20.01.2015 Views

Hacking Forensics

Hacking Forensics

Hacking Forensics

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

XtremeSecurity<br />

Questions<br />

<br />

<br />

Further trainings<br />

• Certified Ethical Hacker – March 2007<br />

• Computer <strong>Hacking</strong> <strong>Forensics</strong> Investigator – TBA<br />

• eBusiness (ERP/CRM/SCM/KM/CM) - TBA<br />

Services<br />

• Ethical <strong>Hacking</strong> & Penetration Testing<br />

• Enterprise Security Review<br />

• Computer <strong>Forensics</strong> Investigation<br />

<br />

Please direct your enquiries and questions<br />

to:<br />

• Services, Training and Exams<br />

– Feedback@xtremesecurity.com.hk<br />

• My Personal Email <br />

– Kraj@xtremesecurity.com.hk<br />

Copyright © 2005-2007, Krishna Rajagopal.<br />

Copyright © 2005-2007, Krishna Rajagopal.<br />

Thank You<br />

No Man is an Island.<br />

Get Connected!<br />

<br />

Thank you for your time.<br />

Copyright © 2005-2007, Krishna Rajagopal.<br />

It is Break Time! Let’s have some Coffee<br />

Copyright © 2005-2007, Krishna Rajagopal.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!