PROFORMA FOR ITEC/SCAAP COURSES

Similar documents
Certified Cyber Security Analyst VS-1160

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

Evidence Technician s School

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Summary of Qualifications: Education: Professional Experience: Kenneth R. Moses

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Introduction to Cyber Security / Information Security

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Ethical Hacking & Cyber Security Workshop

Guidelines concerning Fingerprint Transmission

EC-Council. Certified Ethical Hacker. Program Brochure

Cyber Security, Cyber Crimes and Cyber Laws

FORENSIC SCIENTIST MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

FORBIDDEN - Ethical Hacking Workshop Duration

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Certified Cyber Security Expert V Web Application Development

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

COMMUNITY SERVICES OFFICER

Detailed Description about course module wise:

Course Title: Course Description: Course Key Objective: Fee & Duration:

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

CRYPTUS DIPLOMA IN IT SECURITY

INVESTIGATING AND PROSECUTING MONEY LAUNDERING

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia

Overview TECHIS Carry out security testing activities

Computer/IT Project LIST. Contact:

Short courses presented by the NWU Programme in Forensic Accountancy

Forensic Specialist Supervisor Crime Scene #00781 (1 of 2) City of Virginia Beach Job Description Date of Last Revision:

Ed Ferrara, MSIA, CISSP Fox School of Business

Specialized Programme on Internetworking Design and LAN WAN Administration

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Loophole+ with Ethical Hacking and Penetration Testing

Lodi Road, New Delhi Dated: OFFICE MEMORANDUM

Certified Cyber Security Analyst VS-1160

100 HOURS INFORMATION TECHNOLOGY TRAINING

Web application testing

Workshop Designed & Powered by TCIL IT, Chandigarh

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Short courses presented by the NWU Programme in Forensic Accountancy

EC-Council Ethical Hacking and Countermeasures

Executive Summary On IronWASP

MORPHO CRIMINAL JUSTICE SUITE

Crime Scene investigation

EAGLE EYE Wi-Fi. 1. Introduction

Integrated Threat & Security Management.

Information Security Policy

How To Protect A Web Application From Attack From A Trusted Environment

(BDT) BDT/POL/CYB/Circular

SWGFAST. Defining Level Three Detail

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Prerequisite: Test placement in ENG101 or successful completion of ENG98 if required.

Identity Theft. What it is and How to Protect Yourself

The College of Forensic Sciences at NAUSS: The pioneer of Forensics in the Arab world

Pensacola Police Department

SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD

Cisco Network Specialist CCNA

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

WILLIAM OETTINGER PHONE (702)

No. F /2014/NGMA National Gallery of Modern Art Government of India Ministry of Culture

IT and Cyber Security Training Courses

Bellevue University Cybersecurity Programs & Courses

CITY OF CARLSBAD CLASS SPECIFICATION COMMUNITY SERVICE OFFICER I /II

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

URBAN SECURITY & POLICING

Mobile Driver s License Solution

A H S A N M U H A M M A D J A W A I D

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

An enterprise grade information security & forensic technical team

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Changes in Schengen visa application process

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Admission Notice For M.A under Faculty of Arts

Specialized Programme on Web Application Development using Open Source Tools

IT Security Risks & Trends

A brief on Two-Factor Authentication

CYBERTRON NETWORK SOLUTIONS

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

FORENSIC SCIENTIST MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION

Nottingham Trent University Course Specification

DELHI ELECTRICITY REGULATORY COMMISSION VINIYAMAK BHAWAN, C-BLOCK, SHIVALIK, MALVIYA NAGAR, NEW DELHI

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Transcription:

PROFORMA FOR ITEC/SCAAP COURSES 2015-16 Name of the Institute: National Crime Records Bureau Full Address (with PIN CODE): East Block-7, Sector-1, R K Puram New Delhi - 110066 Telephone Numbers: +9111 26101767 Fax Numbers: +911126180347 Email: ncrbtrg@gmail.com ; training@ncrb.nic.in Website: http://ncrb.gov.in Head of the Institute: Name : Smt. Archana Ramasundaram, IPS Designation : Director General, NCRB Tel. No. : +911126104648 Fax: No. : +911126186576 Email : director@ncrb.nic.in ITEC Course Coordinator: Name : Dr. Pawan Bhardwaj Designation : Joint Assistant Director (Trg) Tel. No. : +911126101767 Fax: No. : +911126180347 Email : training@ncrb.nic.in Mobile No. : +918800897906 24 hrs Emergency / After Office / Holidays Contact Details: Name & Designation: Dr. Pawan Bhardwaj, JAD(Trg.) Tel. No. : +911126101767 Mobile No. : +918800897906 / +919313498559 (Mr. Unnikrishnan) Name and Details of Courses proposed along with Duration and Dates Sl. No. Name of the Course Qualification required Duration (in weeks) From Period To Maximum number of seats Minimum number of seats 1 Advanced programme in Computer Networking and Security 2 Advanced Fingerprint Science Preferably Graduates Knowledge of Computer operation Preferably Graduates Working knowledge of Fingerprint Analysis 6 29/06/2015 07/08/2015 30 20 6 29/06/2015 07/08/2015 30 20

3 I T in Law Enforcement Preferably Graduates Knowledge of Computer operation 6 05/10/2015 13/11/2015 30 20 4 Advanced Fingerprint Science Preferably Graduates Working knowledge of Fingerprint Analysis 6 05/10/2015 13/11/2015 30 20 5 Advanced Course on I.T. in Law Enforcement 1.Preferably Graduates 2.Knowledge of Computer Programming 12 04/01/2016 25/03/2016 30 20 6 Advanced Fingerprint Science & I.T. Preferably Graduates Working knowledge of Fingerprint Analysis 12 04/01/2016 25/03/2016 30 20 INDIVIDUAL COURSE DETAILS A. Name of the Institute NATIONAL CRIME RECORDS BUREAU B. Name/Title of the Course Advanced Programme in Computer Networking and Security C. Course Dates with Duration in Weeks [note: dates may be fixed keeping in mind festivals, holidays, weather conditions, availability of accommodations, etc. No request for change in dates, once approved/ circulated will be entertained] From 29-06-2015 to 07-08-2015 In weeks: 6 Weeks

D. Eligibility Criteria for Participants 1. Educational Qualifications 2. Work Experience required, if any 3. Age Limit [note: ITEC norms is 25-45 years] 4. Target Group [Level of participants and target ministries/departments etc. may be indicated] Preferably Graduate Middle level decision making Law Enforcement officers with at least 6 years of service in Information Technology field. They should be able to speak, read & write English.. up to 45 years Officers/officials from law enforcement agencies doing I.T. related jobs. E. Aims & Objectives of the Course To provide in depth knowledge in Networking Concepts, vulnerability assessment and penetration testing. To familiarize the participants with Network Security & Security Management Practices. To expose participants to the latest technologies and issues related to Cyber Security. F. Course Contents / Syllabus [please attach course details / profile in Word Format for uploading on ITEC website] Network Concept Overview e- Security Concepts Framing Security Policy/Standard Operating Procedures Exposure to Cyber Security. Steganography & Cryptography Cyber Terrorism: The challenges Cyber Crime: Various methods adopted by criminals. ATM Theft & Credit/Debit Card Fraud Open Proxies Key Stroke Loggers Police Perspective in Cyber Security Wi-Fi Security Cyber Laws Digital Signature

SQL Injection Cyber forensics, Mobile forensics etc. Project:- To design & develop a theses on network security related topics G. Mode of evaluation of performance of the participants Quiz/Written Test after each module. Evaluation of Project developed by trainees by experts in the field. INDIVIDUAL COURSE DETAILS A. Name of the Institute NATIONAL CRIME RECORDS BUREAU B. Name/Title of the Course Advanced Fingerprint Science C. Course Dates with Duration in Weeks [note: dates may be fixed keeping in mind festivals, holidays, weather conditions, availability of accommodations, etc. No request for change in dates, once approved/ circulated will be entertained] From 29-06-2015 to 07-08-2015 In weeks: 6 Weeks D. Eligibility Criteria for Participants 1. Educational Qualifications 2. Work Experience required, if any 3. Age Limit [note: ITEC norms is 25-45 years] 4. Target Group [Level of participants and target ministries/departments etc. may be indicated] Preferably Graduate Middle level decision making officers engaged in Fingerprint Identification activities with at least 5 years of service. They should be able to read, write & speak English. upto 45 years Officers/officials from law enforcement agencies having working knowledge of Fingerprint Analysis E. Aims & Objectives of the Course To acquaint the participants with the current trends & developments in the processing of fingerprints.

To familiarize the participants with modern equipments, advancement and use of computers in fingerprint science. F. Course Contents / Syllabus [please attach course details / profile in Word Format for uploading on ITEC website] Office Automation Concepts Operating System Windows 7 MS-Office 2010 Introduction, History and Principles of Finger Print Science Use of Biometrics for Individualization Finger Print Patterns & Classification Taking fingerprints of living persons and cadaver Use of Portable F P Live Scanning System Comparison of Identical Finger Prints marking of Ridge Characteristics Law of probability & Biology behind infallibility of Friction Ridge Evidence Photography of finger prints (Analog & Digital) Examination of scene of crime for friction Ridge Evidence Detection & Development of chance prints by conventional and modern forensic methods Use of Advanced equipments for Fingerprint Analysis Presenting Finger Print Evidence in the Court of Law Cross-examination of FP Experts & Daubert Ruling Important Court Rulings w.r.t. Fingerprint Evidence Study of Level-3 details in fingerprints Poroscopy & Edgeoscopy Detection of forgery of Fingerprints Automated Finger Print Identification

System (AFIS) Recent trends in Finger Print Science across the world Discussion on famous International cases involving FP Science like wrong FP report in Madrid Blast Case Project-Examination of questioned documents & science of crime G. Mode of evaluation of performance of the participants Quiz/Written Test after each module. Evaluation of Project developed by trainees by experts in the field. INDIVIDUAL COURSE DETAILS A. Name of the Institute NATIONAL CRIME RECORDS BUREAU B. Name/Title of the Course Information Technology in Law Enforcement C. Course Dates with Duration in Weeks [note: dates may be fixed keeping in mind festivals, holidays, weather conditions, availability of accommodations, etc. No request for change in dates, once approved/ circulated will be entertained] From 05-10-2015 to 13-11-2015 In weeks: 6 Weeks D. Eligibility Criteria for Participants 1. Educational Qualifications 2. Work Experience required, if any 3. Age Limit [note: ITEC norms is 25-45 years] 4. Target Group [Level of participants and target ministries/departments etc. may be indicated] Preferably Graduate Middle level decision making Law Enforcement officers with at least 6 years of service in Information Technology field. They should be able to speak, read & write English..upto 45 years Officers/officials from law enforcement agencies doing I.T. related jobs E. Aims & Objectives of the Course To provide an in-depth knowledge in

designing and development of application software for police for day-to-day police related work. To familiarize participants with the management of crime records and crime analysis using IT tools. F. Course Contents / Syllabus [please attach course details / profile in Word Format for uploading on ITEC website] Office Automation Concepts Operating System Windows 7 MS-Office 2010 Concepts of Software Engineering Database Concepts MS-Access - Application development - Data Analysis - Reporting Concepts Basic Crime analysis - Link analysis Upgrading database from MS-Access to SQL Server 2012 RDBMS- SQL Server Concepts Network Concept Overview Cyber Security overview. Project:- To design & develop Software Packages for police applications using MS- Access / SQL Server 2012 with adequate security features. G. Mode of evaluation of performance of the participants Quiz/Written Test after each module. Evaluation of Project developed by trainees by experts in the field.

INDIVIDUAL COURSE DETAILS A. Name of the Institute NATIONAL CRIME RECORDS BUREAU B. Name/Title of the Course Advanced Fingerprint Science C. Course Dates with Duration in Weeks [note: dates may be fixed keeping in mind festivals, holidays, weather conditions, availability of accommodations, etc. No request for change in dates, once approved/ circulated will be entertained] From 05-10-2015 to 13-11-2015 In weeks: 6 Weeks D. Eligibility Criteria for Participants 1. Educational Qualifications 2. Work Experience required, if any 3. Age Limit [note: ITEC norms is 25-45 years] 4. Target Group [Level of participants and target ministries/departments etc. may be indicated] Preferably Graduate Middle level decision making officers engaged in Fingerprint Identification activities with at least 5 years of service. They should be able to read, write & speak English. upto 45 years Officers/officials from law enforcement agencies having working knowledge of Fingerprint Analysis E. Aims & Objectives of the Course To acquaint the participants with the current trends & developments in the processing of fingerprints. To familiarize the participants with modern equipments, advancement and use of computers in fingerprint science. F. Course Contents / Syllabus [please attach course details / profile in Word Format for uploading on ITEC website] Office Automation Concepts Operating System Windows 7 MS-Office 2010 Introduction, History and Principles of Finger Print Science Use of Biometrics for Individualization

Finger Print Patterns & Classification Taking fingerprints of living persons and cadaver Use of Portable F P Live Scanning System Comparison of Identical Finger Prints marking of Ridge Characteristics Law of probability & Biology behind infallibility of Friction Ridge Evidence Photography of finger prints (Analog & Digital) Examination of scene of crime for friction Ridge Evidence Detection & Development of chance prints by conventional and modern forensic methods Use of Advanced equipments for Fingerprint Analysis Presenting Finger Print Evidence in the Court of Law Cross-examination of FP Experts & Daubert Ruling Important Court Rulings w.r.t. Fingerprint Evidence Study of Level-3 details in fingerprints Poroscopy & Edgeoscopy Detection of forgery of Fingerprints Automated Finger Print Identification System (AFIS) Recent trends in Finger Print Science across the world Discussion on famous International cases involving FP Science like wrong FP report in Madrid Blast Case Project-Examination of questioned documents & science of crime G. Mode of evaluation of performance of the participants Quiz/Written Test after each module. Evaluation of Project developed by trainees by experts in the field.

INDIVIDUAL COURSE DETAILS A. Name of the Institute NATIONAL CRIME RECORDS BUREAU B. Name/Title of the Course Advanced Course on Information Technology in Law Enforcement C. Course Dates with Duration in Weeks [note: dates may be fixed keeping in mind festivals, holidays, weather conditions, availability of accommodations, etc. No request for change in dates, once approved/ circulated will be entertained] D. Eligibility Criteria for Participants 1. Educational Qualifications 2. Work Experience required, if any 3. Age Limit 4. Target Group [Level of participants and target ministries/departments etc. may be indicated] From 04-01-2016 to 25-03-2016 In weeks: 12 Weeks Preferably Graduates Middle level decision making Law Enforcement officers with at least 5 years of service and knowledge of computer programming. They should be able to speak, read & write English.. upto 45 years Officers/officials from law enforcement agencies doing I.T. related jobs. E. Aims & Objectives of the Course To provide an in-depth knowledge in designing and development of application software for police for day-to-day police related work. To familiarize participants with the management of crime records and crime analysis using IT tools. To expose participants to the latest technologies like VB.Net, ASP.Net, Web Designing and issues related to Cyber Security. F. Course Contents / Syllabus [please attach course details / profile] Office Automation Concepts -Windows 8/Office-2010 Concepts of Software Engineering Visual Basic.NET(VB.NET) 2013 Basics RDBMS: SQL Server 2012 Database Application with VB.NET 2013 Web Designing Concepts -HTML

Web Designing with ASP.NET 2013 Basic Crime Analysis Link Analysis Crime Analysis tools: A Study on Devinfo / Crimeinfo, CCTNS (Crime & Criminal Tracking Network & System) etc. Networks & e-security Exposure to Cyber Security. Project:- To design & develop Software Packages for police applications using VB.NET/ASP.NET & SQL Server G. Mode of Evaluation of performance of the participants Quiz/Written Test after each module. Evaluation of Project developed by trainees by experts in the field.

INDIVIDUAL COURSE DETAILS A. Name of the Institute NATIONAL CRIME RECORDS BUREAU B. Name/Title of the Course Advanced Fingerprint Science & I T C. Course Dates with Duration in Weeks [note: dates may be fixed keeping in mind festivals, holidays, weather conditions, availability of accommodations, etc. No request for change in dates, once approved/ circulated will be entertained] D. Eligibility Criteria for Participants 1. Educational Qualifications 2. Work Experience required, if any 3. Age Limit 4. Target Group [Level of participants and target ministries/departments etc. may be indicated] From 04-01-2016 to 25-03-2016 In weeks: 12 Weeks Preferably Graduates Middle level decision making officers engaged in Fingerprint Identification activities with at least 5 years of service. They should be able to read, write & speak English. upto 45 years Officers/officials from law enforcement agencies having working knowledge of Fingerprint Analysis E. Aims & Objectives of the Course To provide an in-depth knowledge in operating computers & using latest Office Automation software in day-to-day work. To acquaint the participants with the current trends & developments in the processing of fingerprints. To familiarize the participants with modern equipments, advancement and use of computers in fingerprint science. F. Course Contents / Syllabus [please attach course details / profile] Office Automation Concepts Operating System Windows 8 MS-Office 2010 Introduction, History and Principles of Finger Print Science Use of Biometrics for Individualization Finger Print Patterns & Classification Taking fingerprints of living persons and cadaver Use of Portable F P Live Scanning

System Comparison of Identical Finger Prints marking of Ridge Characteristics Law of probability & Biology behind infallibility of Friction Ridge Evidence Photography of finger prints (Analog & Digital) Examination of scene of crime for friction Ridge Evidence Detection & Development of chance prints by conventional and modern forensic methods Use of Advanced equipments for Fingerprint Analysis Presenting Finger Print Evidence in the Court of Law Cross-examination of FP Experts & Daubert Ruling Important Court Rulings w.r.t. Fingerprint Evidence Study of Level-3 details in fingerprints Poroscopy & Edgeoscopy Detection of forgery of Fingerprints Automated Finger Print Identification System (AFIS) Recent trends in Finger Print Science across the world Discussion on famous International cases involving FP Science like wrong FP report in Madrid Blast Case Project-Examination of questioned documents & science of crime G. Mode of Evaluation of performance of the participants Quiz/Written Test after each module. Evaluation of Project developed by trainees by experts in the field.