Nations across the globe are taking significant strides towards building a digital present and future. However, the vision of a digitally progressive nation is incomplete without sound cyber security measures. Therefore, Law Enforcement Agencies, Government Institutions, Cyber Intelligence Organizations and Corporates need to appropriately position themselves to mitigate and combat all instances and attempts of cyber espionage, cyberattacks, and cyberwarfare.
[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” bottom_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”padding-4-percent” column_padding_position=”all” background_color=”#06102c” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Annual cyber crime damage costs are expected to reach $6 trillion by 2021.” font_container=”tag:h2|font_size:36|text_align:center|color:%23ffffff” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” full_height=”yes” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”]
Nations across the globe are taking significant strides towards building a digital present and future. However, the vision of a digitally progressive nation is incomplete without sound cyber security measures. Therefore, Law Enforcement Agencies, Government Institutions, Cyber Intelligence Organizations and Corporates need to appropriately position themselves to mitigate and combat all instances and attempts of cyber espionage, cyberattacks, and cyberwarfare.
[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][/vc_column][vc_column column_padding=”padding-4-percent” column_padding_position=”all” background_color=”#06102c” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”By 2021, cyber crime will more than triple the number of unfilled cybersecurity jobs.” font_container=”tag:h2|font_size:36|text_align:center|color:%23ffffff” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#1e83ec” scene_position=”center” text_color=”light” text_align=”center” top_padding=”4%” bottom_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Our Vision” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][vc_column_text]The Center for Advanced Research in Digital Forensics and Cyber Security has been founded with the vision of conducting cutting-edge research and development in the fields of Cyber Security and Digital Forensics.
[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” bg_image=”6587″ bg_position=”center top” bg_repeat=”no-repeat” full_height=”yes” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”]ARDC is supported by a team of forensic experts from various spheres and a Scientific Advisory Board comprising erudite research scholars, industry experts, and retired mavens who have experience and expertise in specialized forensic domains. This shall enable us to guide Law Enforcement Agencies and other organizations on the latest tools and technologies to identify cyber threats and mitigate them effectively. Through this center, we envision to be a part of a continuous self-evolution so as to transform ourselves into a facility that pushes the frontiers of forensics in reaching out to the demands of digital forensics and cyber security across the globe.
[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” bg_color=”#06102c” scene_position=”center” text_color=”light” text_align=”center” top_padding=”4%” bottom_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Established under the aegis of Anna University, and a division of GA Software Technologies (Georgia Technologies). We aim to educate Law Enforcement Agencies and other key institutions on the current vulnerabilities in the cybercrime landscape and the methods to mitigate them using the latest technologies and methods.” font_container=”tag:h2|font_size:25|text_align:center|color:%23ffffff” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” bottom_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/6″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”4/6″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”The Power of the Latest Tools & Technologies” font_container=”tag:h2|font_size:40|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][vc_column_text]The Center is equipped with cutting-edge digital forensic tools and state-of-the-art workstations that are leveraged for conducting research and development and also for disseminating training to Law Enforcement Agencies. Our repertoire of tools includes hardware and software for data extraction, Social Media Analysis, Video Analytics, as well as specialized forensic toolkits that assist in the intensive analysis of storage media and data recovery. We also have an extensive in-house library of the leading books, journals and magazines pertaining to Digital Forensics and Cyber Security.
[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/6″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_gallery type=”flickity_style” images=”6969,6968,6967″ flickity_controls=”pagination” flickity_desktop_columns=”1″ flickity_small_desktop_columns=”1″ flickity_tablet_columns=”1″ flickity_box_shadow=”none” onclick=”link_no”][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”padding-4-percent” column_padding_position=”top-bottom” background_color=”#1e83ec” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#ffffff” column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]A Dynamic Research Center recognized by Anna University, Chennai
that aims to push the frontiers of Digital Forensics and Cyber Security.
[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”bottom” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”6%” bottom_padding=”6%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”padding-6-percent” column_padding_position=”left” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Bangalore” font_container=”tag:h3|text_align:right|line_height:1.3″ google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”]Prestige Ferozes, No-74,
Cunningham Road, Vasanthnagar,
Bangalore – 560052.
Karnataka, India.

Digital Forensics and Cyber Security” font_container=”tag:h4|font_size:20|text_align:center|color:%23000000|line_height:1.3″ google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][vc_column_text]
Home | About | Our Scope | CCPWC | Contact
[/vc_column_text][/vc_column][vc_column column_padding=”padding-6-percent” column_padding_position=”right” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Chennai” font_container=”tag:h3|text_align:left|line_height:1.3″ google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”]No.12, Murugappa Road,
Kotturpuram,
Chennai – 600 085.
Tamil Nadu, India.