Certificate Course in Cyber Forensics & Cyber Laws (CCCFCL)

Overview

The Certificate Course in Cyber Forensics & Cyber Laws (CCCFCL) aims to prepare students to work on current technology scenarios as well as prepare them to keep pace with the changing face of technology and the requirements of the growing IT industry. Candidates should have basic knowledge of computer and networking fundamentals with logical approach and knowledge of Cyber Crimes. After the completion of the course, students can work as Cyber Forensics Investigators.

Detailed overview and learning objectives

By the end of the semester (320 learning hours) students will have developed an understanding, and competency in the following modules.

Sl. No.ModulesHours
1Fundamentals of Computer and Cyber Forensics50
2Cyber Forensics (Evidence Recovery & Investigation)130
3Cyber Crimes and Cyber Laws40
4Management Development Program60
5Project40
 Total320

Detailed Syllabus:

Module 1 Fundamentals of Networks and Cyber Forensics

  • Basic Computer Terminology
  • Internet
  • Networking
  • Computer Storage
  • Cell Phone / Mobile Forensics
  • Computer Ethics and Application Programs
  • Cyber Forensic Basics- Introduction to Cyber Forensics
  • Storage Fundamentals
  • File System Concepts
  • Data Recovery
  • Operating System Software and Basic Terminology
  • Introduction to Cyber Security
  • Implementing Hardware Based Security
  • Software Based Firewalls
  • Security Standards
  • Assessing Threat Levels
  • Operating System Attacks
  • Application Attacks
  • Reverse Engineering & Cracking Techniques and Financial Frauds

Module 2 Cyber Forensics (Evidence Recovery & Investigation)

  • Introduction to Deleted File Recovery
  • Formatted Partition Recovery
  • Data Recovery Tools
  • Data Recovery Procedures and Ethics
  • Preserve and safely handle original media
  • Document a “Chain of Custody”
  • Complete time line analysis of computer files based on file creation
  • File modification and file access
  • Recover Internet Usage Data
  • Recover Swap Files/Temporary Files/Cache Files
  • Introduction to Encase Forensic Edition
  • Forensic Tool Kit (FTK)
  • Use computer forensics software tools to cross validate findings in computer evidence
  • Introduction to Cyber Forensic Investigation
  • Investigation Tools
  • Digital Evidence Collection
  • Evidence Preservation
  • E-Mail Investigation
  • E-Mail Tracking
  • IP Tracking
  • E-Mail Recovery
  • Encryption and Decryption methods
  • Search and Seizure of Computers
  • Recovering deleted evidences
  • Password Cracking

Module 3 Cyber Crimes and Cyber Laws

  • Introduction to IT laws & Cyber Crimes
  • Internet ,Hacking
  • Cracking
  • Viruses
  • Virus Attacks
  • Pornography
  • Software Piracy
  • Intellectual property
  • Legal System of Information Technology
  • Social Engineering
  • Understanding Copy Right in Information Technology
  • Understanding the technology of Software software-copyright vs Patent debate Authorship 
  • Assignment issues Commissioned work
  • Work for hire Idea/Expression dichotomy
  • Copy right in internet
  • Legal Issues in internet and Software Copyright Jurisdiction Issues
  • Copyright Infringe Remedies of Infringement Multimedia
  • Copyright issues Software Piracy
  • Patents understanding
  • Cyber Crimes
  • Understanding Cyber Crimes in context of Internet
  • Indian Penal Law & Cyber Crimes Fraud Hacking Mischief
  • International law
  • Obscenity and Pornography Internet
  • Potential of Obscenity Indian Law On Obscenity & Pornography Technical
  • Legal solutions International efforts Changes in Indian Laws
  • E-Commerce & Taxation
  • E-Commerce-Salient Features On-Line contracts Mail Box rule Privities of
  • Contracts Jurisdiction issues in E-Commerce Electronic Data Interchange.
  • Security and Evidence in E-Commerce Dual Key encryption Digital signatures security issues
  • UNCITRAL model law of E-Commerce
  • Indian Legal Position on E-Commerce IT Act 2000/Indian Evidence Act/Draft law on E-Commerce

Module 4 Management Development Program

  • Introduction to communication
  • Barriers to communication
  • Kind of communication
  • Confidence building
  • Non-verbal Communication
  • Writing: Covering letter and CV
  • Email, Presentation Skill
  • Interview skills

Scholarships available for 2021!

Six month Scholarships in Advanced Computing, mobile computing, IT Infrastructure, Systems and Security. Admission Notification for 15th Feb 2021 #PG Diploma courses#C-DAC#IT Training.
The last date of registration is 15/02/2021
To find out more about your eligibility for this scholarship please make an appointment with our friendly Faculty advisors

Mr. Jaibheem Gaikwad | Centre Head
Email: jaibheem@cdac.in Tel: (682) 80729

Scholarships in Advanced Computing, IT Infrastructure, Systems and Security now available for 2021!

A Second intake of scholarships will be available from now until the 15th February 2021 for admissions in February 2021.  Those interested in applying should drop off their CV at USP Cook Islands or contact us on 29427 or email ci-ceit@usp.ac.fj for a detailed information sheet.

Students will study alongside colleagues from Nauru and Fiji. All fees will be provided as part of the scholarship. Due to COVID travel restrictions, this Post Graduate Diploma will be delivered fully online via the CEIT Faculty at USP Cook Islands Campus

1 scholarship for study in the Post Graduate Diploma in IT Infrastructure, Systems and Security (PG-DITISS)

Pre-requisites – a first degree or equivalent in IT or computing or equivalent, and sound knowledge of the fundamentals of networks, operating system concepts and the basics of Linux command.

The focus of this course is on network security, techniques of detecting attacks, securing a network from internal and external attack and the principles and practices of cryptographic techniques.

1 scholarship for study in the Post Graduate Diploma in Advanced Computing (PG-DAC)

Pre-requisites – a first degree in computing or IT or equivalent and sound knowledge of fundamentals of programming, concepts of Linux and C programming

The focus of this course is on emerging trends in advanced computing, the changing face of technology and future requirements of the growing IT industry.

A condition of the scholarship is that successful graduates of the Post Graduates Diploma courses will, on return, be required to work for the Cook Islands Centre for Excellence in Information Technology (CEIT) at USP Cook Islands for 2 years.

Continue reading “Scholarships available for 2021!”