planning.!! B14.!HIPAA!Implementation.! Specialties:! Information! Risk! Management! &! consulting! in! Regulatory!standards!such!as!PCI!DSS.!PAN!card.'BCCS.! B13.'BCCP.'CRISC.! 11! ! .!You!must!carry!a!printout!of!this!Admission!Pass!along!with!a!Government! issued!photoBidentity!card!(e.! time! and! exact! venue! of! the! examination.).!Administration!of!the!Exam! Admission!Pass! Approximately!one!week!prior!to!the!exam!date.!drivers!license.!Information!Security!Architecture.'ISO'27001.!Preparation!for!the!Exam! Case!Study!Based!(ProblemBBased)!questions!require!candidates!to!study!the!reference!material! thoroughly! and! ensure! understanding! of! how! the! information! can! be! applied! in! realBlife! practical! situations.!IT!Strategy.Yogesh'Dange.!Common!Body!of!Knowledge!for!Information!Security!(CBOKIS)! The! IFSBGFSU! Common! Body! of! Knowledge! for! Information! Security# (CBOKIS)! establishes! a! baseline! for! the! body! of! knowledge! for! Information! Security.!An!exception!can!be!made!in!case!of! medical! reasons! provided! the! registered! candidate! shows! a! doctor’s! certificate! to! this! effect.! IFSBGFSU! certifications! use! this!type!of!questions!as!they!allow!candidates!to!demonstrate!their!practical!understanding!of! the!topic!rather!than!requiring!them!to!memorise!information.'BS'25999.

No!contact!lectures!or!classes!shall!be!provided.! 3.! sharpener. using!any!reference!material.000! ! 4.! Malpractice!or!cheating! The! following! activities! will! constitute! malpractice! and! may! result! in! the! candidate! being!debarred!from!all!future!exams!as!well!as!prosecuted!under!the!law:! 1.!tablet.! 5.! 7. using!any!communication!device.! eraser.!! ! 4.What!to!carry!into!the!exam!centre! Suitable! pencils.!paper. carrying!the!question!booklet!or!answer!sheets!outside!the!exam!centre.!calculator.! ! B18.!etc.! ! 12! ! . assisting!another!candidate!in!attempting!the!exam.!Fees! ! Particulars' OneBtime!Permanent!Registration!Fee!! Exam!Fees!(For!students!pursuing!graduation)! Exam!Fees!(For!others)! Fee' ' 1.! the! registrant! shall! be! provided! the! list! of! recommended!reference!material.!! ! 2.!he!/!she!will!be!required!to!pay!50%!of! the!current!Exam!Fees!for!subsequent!attempts.!books.! a! printout! of! your! Admission! Pass! and! a! valid! Government!issued!photoBidentity!card.! 6.! ! B17. attempting!to!take!the!exam!for!another!person.!Exam!Duration! The!certification!exam!has!a!length!of!3!hours. leaving!or!entering!the!exam!centre!without!authorization!from!the!Examiner.! ! 3.! 2. In!case!a!registrant!fails!the!certification!exam. carrying!any!reference!material!into!the!exam!centre. disturbing!the!other!candidates!during!the!examination.500! ! 10.! What!NOT!to!carry!into!the!exam!centre! Any!reference!materials. On! registering! for! a! certification.!cellBphone.! ! B16.! 8.!Passing!Score! To!pass.!a!candidate!must!obtain!a!minimum!of!70%!in!each!of!the!sections!of!the!exam.000! ! ! Note:' ' 1.!Do!not! carry!any!food!or!drinks!unless!you!have!a!doctor’s!certificate!proving!the!need!for!it.! 4.!laptop. No!fee!refunds!will!be!made!to!any!registrant.

1.3 Threats! D# Loss.!Early!Warning!Systems! 1.2.#Secure#usage! 1.#Cloning.# Malware.1 Desktop'and'Laptop'Security' 1.#Linux#computer.!Detailed!Examination!Syllabus! 1. Information!Security!Incident!Response! 4.3.!2014! 20th!June.!Zero!day!threats.!Dates! ! Exam'date' Sunday!19th!January. Data!Protection! 6.# Spam.#OrganizationalDOriented#Measures! ! 1.#Application#Whitelisting! 1.# Prioritization# and# Testing.# Antivirus.# Configuration#management.2.# Installation# Side# Effects.# Unauthorized# access.!2013! 20th!March.#ServerDresident#data.!2014! Sunday!20th!April.3.2. Network!&!Internet!Security! 3.2 Security!in!a!BYOD!environment! ! 1.4.4 Password'Management' 1.1 Desktop!&!Laptop!Security!–!Windows.!Overview!of!Examination!Syllabus! This!examination!is!divided!into!the!following!sections:! ! 1.# or# disposal.# Software# Inventory# Management.3 Enterprise! Patch! Management! Technologies! B! Components#and#Architecture#(AgentD Based.1 Cell!Phones!B!Cellular#Communications.4 Safeguards!B!UserDOriented#Measures.1 Understanding!Passwords!and!Password!Management! 13! ! . END$POINT'SECURITY' ' 1.2 Software!Applications! 1.! 1.# Passive# Network# Monitoring).# theft.3.3 Patch'and'Vulnerability'Management' 1. Information!Security!Testing! 7.#Macintosh! 1.1 Importance!of!Patch!Management.2.#Identity#Modules. EndBpoint!Security! 2.#Vulnerability#scanning)! ! 1.# Electronic# eavesdropping.!2014! Registration'closes'on' 19th!December.# Patch# Implementation# Verification.B19.#Electronic#tracking.2 Cell'Phone'Security' 1. Regulatory!&!Standards!Compliance! 5.# Patch# Management# Configuration.# Patch# Management# Capabilities.1.!2014! ! ! B20.# Security# Capabilities# (Inventory# Management# Capabilities.!2014! Sunday!19th!October.# Resource# Overload.!2014! 19th!September. Contingency!Planning! ! ! B21.2 Challenges! of! Patch! Management! B! Timing.!2014! Sunday!20th!July.# Alternative# Host# Architectures.# Agentless# Scanning.

#Guest#OS# Images.1.#sanitization#scope! 1.#reuse#of#media.1 Understanding!Virtualization!B!Virtualized#Networking.# Stateful# Protocol# Analysis.# Logging# Capabilities.# Logging# Capabilities.# Detection# Capabilities.# AnomalyDBased# Detection.# Social# Engineering).#User#Password#Selection.# trends# in# sanitization.6 Network! Behaviour! Analysis! (NBA)! System#D#Components#and#Architecture#(Typical# Components.# Security# Capabilities# (Information# Gathering# Capabilities.# Virtualized# Infrastructure# Security.# types# of# sanitization.# Operation# and# Maintenance.#Detection#Capabilities.# verify# methods.# Guest# OS# Security.# Threats#against#WLANs).# Prevention# Capabilities).#Password#Guessing#and#Cracking#(Guessing.# Network# Architectures.#Operation#and#Maintenance)# 14! ! .#control# of# media.1 Intrusion! Detection! and! Prevention! Principles! B! Uses# of# IDPS# Technologies.#Cracking.1.# Types# of# IDPS# Technologies! 2.# User#Knowledge#and#Behaviour).# Network# Architectures).# documentation! 1.# Password#Strength.# Using# Compromised# Passwords! 1.# Password# Replacing# (Forgotten# Password# Recovery# and# Resets.2 Information!Sanitization!and!Disposition!Decision!Making!B!information#decisions#in# the#system#life#cycle.# data# protection# level.# SignatureDBased# Detection.# Detection# Capabilities.#Network# Architectures.#Management#(Implementation.# Detection# Capabilities.6.#Local#Password#Management! ! 1.# Common# Detection# Methodologies.# Hypervisor# Security.#Operation#and#Maintenance)# 2. NETWORK'&'INTERNET'SECURITY' ' 2.# trends# in# data# storage# media.6.#Prevention#Capabilities)! 2.#factors#influencing#sanitization#and#disposal#decisions.# Sensor# Locations).3 !Secure!Virtualization!Planning!and!Deployment! ! 1.1.# Building# and# Maintaining#Skills# 2.# Prevention#Capabilities).4.# Key# Functions# of# IDPS# Technologies.#Image#and#Snapshot# Management.6 Media'Sanitization' 1.#Hardware#Layer).#Management#(Implementation.4 NetworkBBased! IDPS# D# Networking# Overview# (Application# Layer.#Virtualized#Storage.# Security# Capabilities# (Information# Gathering# Capabilities.2 IDPS! Technologies! B! Components# and# Architecture# (Typical# Components.4.1.#Guest#OS#Monitoring.#Components#and#Architecture#(Typical#Components.#determination#of#security#categorization.#Desktop#Virtualization! 1.1 Intrusion'Detection'&'Prevention'systems' 2.2 Virtualization!Security!B!Guest#OS#Isolation.# Transmission.# Transport# Layer.#Components#and#Architecture#(Typical#Components.6.# Sensor# Locations)# Security# Capabilities# (Information# Gathering# Capabilities.# Password# Synchronization.#Desktop#Virtualization#Security# 1.1 Understanding! Media! Sanitization! B! types# of# media.# Logging# Capabilities.# Prevention# Capabilities).#WLAN#Components.5 Wireless!IDPS!B#Wireless#Networking#Overview#(WLAN#Standards.1.5.3 Data!Leakage!Prevention! ! 2.#Server#Virtualization.#Operation#and#Maintenance)# 2.#Local#Administrator#Password#Selection).# Security# Capabilities# (Information# Gathering# Capabilities.2 Mitigating! Threats! Against! PasswordsB! Password# Capturing# (Storage.5.# Network#Layer.5 Security'for'Full'Virtualization'Technologies' 1.# sanitization# and# disposal# decision.# Management#(Implementation.5.# Network# Architectures# and# Sensor# Locations).3 Password! Management! Solutions! B! Single# SignDOn# Technology.3 Management! B! Implementation.1.# Access# to# Stored# Account# Information# and# Passwords.1.# use# of# cryptography# and# cryptographic# erase.# Logging# Capabilities.

# Prevention# Capabilities.#Operating#Systems.# Management# Requirements# (Design# and# Implementation.# Evaluating#Products#(IDPS#Testing#Challenges.#Performing#IDPS#Evaluations)# 2.# Other# Technologies# with# IDPS# Capabilities# (Network# Forensic# Analysis# Tool# Software.2.#Architecture#with#Multiple#Layers#of#Firewalls# 2.3 Log! Management! Planning! B! Define# Roles# and# Responsibilities.# ApplicationDProxy# Gateways.#Personal#Firewall#Appliances! 2.# Goals#and#Objectives.# Configuring# (Hardware# and# Software# Installation.4 Log!Management!Operational!Processes!B!Configure#Log#Sources#(Log#Generation.# Life# Cycle# Costs.#Resource# Constraints).# Documentation.# HostDBased# Firewalls# and# Personal# Firewalls.# IPv6.1.# Detection# Capabilities.# Syslog# Security).7 HostBBased! IDPS! B# Components# and# Architecture# (Typical# Components.# Respond# to# Identified# Events.# Dedicated# Proxy# Servers.#Log# Storage# and# Disposal.# Other# Capabilities).# SyslogDBased# Centralized# Logging# Software# (Syslog# Format.# Analyze# Log# Data# (Understanding# of# Logs.3.# Logging# and# Alerts# Configuration).# Network# Architectures.#Policies#Based#on#User#Identity.# Establish# Logging# Policies.1 Understanding! Computer! Security! Logs! B! The# Basics# of# Computer# Security# Logs# (Security#Software.# Antivirus# Technologies.# Application# Portals.# Prioritizing# Log# Entries.# and# Security# Controls.# Performance# Requirements.2.# Stateful# Inspection.# Comparing# SystemDLevel# and# InfrastructureDLevel# Analysis).# ICMP.2 Firewalls! and! Network! Architectures! B! Network# Layouts# with# Firewalls.# Honeypots)# 2.#Usefulness#of#Logs).#Operation)# 2.#Deploying.9 IDPS! Product! Selection! B# General# Requirements# (System# and# Network# Environments.1.# Prevention# Capabilities).# Log#Protection.2.8 Using# and# Integrating# Multiple# IDPS# Technologies# D# The# Need# for# Multiple# IDPS# Technologies.#The#Need#for# Log# Management.#Policies#Based#on#Network#Activity! 2.# IPsec# Protocols).# TCP# and# UDP.# Training.# Unified# Threat# Management# (UTM).3.# Security# Capability# Requirements# (Information# Gathering# Capabilities.#Log#Analysis)! 2.#Security#and#Other#IT#Policies.# Firewalls# for# Virtual# Infrastructures.1.4 Enterprise'Telework'and'Remote'Access'Security' 2.# Testing.# Firewalls# and# Routers.1 Firewall! Technologies! B! Packet# Filtering.# Policy# Configuration.# Perform# Testing# and#Validation! ! 2.# Virtual# Private# Networking.3 Computer'Security'Log'Management' 2.#Direct#Application#Access)! 15! ! .1 Overview! of! Enterprise! Telework! and! Remote! Access! Security! B! Vulnerabilities.# Network# Access# Control.# Operation# and# Maintenance.# Application# Firewalls.3 Firewall!PolicyB!Policies#Based#on#IP#Addresses#and#Protocols#(IP#Addresses#and#Other# IP# Characteristics.#Design#Log#Management#Infrastructures! 2.# Integrating# Different# IDPS# Technologies# (Direct# IDPS# Integration.# Threats.4.# Log# Security).# Remote# Access# Methods# (Tunnelling.#Additional#Types#of#Log#Management#Software! 2.# Agent# Locations.# Policies# Based# on# Applications.# Host# Architectures).2 Log! Management! Infrastructure! B! Architecture.2.# Detection# Capabilities.# The# Challenges# in# Log# Management# (Log# Generation# and# Storage.3.#Managing# # 2.#Remote#Desktop#Access.#Applications.# and# Technical# Support).2 Firewalls'and'Firewall'Policy' 2.# Web# Application# Firewalls.#Ensure#that#Policies#Are#Feasible.# Logging# Capabilities.1.2.4 Firewall! Planning! and! Implementation! B! Planning.# Functions.# Security# Capabilities# (Logging# Capabilities.10 Honeypots# # 2.! Manage# LongDTerm# Log# Data# Storage.3.# Security# Information# and# Event# Management#Software.# Indirect# IDPS# Integration).# Firewalls# Acting#as#Network#Address#Translators.# Management#(Implementation.#External#Requirements.

# Threats# to# the# System# BIOS.! ! 2.4 Securing! the! Server! Operating! System! B! Patch# and# Upgrade# Operating# System.# Applications.# Management# Practices.# Endpoint# Remote# Access# Servers).5.#Disposal.# Penetration# Testing).#Backing#Up#Data#on#Telework#Devices)! Security! Considerations! for! the! Telework! and! Remote! Access! Life! Cycle! B! Initiation# (Permitted# Forms# of# Remote# Access.! ! 2.#Automated#Log#File#Analysis#Tools).# Protecting# Data# on# Telework# Client# Devices# (Encrypting# Data# at# Rest.# Security# Management# Staff.6.# Restrictions# on# Telework# Client# Devices# and# Remote# Access# Levels.6 Maintaining!the!Security!of!the!Server!B!Logging#(Identifying#Logging#Capabilities#and# Requirements.#WebDBased#Mail#Access)! 2.# Hardening#and#Securely#Configuring#the#OS#(Remove#or#Disable#Unnecessary#Services.# Development.# Configuring# Access# Controls.6.# System# BIOS# Update# Mechanisms.#Using#Virtual#Machines.#Basic#Server#Security# Steps.# Secure# BIOS# Update# at# Reboot.#General#Information#System#Security#Principles! 2.# Install# and# Configure# Additional# Security# Controls.# Mail# Transport# Standards# (SMTP.5.6 Electronic'Mail'Security' 2.4.6.# Remove# or# Disable# Unnecessary# 16! ! .# Security#Categorization#of#Information#and#Information#Systems.# Security#Testing#the#Operating#System! 2.# System# Security# Plan.#NonDBypassability).# Recovering# From# a# Security# Compromise.# Access# Control#for#Applications).2.# Securing# Telework# Consumer# Devices.# Secure# BIOS# Update# Requiring# Verification#at#Boot).# Authorization.#Proprietary#Mailbox# Access#Mechanisms.# Maintain# a# Test# Server).2 Basic! Issues! in! Server! Security! B! Server# Vulnerabilities.# Firmware# Integrity# Protection.# Selecting# and# Implementing# Authentication#and#Encryption#Technologies! 2.# Proprietary# Mail# Transports).# Configure# Resource# Controls# Appropriately).# Server# Architectures.#Security#Guidelines#by#Update#Mechanism#(Secure#BIOS# Update# at# Anytime.# and# Network# Protocols.# SMTP# Extensions.# Client# Access# Standards#(Post#Office#Protocol.#Guidelines#for#Service#Processors#(Service#Processor#as#a#Root#of# Trust.3 Server! Security! Planning! B! Installation# and# Deployment# Planning.#Server#Security#Principles! 2.1 Background! and! Standards! B! Multipurpose# Internet# Mail# Extensions.# Security# Testing# Servers# (Vulnerability# Scanning.5 Server'Security' 2.# and# Environments.# Remote# Access# Server# Placement# (Intermediary# Remote# Access# Servers.4.#Reviewing#and#Retaining#Log#Files.# Human# Resources# Requirements.# Remote# Access# Authentication.#Security# Management# Staff.4 Securing!the!Mail!Server!Operating!System!B!Updating#and#Configuring#the#Operating# System# (Patch# and# Upgrade# Operating# System.5.# Root# of# Trust# for# Update.# Secure# Local# Update.# Implementation.# Additional# User# Requirements).# Server# Backup# Procedures# (Server# Data# Backup# Policies.# Operations#and#Maintenance.3 2.3 Planning!and!Managing!Mail!Servers!B!Installation#and#Deployment#Planning.2 Signing!and!Encrypting!Email!Messages!B!OpenPGP.# Server# Resource# Constraints.5.# Management# Practices.2 2.# Authorization.4 Remote! Access! Solution! Security! B! Remote# Access# Server# Security.#Issues# with#Email#Encryption# 2.#S/MIME.# Human# Resources# Requirements! 2.#Key#Management.#NonDBypassability#of#BIOS#Protections#by#Service#Processor)! 2.# Configure# OS# User# Authentication.# and# Access# Control# (Authentication.4.#Internet#Message#Access#Protocol.5 Securing! the! Server! Software! B! Securely# Installing# the# Server# Software.5.1 Server! BIOS! Protection! B! System# BIOS.# BIOS# Security# Principles# (BIOS# Update# Authentication.# System# Security# Plan.5.# Server# Backup# Types.# Threats.# Access# Control# for# Network# Communications.#Remote#Access#Client#Software#Security! Telework! Client! Device! Security! B! Securing# Telework# PCs.# Remotely# Administering# a# Server.6.

4 Securing! Web! Content! B! Publishing# Information# on# Public# Web# Sites.# Mail# Gateways.1 Planning!and!Managing!Web!ServersB!Installation#and#Deployment#Planning.# Alternative# Web# Server# Platforms# (Trusted# Operating# Systems.# SSL/TLS# Implementations).#Blocking#SpamDSending#Servers.# Brute# Force# Attacks! 2.# Install# and# Configure# Additional# Security# Controls)# Security#Testing#the#Operating#System! Securing!Mail!Servers!and!Content!B!Hardening#the#Mail#Server#Application#(Securely# Installing# the# Mail# Server.#PlugDins.# Automated# Log# File# Analysis# Tools).# Management# Practices.6.# Configuring# Operating# System# and# Mail# Server# Access# Controls).# Pharming).#Digest# Authentication.#Authenticated#Mail#Relay.#Configure#Operating#System#User#Authentication.3 Securing! the! Web! Server! B! Securely# Installing# the# Web# Server.6.6.#Network#Switches)! Securing! Mail! Clients! B! Installing# and# Configuring# Client# Applications# (Patching# and# Updating# Mail# Clients.# Demilitarized# Zone.#Security# Management# Staff.6.#Network#Switches.# Implementing# SSL/TLS.#Accessing#WebDBased#Mail#Systems! Administering! the! Mail! Server! B! Logging# (Recommended# Generic# Logging# Configuration.#ServerDSide#Content# Generator#Security#Considerations.# Security# Testing# Mail#Servers#(Vulnerability#Scanning.#Penetration#Testing).7.# Configuring# Secure# Web# Content# Directory.# Weaknesses# of# SSL/TLS.# Security#Testing#the#Operating#System! 2.# Plan.7 Public'Web'Server'Security' 2.#Reverse#Proxies)! 17! ! .6 Implementing!a!Secure!Network!Infrastructure!B!Network#Composition#and#Structure# (Inadvisable# Network# Layout.7.5 2.# Recovering# from# a# Security# Compromise.# Outsourced# Hosting.# Configuring# Access# Controls# (Configuring# the# Permissions# of# the# Web# Server# Application.# Securing# Active# Content# and# Content# Generation# Technologies# (Vulnerabilities# with# ClientDSide# Active# Content# Technologies.# Uniform# Resource# Identifiers# and# Cookies.# SSL# /# TLS# (SSL/TLS# Capabilities.# Demilitarized# Zone.#Location#of#ServerDSide#Content#Generators.# System# Security.# Log# File# Review# and# Retention.# Intrusion# Detection#and#Prevention#Systems.5 Using!Authentication!and!Encryption!Technologies!B!Determining#Authentication#and# Encryption#Requirements.7 2.# Management# Network).# SSL/TLS# Encryption# Schemes.# Remove# or# Disable# Unnecessary# Services#and#Applications.# Management# Network).# Human# Resources# Requirements.7.8 Services#and#Applications.#Intrusion# Detection#and#Prevention#Systems.#Configure# Resource# Controls# Appropriately.2 Securing!the!Web!Server!Operating!System!B!Installing#and#Configuring#the#Operating# System# (Patch# and# Upgrade# Operating# System.# Configuring# Authentication# and# Access.# Backing# Up# Mail# Servers.#Content#Filtering.7.#User# Awareness).#AddressDBased#Authentication.2.#Remotely#Administering#a# Mail#Server# ! 2.# Web# Server# Appliances.#CrossD Site#Scripting#Vulnerabilities)! 2.# Virtualized# Platforms)! 2.# Configuring# Mail# Client# Security# Features.#Network#Element#Configuration#(Router#/#Firewall#Configuration.# Enabling#Web#Access# Implementing!a!Secure!Network!Infrastructure!B!Network#Composition#and#Structure# (Inadvisable# Network# Layout.#Secure#Access.# Secure# Message#Composition.#Load#Balancers.# Network# Element# Configuration# (Router/Firewall# Configuration.# PreDHardened# Operating# Systems# and# Web# Servers.#Configure# Resource# Controls# Appropriately.7.6 2.# Securing# the# Client# Host’s# Operating# System).7.#Mitigating#Indirect#Attacks# on# Content# (Phishing.# Observing# Regulations#about#the#Collection#of#Personal#Information.# Install# and# Configure# Additional# Security# Controls).#Protecting#Email#from#Malware#(Malware#Scanning.#Basic#Authentication.# Controlling# Impact#of#Web#Bots#on#Web#Servers)# 2.#Configure#Operating#System#User#Authentication.# Vulnerabilities#with#ServerDSide#Content#Generation#Technologies.

1 Understanding! IPv6! B! Limitations# of# IPv4.# DNS# Components# and# Security#Objectives# 2.#IPv6#and#Routing.10.#Incorrect#Expansion#Rules#Applied#to#Wildcard#RRs.9.8 Securing!DNS!Query/Response!! 2.10.# Identifying# Additional# Logging# Requirements.2 SSL!VPN!Fundamentals.# Recommended# Generic# Logging# Configuration.#Disposition#Phase)! ' 2.# IPv6# Quality# of# Service# (QoS).3 IPv6! Deployment! B! Security# Risks.# Implementation# Phase.8.9 Minimizing!Information!Exposure!through!DNS!Data!Content!Control!! 2.2 IPv6! Security! B! Privacy# Addresses.# Securing# DNS# Software.! Security! Objectives.9.# Addressing# Security.1 Securing! Domain! Name! System! B! DNS.# IPv6# Header# Types.4 DNS!Hosting!Environment!Threats.9.7.!and!Protection!Approaches#D# Host# Platform# Threats.#IPv6# and# the# Domain# Name# System# (DNS).#Translation.# Mobile# IPv6.# Formats.# Dynamic# Updates.# IPv6# Address# Allocations.# Dynamic# Host# Configuration#Protocol#(DHCP)#for#IPv6.# Address# Selection.#Resolvers!! 2.# Jumbograms.# Host# Platform# Protection# Approach.8.2.!Security!Objectives.#Tunneling.5 DNS! Transactions! Threats.9.8.# Removal#of#Some#RRs.# IPv4# and# IPv6# Threat# Comparison.# and# Fields.2 DNS! Data! and! DNS! Software! B! Zone#File.9 Secure'Domain'Name'System'Deployment' 2.#Other#Transition#Mechanisms.#Internet#Control#Message#Protocol#for#IPv6#(ICMPv6).#Content#Control#of#Zone#File! 2.9.6 Securing! DNS! Hosting! Environment! B! Securing# DNS# Host# Platform.# Caching#Name#Servers).!Planning!and!Implementation! 2.# Reviewing# and# Retaining# Log# Files.7 Securing! DNS! Transactions! B! Restricting# Transaction# Entities# Based# on# IP# Address.# The# IPv6# Deployment# Planning# Process# for# Security.# Motivations# for# Deploying# IPv6.#Name#Servers#(Authoritative#Name#Servers.#Protection# Approach# for# DNS# Query/Response# Threats—DNSSEC).# Multihoming.9.8 Secure'Deployment'of'IPv6' 2.# DNS# NOTIFY# 2.# Penetration# Testing).# Dynamic# Updates# Threats# and# Protection# Approaches.# IPv6# Addressing.9.7 Administering! the! Web! Server! B! Logging# (Identifying# the# Logging# Capabilities# of# a# Web# Server.# Maintain# an# Authoritative# Copy# of# Organizational# Web# Content).9.1 Network!and!Transport!Layer!Security! 2.# Transition# Mechanisms.# DNS# NOTIFY#Threats#and#Protection#Approaches# 2.# DNS# Software# Threats.# Web# Server# Backup# Procedures# (Web# Server# Backup# Policies# and# Strategies.# DNS# Infrastructure.# Threats# Due# to# DNS# Data# Contents.#Secure#Stateless#Address#AutoDconfiguration#and#Neighbor#Discovery! 2.# Acquisition# /# Development# Phase.# Zone# Transfer.9.9.#IPv6#Prefix#renumbering! 2.# Maintain# a# Test# Web# Server.# Dual# Stack#IPv4/IPv6#Environments.# Operations# /# Maintenance#Phase.10 DNS!Security!Administration!Operations! ' 2.# IPsec# in# IPv6.# Transaction#Protection#Through#HashDBased#Message#Authentication#Codes! 2.3 Alternatives!to!SSL!VPNs! 18! ! .! and! Protection! Approaches! B! DNS# Query/Response# Threats# and# Protection# Approaches# (Forged# or# Bogus# Response.# Remotely# Administering#a#Web#Server# ' 2.3 DNS! Transactions! B! DNS# Query/Response.# Zone# Transfer# Threats# and# Protection# Approaches.# Recovering# From# a# Security# Compromise.# Security# Objectives.# Cryptographically# Generated# Addresses.# DNS# Software# Protection# Approach.# IPv6# Deployment# (Initiation# Phase.10.#DNS#Data#Content#Control#–#Protection#Approach# 2.# Automated# Log# File# Analysis# Tools).10 SSL'VPNs' 2.# IPv6# Extension# Headers.# Security# Testing# Web# Servers# (Vulnerability# Scanning.# Major# Features# of# the# IPv6# Specification.# IPv6# Multicast.

# Software# Solutions.#Collecting.2.#Industry#and#Standards#Organizations! 5.# Random# Number# Generation.# Asymmetric# vs.#PostDIncident#Activity! 3.# and# Procedure# Creation.2 Public! Key! Infrastructure! (PKI)! B! Security# Requirements# for# PKI# Components.1 Establishing!and!Organizing!a!Forensics!Capability! 3.3.3 Relevant!EU!regulatory!framework! 4.# Hash# Functions.1.# Key# Management.2 Forensics'&'Incident'Response' 3.#Analysis! 3.#circulars# 4.#20000.2.2. DATA'PROTECTION' ! 5.1.# regulations.# Information# Sharing# Techniques.1.# Incident#Response#Team#Structure.#Examination.# Incident# Response# Policy.5 Other!standards!B!FIPS#PUB#200.# Message# Authentication# Code# (MAC# Based# on# a# Block# Cipher# Algorithm.1 Storage! Security! Overview! B! File# Storage# Basics.#Granular#Information#Sharing! ! 3.4 Operating! System! Evidence! B! Collecting.# Health# Insurance# Portability# And#Accountability#Act. INFORMATION'SECURITY'INCIDENT'RESPONSE'&'FORENSICS' ! 3.# Advanced# Encryption# Standard# (AES).#27000#series! 4.#National#Voluntary# Laboratory#Accreditation#Program#(NVLAP).2.# Examining# &# Analyzing# volatile# and# nonD volatile#data# 3.1 Understanding! Cryptography! –! Symmetric# &# Asymmetric# cryptography.1.# Symmetric#Cryptography.# Digital# Signatures.#Examining#&#Analyzing#network# traffic#data# 3.# Security#Controls#for#Storage! 19! ! .5 Selecting! Cryptography! –! Initiation.4 Relevant!ISO!standards!–!13335.2 Handling!an!Incident!B!Preparation.#Key#Management! 5.#guidelines.# Steganography.# The# Need# for# Storage# Security.4 Assessments!B!Cryptographic#Module#Validation#Program#(CMVP).# and#Recovery.1.# Implementation/# Assessment.2 !Relevant! US! regulatory! framework! –! SarbanesDOxley# Act.#Operations#and#Maintenance.#RSA# 5.# PKI# Architectures# 5.2.# Plan.# MACs# Based# on# Hash# Functions).1 Relevant! Indian! regulatory! framework! B! Information# Technology# Act# and# related# rules.1 Cryptography' 5.1.# Digital# Signature#Standard.#COBIT! ! ! 5.1.3 Coordination! and! Information! Sharing! B! Coordination.6 Evidence!from!Applications!B!Collecting.#Collecting#Files.5 Evidence!from!Network!Traffic!B!Sources.3 General! Implementation! Issues! B! Hardware# vs.2.#Examining#&#Analyzing#application#data! ! ! 4.#Federal#Information#Security#Management#Act! 4.2.# Acquisition/Development.# Need# for# Incident# Response.#Detection#and#Analysis.#Analysis.#Incident#Response#Team#Services# 3.#Containment.1 Information'Security'Incident'Handling' 3.#Reporting! 3.2 Performing!the!Forensic!Process!B!Data#Collection.#PCI#DSS.1.#Disposition! ! 5.#Examining#Data#Files.#15408.#Eradication.1 Organizing!a!Computer!Security!Incident!Response!Capability!B!Events#and#Incidents.#COSO#framework.3 Data!Files!as!Evidence!B!File#Basics. REGULATORY'&'STANDARDS'COMPLIANCE' 4.2 Storage'Encryption'Technologies'for'End'User'Devices' 5.

# Log# Review.2 5.# Active# Wireless# Scanning.3 Storage! Encryption! Technologies! B! Common# Types# of# Storage# Encryption# Technologies# (Full# Disk# Encryption. INFORMATION'SECURITY'RISK'ASSESSMENT'&'TESTING'' ! 6.2 Conducting'Risk'Assessments' 6.# Implement# and# Test# Prototype.#Data#Destruction)# 6.# conducting# the# risk# assessment.#Assessment#Plan#Development.4 Target!Vulnerability!Validation!Techniques!B!Password#Cracking.#Protection#Provided#by#Storage#Encryption#Technologies! Storage! Encryption! Technology! Planning! and! Implementation! B! Identify# Needs.# Crisis# Communications# Plan.2.2.# Location# Selection.# trust# and# trustworthiness.# key# risk#concepts.#Penetration#Testing#Logistics).# Data# Handling# (Data#Collection.# Authentication).# Deploy#the#Solution.# responding# to# risk.3.1 Contingency!Planning!and!Resilience! 7.1 Fundamentals!of!risk!management!B!components#of#risk#management.1.#Legal#Considerations)# 6.1.3.#Network#Port#and# Service# Identification.# relationship# among# key#risk#concepts# 6.2 Risk! assessment! process! –! preparing# for# the# risk# assessment.#Data#Storage.2.1.3.# Wireless# Scanning# (Passive# Wireless# Scanning.# Analysis.# Assessing.2 Types!of!Plans!B!Business#Continuity#Plan#(BCP).# Assessment# Logistics# (Assessor# Selection# and# Skills.#maintaining#the# risk#assessment# ! 6.#Manage#the#Solution# ! ! 6.3.# File/Folder#Encryption).#Remediation#/#Mitigation! ! ! ! 7.1. CONTINGENCY'PLANNING' ! 7.#Social#Engineering# 6.#Reporting.# Bluetooth# Scanning)# 6.3.#Overt#and#Covert)! 6.3 Target! Identification! &! Analysis! Techniques! B! Network#Discovery.#Continuity#of#Operations#(COOP)#Plan.2.# Vulnerability# Scanning.7 PostBTesting!Activities!B!Mitigation.# Cyber# Incident# Response# Plan.3.#Prioritizing# and# Scheduling# Assessments.1 Risk'Management' 6.#multitiered#risk# management.# Critical# Infrastructure# Protection# (CIP)# Plan.#Network#Sniffing.1 Understanding! Security! Testing! &! Examination! B! Information# Security# Assessment# Methodology.2 Review! Techniques! B! Documentation# Review.# monitoring#risk# ! 6.#Penetration#Testing# (Penetration#Testing#Phases.# Design# the# Solution# (Cryptography.2 Risk! management! process! B! framing# risk.#application#of#risk#assessments! 6.# Wireless# Device# Location# Tracking.# risk# assessment.5.# organizational# culture.# Information# System# Contingency#Plan#(ISCP).1 Understanding'contingency'planning' 7.# Technical# Tools# and# Resources#Selection.# Virtual# Disk# Encryption# and# Volume# Encryption.# Ruleset# Review.1 Fundamentals! of! risk! assessments! B! risk# management# process.# Disaster# Recovery# Plan# (DRP).# assessing# risk.# System# Configuration#Review.3.# Comparing# Tests# and# Examinations.#communicating#and#sharing#risk#assessment#information.5 Security!Assessment!Planning! B!Developing#a#Security#Assessment#Policy.3 Information'Security'Testing'and'Assessment' 6.6 Security! Assessment! Execution! B! Coordination.# Testing#Viewpoints#(External#and#Internal.# Technical# Assessment# Techniques.#File#Integrity#Checking! 6.#Occupant#Emergency#Plan#(OEP)! 20! ! .# Selecting# and# Customizing# Techniques.#Data#Transmission.

# Identify# Resource# Requirements.2.3 Recovery! Phase! B! Sequence# of# Recovery# Activities.# Recovery# Escalation#and#Notification! 7.2 Activation! and! Notification! Phase! B! Activation# Criteria# and# Procedure.4.# Protection# of# Resources.!Training.3 Telecommunications! Systems! B! Telecommunications# Contingency# Considerations# &# Solutions! 7.3.2 Client/Server!Systems!B!Client/Server#Systems#Contingency#Considerations#&#Solutions! 7.1 Developing!the!Contingency!Planning!Policy!Statement! 7.4 Reconstitution!Phase! 7.3 Information'System'Contingency'Plan'Development' 7.#Exercises.# Backup# Methods# and# Offsite# Storage.1 Common!Considerations!B!Use#of#the#BIA.! 7.# Roles# and#Responsibilities! 7.# Notification# Procedures.# Equipment# Replacement.2 Conducting! the! Business! Impact! Analysis! (BIA)! B! Determine# Business# Processes# and# Recovery# Criticality.1 Supporting!Information! 7.!and!Exercises!B!Testing.#Training.# Adherence# to# Security# Controls.2.5 Plan!Appendices! ! ! ! 7.4 Mainframe!Systems!B!Mainframe#Contingency#Considerations#&#Solutions! ! ! ! 21! ! .3.4.# Cost# Considerations.2.2 Information'System'Contingency'Planning'Process' 7.2.#Integrity.5 Testing.4 Technical'Contingency'Planning'Considerations' 7.# Alternate# Sites.3.4.#Maintenance#of#Data#Security.#Outage#Assessment## 7.#and# Backup.#Plan#Maintenance# # 7.3.4.3 Identifying!Preventive!Controls! 7.#Use#of#High#Availability#(HA)#Processes! 7.2.4 Creating! Contingency! Strategies! B! Plan# Backup# and# Recovery.# Recovery# Procedures.# Identify# System# Resource# Recovery#Priorities# 7.# Identification# of# Alternate#Storage#and#Processing#Facilities.3.

!Committee!/!Board!/!Chapter! 9!CEUs! of!membership! /!Association!details! 2.!Description!of!content! 42!CEUs! teaching.!The!IFS/GFSU!Continuous!Education!Program! The! IFSBGFSU! Continuous! Education! Program! (CEP)! is! designed! to! keep! your! expertise! and! skills!updated.!Duration!in!this!job!(start!and! end!dates)! 4.!training!or! covered! instructing! 2.!Copy!of!presentation! ! 1!CEU!for!each!hour! 1.!Description!of!the!activity! 3.! ! ! #' Activity'' ' ' CEUs'earned' ' 1! Teaching.!The!type!of!activity!attended! 42!CEUs! spent!in!a!relevant! (event.! White!Paper!or! Book! ! Active!membership! of!a!GFSU!approved! relevant!Committee! /!Board!/!Chapter!/! Association! 6! Documentary' Evidence' to' be' Maximum' submitted' CEUs' in' a' 3' year'period' 3!CEUs!per!hour!of!actual! 1.! Seminar.!Delivery!date(s)! 3.!Signature!of!the!candidates! supervisor! 4!CEUs!per!article!or! Description!of!the!content! 42!CEUs! white!paper.!Timeframe!of!active! membership! ! 22! ! .! ! You!are!required!to!submit!documentary!evidence!every!3!years!of!CEUs!earned!by!you.!training! or!instructing!in!a! relevant!field! 2! Delivering!an! Industry! Presentation!in!a! relevant!field! 3! Participation!in!a! GFSU!approved! Industry!Event.!Delivery!date(s)! 3.!Current!job!title! 2.!seminar.!Enclose! administrative!fee!of!Rs!2.!Brief!description!of!work! profile! 3.000!plus!taxes!along!with!the!documentary!evidence!of!CEUs.!Number!of!attendees! ! 3!CEUs!per!hour!of!actual! 1.!Number!of!attendees! 4.!You!are!required!to!obtain!120!CEUs!(Continuing!Education!Units)!every!3!years! to!maintain!your!GFSU!certification.25!CEU!for!each!month! 1.!Date!of!Activity! 4.C.!Proof!of!membership! 3.!Workshop! or!Conference! 4! Work!Experience! 5! Publishing!of!a! relevant! professional!Article.!Proof!of!completion!provided! by!activity!host!(where! applicable)! ! 1!CEU!for!each!month!in!a! Following!details!on!employer! 36!CEUs! relevant!profile! letterhead:! 1.!Description!of!content! 42!CEUs! presentation! covered! 2.! covered! ! ! 20!CEUs!per!published! Link!to!or!copy!of!the!published! book! work! ! 0.!Confirmation!by!employer! that!the!candidate!is!meeting! the!expectations! 5.!workshop!or! session! conference)! 2.

! under! the! flagship! of! the! Home! Department!B!Government!of!Gujarat.!About!GFSU! ! ! ! ! ' This!certification!is!provided!by!Institute!of! Forensic! Science.! LL.! ! The! University! is! headed! by! its! Director! General! Dr.! Gujarat! Forensic! Sciences! University.! Audio! Video! Tape! Authentication! System.! Computerized!Photographic!Image!Analysis! System.000!Square!Meters.B.D.! ! GFSU! is! established! by! the! Government! of! Gujarat..)! is! the! Director! for! the! Institute! of! Forensic! Science.! Speech! Lab.! Mohinder! Singh! Dahiya! (M.!passed!by! the! Gujarat! State! Legislative! Assembly.! Accredited! CowB meat! testing! mobile! laboratories.!! ! The! GFSU! is! a! highly! specialized! higher! education! institution! that! came! into! existence!through!an!Act:!No.! Ph.! ! The!university!has!been!granted!recognition! by! the! University! Grants! Commission! wide! its! letter! no.! ISOBIEC! 17025:2005! certified! laboratory.! 23! ! ..! Dave! is! the! first! Registrar! of! the! Gujarat! Forensic! Sciences! University.! dated!the!30th!of!September!2008..).! Vyas! (M.! Integrated! Ballistics! Identification! System.! F.! Video! Spectral! Comparator! for! Document! Examination.! ! It! also! has! Suspect! Detection! System! (SDS).! Ph.! maintaining! international! standards! in! terms! of! infrastructure! and! facilities! for! Computer! Forensics.! Voice! Spectrograph.! on! a! government! allocated!land!of!50.! M.!! ! DFS! B! Gujarat! State! is! a! stateBofBtheBart.Sc.! NarcoBanalysis! and! Polygraph! Examination.! Gujarat! Forensic! Sciences! University!(GFSU).! Computerized! Petroleum! Testing! Facilities.! J.! Shri! Mehul! K.! to! provide! handsBon! training.! Ballistics! Data! Acquisition! System! (Computerized!firing!range)!and!Automated! Fingerprint!Identification!System.'' ! The!GFSU!has!an!ultramodern!campus.!17.Sc.D.' dedicated' to' Forensic' &' Investigative'Science.!near! the! DFS! premises.! ! ! ! Fully!Automated!Alcohol!Estimation!System! (GCBHS)!FTBRaman.! Dr.! Accredited! Mobile! Investigation! Vans.!FTBIR!for! Narcotic/Explosive/Poisons! Analysis.!! ! The! University! runs! in! parallel! association! with! the! Directorate! of! Forensic! Science! (DFS)! B! Gujarat! State.! Brain! Electrical! Oscillation! Signature!Profiling.!LCBMS.! NABL! accredited.! ! GFSU' is' the' only' university' across' the' world.D.!GCBMS.9B7/2011! (CPPBI/PU)! dated! 16th!May!2011.

GENDER' Female######################Male# ! ! ' ' ' ' ' C.E.# ! DO'NOT'STAPLE' First# ! Middle## ! Last# ! B.! My! personal!information!is!as!under:! ' ' ' ' ' ' ' Please#paste#your#recent# A.#course.) ##############! E.! Institute!of!Forensic!Science. NAME''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' passport#size#colour# photograph#in#this#box.#year#etc. DATE'OF'BIRTH' ' ' Day'''''''Month''''''''Year'''' ' ########################################################## ! ! ! ! ! ! ! ! ##### D.! Gandhinagar! ! I! am! desirous! of! appearing! for! IFSBGFSU! (Institute! of! Forensic! Science.!Application!Form!for!Permanent! Registration!Number!for!IFS/GFSU! Certification!Programs! ! To.''''OCCUPATION' ## (In#case#you#are#a#student.! Director. ADDRESS'FOR'COMMUNICATION' Apartment#/#House#Number#&#the#Name#of#the#Building# # # ! #######Street#/#Road#/#Boulevard# ! #######Town#/#City# ####### #######State## # #######Country# # # # # # # # #PIN#Code#/#ZIP# ! ! ! ! ! ! #### ######Email#Address## ######Cell#/#Mobile#number!! ! # ! ! ! !Phone#number#(with#ISD#/#STD#code)! ' ' 24! ! .! Gujarat!Forensic!Sciences!University.#mention#details#such#as########################### College.! Gujarat! Forensic! Sciences! University)! certifications! and! therefore! request! for! allotment! of! Permanent! Registration! Number.

!Gujarat! ' G.#membership#or#registration#revoked?# If#yes.'Gujarat'Forensic'Sciences'University”!Payable!at!Gandhinagar.#provide#details.'''ADDITIONAL'INFORMATION' ! Have#you#ever#been#convicted#of#a#cognizable#offence#or#a#Court#Martial#in#military#service?# If#yes.000'(nonBrefundable)! Bank!Name!_____________________________________________________________!Branch!_____________________________________! Favouring:!"The'Registrar.'''ADDITIONAL'QUALIFICATIONS'(IF'ANY)' ' ' ' ' ' ' ' H.! All! the! information! provided! is! true! to! the! best! of! my! knowledge! and! belief.! Please! acknowledge!receipt!of!the!same!and!confirm!my!registration.# ! ! ! ! ! ! The! Application! Form.'''DOCUMENTS'' Please'enclose'self$signed'photocopies'of'the'following'documents:' ' 1.! ! ! ! (Applicant’s!Signature)!! ! ! ! ! ! Date!! ! 25! ! .F.! is! submitted! along! with! the! relevant! fee! and! supporting! documents.'FEE'DETAILS' ! Bank!Draft!number!_____________________________!Dated__________________________!for!Rs.! duly! completed.#provide#details.# ! ! ! ! ! ! Have#you#ever#had#a#professional#license.'1.! ! Regards.'Proof'of'educational'qualification'(any'one)' # Mark#sheet# ##### Degree# # Other#(pl#specify)# # College#ID#card# # # ' ! I.#certification.'Proof'of'identity:'(any'one)' # Driving#license# ##### Passport# # PAN#Card# ! 2.

!Sector!18BA! Near!Police!Bhavan.! ! I! undertake! not! to! release! confidential! examination! materials! or! participate! in! fraudulent! testB taking!practices.! 11.!misleading!or!false!may!result!in!the!refusal!of!IFSBGFSU!to!issue!a!credential! to!me.! ! ! ! (Signature)!! ! ! ! ! ! Date!! ! Submit'the'filled$in'application'form.! Gujarat!Forensic!Sciences!University.! without! delay.! I! shall! comply! with! the! relevant! provisions! of! the! certification! scheme.!and!to!return!any!certificates!issued! by!IFSBGFSU. IFSBGFSU!may.! ! ! ! 8. I! understand! that! my! nonBcooperation! in! such! investigation! or! my! providing! any! information! that!is!fraudulent.!! 2.!Gujarat.!MS!Dahiya.! I! agree! to! cooperate! in! any! such! investigation! by! IFSBGFSU! regarding! the! information!I!have!provided.! 6.! DFS!Head!Quarters.! ! 9.! I! shall! refrain! from! further! promotion! of! the! certification!while!it!is!suspended.!GandhinagarB382007! Gujarat!B!India! ! Phone:!(079)!65735503! 26! ! .! etc.! ! 10.!It!may!also!lead!to!my!being!barred!from!ever!holding!a!IFSBGFSU!credential. I!shall!not!use!the!certificate!in!a!misleading!manner.! conducted!by!IFSBGFSU!is!subject!to!the!courts!of!Gandhinagar.! of! matters! that! can! affect! my! capability! to! fulfil! the! certification! requirements.! ! Regards.! 7.! ! I!have!read!and!understood!the!statements!above!and!agree!to!be!legally!bound!by!them. I!shall!not!use!the!certification!in!such!a!manner!as!to!bring!IFSBGFSU!into!disrepute.!make!inquiry!of!persons!or!documents!directly!or!indirectly! referenced! in! this! application! to! verify! the! accuracy! and! completeness! of! the! information! provided! by! me.!! 3.! which! IFSBGFSU! considers! misleading! or! unauthorized.! ! ! 4. I!shall!make!claims!regarding!certification!only!with!respect!to!the!scope!for!which!certification! has!been!granted. I! undertake! to! inform! IFSBGFSU.!India.!In!the!event!of!withdrawal!of!my!certification. In! the! event! of! suspension! of! my! certification.! certification.!Institute!of!Forensic!Science.UNDERTAKING' ! 1.!I!shall!refrain! from!use!of!all!references!to!a!certified!status.!and!shall!not! to! make! any! statement! regarding! the! certification.'bank'draft'and'documents'to:' ! Dr. I!agree!to!comply!with!the!certification!requirements!and!to!supply!any!information!needed!for! the!assessment.!at!its!sole!discretion. I! understand! that! any! action! arising! out! of! any! application.! Director. ! 5. ! I!shall!discontinue!the!use!of!all!claims!to!certification!that!contain!any!reference!to!IFSBGFSU!or! certification!upon!suspension!or!withdrawal!of!certification.! examination.