SlideShare a Scribd company logo
Certificate of Continuing Education Completion
This certificate is awarded to
Abhisek kumar
for successfully completing the 7 CEU/CPE and 7.5 hour
training course provided by Cybrary in
Incident Response and Advanced Forensics
10/06/2017
Date of Completion
C-ae30139584-efc0bb
Certificate Number Ralph P. Sita, CEO
Official Cybrary Certificate - C-ae30139584-efc0bb

More Related Content

What's hot

ITIL
ITILITIL
cybrary-cert-1
cybrary-cert-1cybrary-cert-1
cybrary-cert-1
Gediminas Taluntis
 
Project management professional
Project management professionalProject management professional
Project management professional
Prasad Shevate
 
Computer and hacking forensics
Computer and hacking forensicsComputer and hacking forensics
Computer and hacking forensics
Prasad Shevate
 
cybrary-CISM
cybrary-CISMcybrary-CISM
cybrary-CISM
Eric Igbinosun
 
Cybrary advanced pen testing
Cybrary advanced pen testingCybrary advanced pen testing
Cybrary advanced pen testing
Lawrence H. (Larry) King
 
Cybrary hipaa
Cybrary hipaaCybrary hipaa
Incident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics CertificateIncident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics Certificate
VICTOR MAESTRE RAMIREZ
 
cybrary-cert_COBIT
cybrary-cert_COBITcybrary-cert_COBIT
cybrary-cert_COBIT
Swaroop Deshmukh
 
CISA Certification - Cybrary Cert.
CISA Certification - Cybrary Cert.CISA Certification - Cybrary Cert.
CISA Certification - Cybrary Cert.
VICTOR MAESTRE RAMIREZ
 
Advanced Penetration Testing
Advanced Penetration TestingAdvanced Penetration Testing
Advanced Penetration Testing
VICTOR MAESTRE RAMIREZ
 
Cybrary cert
Cybrary certCybrary cert
Cybrary cert
Md. Anwar Hossain
 
Master networking for penetration testing
Master networking for penetration testingMaster networking for penetration testing
Master networking for penetration testing
Prasad Shevate
 
Penetration testing and ethical hacking
Penetration testing and ethical hackingPenetration testing and ethical hacking
Penetration testing and ethical hacking
Prasad Shevate
 
Cybrary cert
Cybrary certCybrary cert
Cybrary cert
Blaise Banywesize
 
Connecting with the Customer (WBT)
Connecting with the Customer (WBT)Connecting with the Customer (WBT)
Connecting with the Customer (WBT)
Badr Al Akhras
 
Access control and identity management
Access control and identity managementAccess control and identity management
Access control and identity management
Prasad Shevate
 
Cybrary cert
Cybrary cert Cybrary cert
Cybrary cert
Md. Anwar Hossain
 
Penetration Testing and Ethical Hacking Certificate
Penetration Testing and Ethical Hacking CertificatePenetration Testing and Ethical Hacking Certificate
Penetration Testing and Ethical Hacking Certificate
Adam Wingler
 
ethical_hacking
ethical_hackingethical_hacking
ethical_hacking
Chin Chamroeunrith chin
 

What's hot (20)

ITIL
ITILITIL
ITIL
 
cybrary-cert-1
cybrary-cert-1cybrary-cert-1
cybrary-cert-1
 
Project management professional
Project management professionalProject management professional
Project management professional
 
Computer and hacking forensics
Computer and hacking forensicsComputer and hacking forensics
Computer and hacking forensics
 
cybrary-CISM
cybrary-CISMcybrary-CISM
cybrary-CISM
 
Cybrary advanced pen testing
Cybrary advanced pen testingCybrary advanced pen testing
Cybrary advanced pen testing
 
Cybrary hipaa
Cybrary hipaaCybrary hipaa
Cybrary hipaa
 
Incident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics CertificateIncident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics Certificate
 
cybrary-cert_COBIT
cybrary-cert_COBITcybrary-cert_COBIT
cybrary-cert_COBIT
 
CISA Certification - Cybrary Cert.
CISA Certification - Cybrary Cert.CISA Certification - Cybrary Cert.
CISA Certification - Cybrary Cert.
 
Advanced Penetration Testing
Advanced Penetration TestingAdvanced Penetration Testing
Advanced Penetration Testing
 
Cybrary cert
Cybrary certCybrary cert
Cybrary cert
 
Master networking for penetration testing
Master networking for penetration testingMaster networking for penetration testing
Master networking for penetration testing
 
Penetration testing and ethical hacking
Penetration testing and ethical hackingPenetration testing and ethical hacking
Penetration testing and ethical hacking
 
Cybrary cert
Cybrary certCybrary cert
Cybrary cert
 
Connecting with the Customer (WBT)
Connecting with the Customer (WBT)Connecting with the Customer (WBT)
Connecting with the Customer (WBT)
 
Access control and identity management
Access control and identity managementAccess control and identity management
Access control and identity management
 
Cybrary cert
Cybrary cert Cybrary cert
Cybrary cert
 
Penetration Testing and Ethical Hacking Certificate
Penetration Testing and Ethical Hacking CertificatePenetration Testing and Ethical Hacking Certificate
Penetration Testing and Ethical Hacking Certificate
 
ethical_hacking
ethical_hackingethical_hacking
ethical_hacking
 

Recently uploaded

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 

Recently uploaded (20)

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 

Cyber Certificate

  • 1. Certificate of Continuing Education Completion This certificate is awarded to Abhisek kumar for successfully completing the 7 CEU/CPE and 7.5 hour training course provided by Cybrary in Incident Response and Advanced Forensics 10/06/2017 Date of Completion C-ae30139584-efc0bb Certificate Number Ralph P. Sita, CEO Official Cybrary Certificate - C-ae30139584-efc0bb