The Center for
Advanced Research in
Digital Forensics and Cyber Security
In the league of creating
Cyber Secure Nation
[/vc_column_text][vc_column_text css=”.vc_custom_1537332490610{margin-top: 40px !important;}”]The Center for Advanced Research in Digital Forensics and Cyber Security has been founded with the vision of conducting cutting-edge research and development in the fields of Cyber Security and Digital Forensics. Established under the aegis of Anna University, and a division of GA Software Technologies (Georgia Technologies). We aim to educate Law Enforcement Agencies and other key institutions on the current vulnerabilities in the cybercrime landscape and the methods to mitigate them using the latest technologies and methods.[/vc_column_text][/vc_column_inner][vc_column_inner background_image=”6287″ enable_bg_scale=”true” column_padding=”padding-5-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”]Need for a Dedicated Research Center
[/vc_column_text][vc_column_text css=”.vc_custom_1528962105141{margin-top: 40px !important;}”]With the growth of the cyber and cellular consumer base, the importance of digital forensics is at its peak. Digital Forensics deals with the recovery, preservation and forensic analysis of digital evidence extracted in its original form from computers, storage devices, mobile phones, PDA (Personalized Digital Assistant), printers, copy machines, cameras, video game consoles and other such devices.[/vc_column_text][nectar_btn size=”small” button_style=”see-through-3d” color_override=”#d70016″ text=”Know more” margin_top=”30px” url=”http://www.ardcindia.org/about”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” full_height=”yes” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”10%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-left”][vc_custom_heading text=”Capturing niche insights andemerging trends in Digital Forensics” font_container=”tag:h3|font_size:60|text_align:left|line_height:1.5″ google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][/vc_column_inner][/vc_row_inner][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”]

Mobile Forensics
Data Acquisition and Authentication, Database Analysis, Audio/Video Extraction, Physical/Logical Acquisition, Recovering Damaged, Deleted, or Lost Data[/fancy_box][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][fancy_box box_style=”color_box_hover” icon_family=”iconsmind” color=”Accent-Color” box_alignment=”left” icon_iconsmind=”iconsmind-Computer-Secure” icon_size=”70″]
Computer Forensics
Recovery of damaged, deleted, or lost images/videos and data files, Password Cracking, Live Analysis, Cross-drive Analysis, Registry Analysis, Social Media Analysis[/fancy_box][/vc_column_inner][/vc_row_inner][vc_row_inner equal_height=”yes” content_placement=”top” column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][fancy_box box_style=”color_box_hover” icon_family=”iconsmind” color=”Accent-Color” box_alignment=”left” icon_iconsmind=”iconsmind-Security-Settings” icon_size=”70″]
Network Forensics
Monitoring and Analysis of LAN/WAN/Internet traffic, Analysis of Logs from various sources, IP Tracing, and Email Forensics
[/fancy_box][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][fancy_box box_style=”color_box_hover” icon_family=”iconsmind” color=”Accent-Color” box_alignment=”left” icon_iconsmind=”iconsmind-Optimization” icon_size=”70″]Data Analytics
Leverage data analytics for better visualization of key issues and related solutions that shall aid in better decision-making and easy analysis of data.[/fancy_box][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#06102c” scene_position=”center” text_color=”dark” text_align=”center” top_padding=”2%” bottom_padding=”6%” overlay_strength=”0.3″ enable_shape_divider=”true” shape_divider_position=”bottom” shape_divider_height=”100″ bg_image_animation=”none” shape_type=”triangle”][vc_column centered_text=”true” column_padding=”padding-4-percent” column_padding_position=”top-bottom” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#ffffff” column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]
Worldwide spending on cybersecurity services & products is predicted to surpass
$1 trillion from 2017 to 2021.
[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” full_height=”yes” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”]
Cyber Crime
Prevention Against
Women And Children
(CCPWC)
[/fancy_box][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”padding-4-percent” column_padding_position=”top-bottom” background_color=”#1e83ec” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]
A Dynamic Research Center recognized by Anna University, Chennai
that aims to push the frontiers of Digital Forensics and Cyber Security.
[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”bottom” scene_position=”center” text_color=”custom” custom_text_color=”#000000″ text_align=”left” top_padding=”6%” bottom_padding=”6%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”padding-6-percent” column_padding_position=”left” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”right” phone_text_alignment=”left” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Bangalore” font_container=”tag:h3|text_align:right|line_height:1.3″ google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”]Prestige Ferozes, No-74,
Cunningham Road, Vasanthnagar,
Bangalore – 560052.
Karnataka, India.
Digital Forensics and Cyber Security” font_container=”tag:h4|font_size:20|text_align:center|line_height:1.3″ google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”][vc_column_text]
Home | About | Our Scope | CCPWC | Contact
[/vc_column_text][/vc_column][vc_column column_padding=”padding-6-percent” column_padding_position=”right” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Chennai” font_container=”tag:h3|text_align:left|line_height:1.3″ google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal”]No.12, Murugappa Road,
Kotturpuram,
Chennai 600 085.
Tamil Nadu, India.