MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY



Similar documents
Introduction to Cyber Security / Information Security

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Bellevue University Cybersecurity Programs & Courses

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Detailed Description about course module wise:

A Systems Engineering Approach to Developing Cyber Security Professionals

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

CYBERTRON NETWORK SOLUTIONS

The Education Fellowship Finance Centralisation IT Security Strategy

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Certified Cyber Security Analyst VS-1160

Network Security Essentials:

SCP - Strategic Infrastructure Security

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

information security and its Describe what drives the need for information security.

Description: Objective: Attending students will learn:

Critical Controls for Cyber Security.

Cyber Defense Operations Graduate Certificate

External Supplier Control Requirements

Network Access Security. Lesson 10

Certified Secure Computer User

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

DATA PROTECTION LAWS OF THE WORLD. India

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Privacy + Security + Integrity

Fundamentals of Network Security - Theory and Practice-

Principles of Information Assurance Syllabus

Network Security Administrator

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Specific recommendations

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

CYBER LÄW IN INDIA. (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar

CTS2134 Introduction to Networking. Module Network Security

Introduction Open Source Security Tools for Information Technology Professionals

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Bachelor of Information Technology (Network Security)

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Certified Cyber Security Analyst VS-1160

Security + Certification (ITSY 1076) Syllabus

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

NETWORK ADMINISTRATION AND SECURITY

Information Technology Cyber Security Policy

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Microsoft Technologies

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

DRAFT Standard Statement Encryption

CISCO IOS NETWORK SECURITY (IINS)

CEH Version8 Course Outline

Jort Kollerie SonicWALL

Eleventh Hour Security+

Application Security Testing

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Basics of Internet Security

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Zurich Security And Privacy Protection Policy Application

Network Security Policy

Chapter 1 The Principles of Auditing 1

2016 TÜBİTAK BİLGEM Cyber Security Institute

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

INFORMATION SECURITY TRAINING CATALOG (2016)

Cyber Essentials Scheme

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Five keys to a more secure data environment

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Networking: EC Council Network Security Administrator NSA

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Cybercrime in Canadian Criminal Law

Security aspects of e-tailing. Chapter 7

Topics in Network Security

Information Security Basic Concepts

Transcription:

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers and cell phones aware of cyber crimes and the precautions to be taken to get rid of cyber criminals.. Government employees with working knowledge of computer and internet Different types of cyber crimes Impacts of cyber crimes Cyber Security Guidelines Email, communication and Safe browsing Digital Signature Cyber Law and Security Practices Remedies against cyber crimes Sources of security related information Government of India agencies involved in cyber security Government of Kerala agencies for ensuring cyber security 1

2)Foundation Course on Cyber Security For Govt. Employees (Collaboration with DOEACC ) Foundation Course on Cyber Security for Government Employees 2 days To impart knowledge on cyber security to Government employees who are users of Computer. Government employees with working knowledge of computer and internet. IMG, Kozhikode BasicWindowsSecurity Passwords Viruses,Worms,and Other Malware Spyware and Adware E-mail Safety Patching and Updates Perimeter Security Web Surfing Privacy and Safety Demonstrations and Pracicals 2

3)The Advanced Course on Cyber Security with DOEACC ) for Govt. Employees (Collaboration The Advanced Course on Cyber Security for Government Employees 5 days To impart knowledge on cyber security to to System Administrators,Data Processors Programme Officers, Developers and IT Professionnels. Govt employees discharging the duties of System Administrators, Developers Programme Officers and IT Professionnels. IMG, Kozhikode Understanding and recognizing Internet Protocols and Ethernet Packets Packet Analysis (Demo and Practical) Incident handling and Response Vulnerability Analysis, attacks and Management Network Attacks like Scanning, Sniffing, Spoofing, Password cracking, Trojans, Denial of Service Attack etc (Practical) Role of Cryptography in Network Security: Data Encryption Standard & RSA algorithms, 3

Secure Sockets Layer (SSL), Secure Shell ( SSH) Internet Protocols Access and Authentication: Access Control in Practice, models, techniques, Role of Kerberos for secure authentication (Theory with Demo) Network Security Protocols and Authentication: Hands on Exercises Application Security Host System Hardening-Window and Linux Web Server Security, Mail Server Security Host and Network based firewall installations and configurations Understating and configuring rules, Understanding the Intrusion Detection System (I D S) Configuring the IDS Cyber Laws- Information Technology Act 2000 Computer Forensic &Analysis Practical oriented demonstration. 4) Training Programme on Cyber Security and Cyber Law for Judicial Officers Training Programme on Cyber Security and Cyber Law for Judicial Officers 3 days To impart knowledge to enable judges to handle cases involving cyber crimes efficiently and effectively. Magistrate of the First class, Chief Judicial Magistrate, Assistant Sessions Judge, Sessions Judge 4

Role of Judges in combating with cyber crimes Different types of cyber crimes and punishments Information Technology Act 2000- An overview, Electronic records and the law Fundamentals of E- Commerce Digital signature and electronic signature Crimes relating to Electronic Signature Certificate Electronic signature as evidence. Civil and Criminal Remedies against cyber crimes Role of Adjudicating Officers Cyber Appellate Tribunal; Judges competent to try cyber crimes. Collection and analysis of digital evidence, admissibility of electronic records Cyber forensics Govt. agencies and expert bodies assisting cyber crime investigation and promoting Cyber Security. Basic E-governance applications w. r. t. Judicial Officers- E-Courts, 5) NLP on Cyber Security,Cyber Law and Cyber Forensics for Public Prosecutors Training Programme on Cyber Security, Cyber Law and Cyber Forensics for Public Prosecutors 5

3 days To impart knowledge to Public Prosecutors to enable them to handle cases involving cybercrimes efficiently and effectively. Assistant Public Prosecutors / Public Prosecutors Role of Public Prosecutors in combating with cyber Crimes Traditional crimes committed by using computers Cyber crimes against individuals Cyber crimes against property Cyber crimes against the Government Punishments for cyber crimes Cyber Law and Security Practices Digital signature and Electronic signature Crimes relating to Electronic Signature Certificate Civil and Criminal Remedies against cyber crimes Cyber Appellate Tribunal; Compounding of offences Police Powers- power to arrest, investigate,search and seizure. Liability of intermediaries Protected systems, critical infrastructure Judges competent to try Cyber cases. Cyber crime Investigation Cyber forensics 6

6) NLP on Cyber Security,Cyber Law and Cyber Forensics for Police Officers Training Programme oncyber Security, Cyber Law and Cyber Forensics for Police Officers 3 days To enable PoliceOfficers to handle cases involving cybercrimes efficiently and effectively. Police Officers above the rank of Sub Inspectors / Assistant Public Prosecutors / Public Prosecutors Role of police officers in combating with cyber Crimes Traditional crimes committed by using computers Cyber crimes against individuals Cyber crimes against property Cyber crimes against the Government Punishments for cyber crimes Information Technology Act 2000 as amended by Act 10 of 2009 Digital signature and Electronic signature Crimes relating to Electronic Signature Certificate Civil and Criminal Remedies against cyber crimes Cyber Appellate Tribunal; Compounding of offences Police Powers- power to arrest, investigate,search and seizure. Liability of intermediaries Protected systems, critical infrastructure 7

Judges competent to try Cyber cases. Cyber crime Investigation Cyber forensics 7) NLP on Cyber Law and Security for Teachers of Schools and Institutes Training Programme on Cyber Law and CyberSecurity for Teachers of Schools and Institutes 3 days To impart knowledge on cyber law and cyber security to teachers of schools and institutes so that they in turn can share the knowledge with their students. Teachers of schools, polytechnic institutes, teachers of training institutes etc. Introduction to Information Security Basic Security Threats Protecting Data How to choose a good password 8

E Mail security Browser and Web Security Network Security Security Tools Basic Cryptography Sources of security related information web security guidelines Govt. of India and Govt of Kerala agencies involved in cyber security Remedies against cyber crimes Cyber Forensics. Creating security culture in the organization Duties of teachers in combating with cyber crimes 8) NLP on Cyber Law and Cyber Security for Teachers of Colleges Training Programme on Cyber Law and CyberSecurity for Teachers of Colleges 3 days To impart knowledge on cyber law and cyber security to teachers of colleges so that they in turn can share the knowledge with their students. Teachers of colleges 9

Duties of teachers in combating with cyber crimes Dual role of students as culprits and victims of cyber crimes Basic Security Threats Protecting Data How to choose a good password E Mail security Browser and Web Security Network Security Security Tools Cryptography and Sources of security related information Web security guidelines Govt. agencies in India involved in cyber security- designing, testing etc. Special focus on GOI agencies and GoK agencies. Remedies against cyber crimes Cyber Forensics. Creating security culture in the organization 10

9) Training Programme on Cyber Law and Cyber Security for the Employees of Various Departments Training Programme on Cyber Law and Cyber Security for the Employees of Various Departments 3 days To impart knowledge on Cyber law and Cyber Security to Government employees. Government employees with working knowledge of computer and internet. Different types of cyber crimes and punishments Electronic records and the law Fundamentals of E- Commerce Digital signature and electronic signature Crimes relating to Electronic Signature Certificate Civil and Criminal Remedies against cyber crimes Role of Adjudicating Officers Cyber Appellate Tribunal; 11

Information Technology Act 2000- An overview Cyber Crime Cases investigated by Police Computer Users responsibilities Govt. agencies and expert bodies assisting and promoting Cyber Security. 10) NLP on Cyber Security for System Administrators / IT Professionnels Training Programme on CyberSecurity for System Administrators / Programme Officers/ IT Professionnels 3 days To impart knowledge on cyber law and cyber security to to System Administrators, Programme Officers and IT Professionnels for countering cyber attacks. System Administrators, Programme Officers and IT Professionnels. Security Awareness - An Overview Network Security Web Server Security 12

Web application Security Internet Protocols Cryptography and Digital Signature Hardening of Windows System Securing Linux System Cyber Law and Security Practices Cyber Crime Investigation Cyber Forensics 11) Training Programme oncyber Security for IAS/IPS/IFS Officers and the Officers of the Defence Department Mid-Career Interaction between Armed Forces and Civil Services Officers on Cyber Security 2 days To impart knowledge on cyber security and to facilitate interaction between Armed Forces and Civil Services Officers for countering cyber attacks in a better way. IAS/IPS/IFS/ Officers, Senior Officers of the Armed forces 13

Introduction to Information Security Different types of cyber crimes Identifying Security Securing the Network and Environment Network Monitoring and Intrusion Detection Security Policies and Procedures Security Administration Fundamentals of File systems Understanding and recognizing Ethernet Packets Incident handling and Response Vulnerability Analysis, Attacks and Management Security Auditing Role of Cryptography in Network Security: Data Encryption Standard & RSA algorithms Internet Protocols Secure Sockets Layer (SSL), Secure Shell ( SSH) Access and Authentication: Access Control in Practice, models, techniques, Network Security Protocols and Authentication Application Security Web Server Security, Mail Server Security Host and Network based firewall installations and configurations 14

Understating and configuring rules, Understanding the Intrusion Detection System (I D S) Configuring the IDS Cyber Laws and Security Practices 15