Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws



Similar documents
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Cyber Security, Cyber Crimes and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160

Ethical Hacking & Cyber Security Workshop

FORBIDDEN - Ethical Hacking Workshop Duration

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Loophole+ with Ethical Hacking and Penetration Testing

Cybercrime in Canadian Criminal Law

Detailed Description about course module wise:

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

CRYPTUS DIPLOMA IN IT SECURITY

EC-Council Ethical Hacking and Countermeasures

Course Title: Course Description: Course Key Objective: Fee & Duration:

CYBERTRON NETWORK SOLUTIONS

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Introduction to Cyber Security / Information Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

EC Council Certified Ethical Hacker V8

Cyber Crimes: Information Security, Digital Evidence and Cyber Laws. V Rajendran venkrajen@yahoo.com ;

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Workshop Designed & Powered by TCIL IT, Chandigarh

Unit 3 Cyber security

3 day Workshop on Cyber Security & Ethical Hacking

CEH Version8 Course Outline

Cyber Security Awareness. Internet Safety Intro.

RMAR Technologies Pvt. Ltd.

ETHICAL HACKING CYBER SECURITY

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

The Information Security Problem

CHAPTER 10: COMPUTER SECURITY AND RISKS

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

CYBER CRIME AWARENESS

New-Age Undergraduate Programme

EC-Council. Certified Ethical Hacker. Program Brochure

[CEH]: Ethical Hacking and Countermeasures

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Acceptable Use Policy

Content Teaching Academy at James Madison University

E-COMMERCE and SECURITY - 1DL018

Information Systems Security Certificate Program

What legal aspects are needed to address specific ICT related issues?

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

ITS415: Principles of Cybersecurity

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

OCR LEVEL 3 CAMBRIDGE TECHNICAL

New-Age Master s Programme

Certified Information Systems Auditor (CISA)

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Certified Cyber Security Expert V Web Application Development

Scene of the Cybercrime Second Edition. Michael Cross

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Ethical Hacking Course Layout

Cyber security Indian perspective & Collaboration With EU

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Network Security: Introduction

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Hackers are here. Where are you?

COB 302 Management Information System (Lesson 8)

BE SAFE ONLINE: Lesson Plan

Vulnerability Assessment & Compliance

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

DATA PROTECTION LAWS OF THE WORLD. India

IBM Security Systems Trends and IBM Framework

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

Master of Science in Information Systems & Security Management. Courses Descriptions

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

SECURITY ISSUES INTERNET WORLD WIDE WEB FOR THE AND THE

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure


RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

CYBER LÄW IN INDIA. (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar

POLICIES TO MITIGATE CYBER RISK

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Transcription:

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

Training and Capacity Building Program on Cyber Crime, Ethical Hacking, Cyber Security, Forensics and Cyber Laws Information technology has enhanced the communication & has facilitated the growth of trade and commerce. The technology has fastened the e-commerce, e- Governance, net banking, mobile banking, online share trading and other commercial transactions. Cyber Criminals carry out online frauds and other criminal activities such as online defamation, data theft, obscenity, online pornography, phishing and violence etc. The biggest advantage for the offenders committing online crimes is that they can remain anonymous. The regulatory sphere is still in a nascent stage and continuously evolving every passing day. This program is organized by the IEEE Gujarat Section and CLS- Cyberra Legal Services aim to extend knowledge of cyber security, forensics & cyber laws amongst upcoming lawyers, IT, Management and Commerce Students. About IEEE IEEE is the world s largest professional association comprising of over 430,000 members (including 120,000 student members) in more than 160 countries dedicated to advancing technological innovation and excellence for the benefit of humanity. India has nearly 50K members (accounting for ~ 43% of Asia-Pacific region) with an annual growth rate of 9%. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities. It has 38 Societies and 7 technical Councils representing the wide range of IEEE technical interests. IEEE publishes more than 148 transactions, journals, and magazines; and sponsors more than 1,450 conferences in 92 countries. With this it

manages a digital library of 4 million plus documents in the IEEE Xplore, with more than 10 million downloads each month. IEEE Standards Association has a portfolio of around 1,500 standards and projects under development. This includes the prominent IEEE 802.11 standards for wireless networking. For detail you may visit http://www.ieee.org/index.html. About IEEE GUJARAT SECTION IEEE Gujarat Section is one of 11 sections in India, completing its 25 years of foundation next year. It has around 1500 members, including 850 student members (spreading in 20 engineering institute campuses). We have 9 chapters (of 12 IEEE societies). We conduct one- and/or two-days workshops, conferences, half day seminars, 90 minute talks on many concurrent technical topics. Recently, in Nov. 2013, we organized National Workshop on Cyber Security. This year we have organized 2-Day Workshop on Emerging Research Trends in Engineering (in July 2014) and have planned to organize the National Seminar on Computer Vision and Image Processing (in Sep 2014) besides other events. Next year we are organizing an International Conference on the theme of Internet of Things, TENSYMP 2015 (in May 2015).For more details of Gujarat section, http://ieeegujaratsection.org/ and about the detailed history of Gujarat Section, http://www.ieeeghn.org/wiki/index.php/ieee_gujarat_section_history. About CLS- Cyberra Legal Services Founded in Ahmedabad in 2003, Cyberra Legal Services is a premier organization in cyber security/cyber law advisory, consultancy, training and education. It is the first of its kind of service venture in Gujarat with Key Personnel who are Technology Graduates, Law graduates, Ethical Hackers having specialized in cyber laws. CLS

serves its various clients in five cities namely Ahmedabad, Gandhinagar, Baroda, Rajkot and Delhi. CLS, in association with Manan Thakker & Associates (Advocates & Cyber Law Consultants), have filed highest number of cyber fraud compensation matters in the state of Gujarat till December, 2014. CLS holds memberships with three prestigious committees namely Cyber Security Consultant Selection Committee, Govt. of Gujarat; Cyber Security Committee of Gujarat Police s Raksha Shakti Universtiy and Legal Committee, GESIA. Objective of this course To facilitate understand & critical understanding about Cyber crimes, Ethical Hacking, cyber security, forensics and cyber laws Exploration of the legal and policy developments in various countries for cyber space To provide in-depth knowledge of Information Technology Act, 2000 including Information Technology Amendment Act, 2008 Understanding e-governance, Electronic Contracts, e-banking & Secure electronic records To share knowledge of the regulation of cyber space at national and international level To train and prepare candidate to consider Cyber security, forensics and cyber laws as a career option. Eligibility Criteria The said program is open for professionals and practitioners of the areas of cyber security, cyber law, cyber forensics, system administrator, computer networking, and allied fields and students of HSC/B.E./B.Tech./BCA/MCA/M.Sc.

(IT)/LLB/LLM/CS/ICWA/CA/MBA/BBA/PGDCA/B.Com./M.Com./B.A./ Diploma Programs in India. Desirable This course is meant for everyone who uses computers, mobiles and Internet. Prior knowledge of either law or technology is NOT mandatory. Benefits of completing this program You will get an edge over your peers for employment opportunity in Software, IT, Security and Consulting Companies BPO Companies LPO/KPO Companies Internet Service Providers Mobile Service Providers Corporate Business Houses Banks and Financial institutions Data Centers Certifying Authorities for Digital Signature Certificates Cyber Crime Cells Chartered Accountant Firms Law Firms Bio-Tech Companies Pharmaceutical companies Clinical Research Organizations Life Science Companies and Hospitals. Colleges.

Course Contents A. Cyber Crimes Data diddling Data leakage Eavesdropping E-mail forgery E-mail threats Internet misinformation Internet terrorism Password cracking Round downs Salami Techniques Scavenging/Corporate Espionage Social Engineering Software Piracy Spamming Super zapping Piggybacking Trap door Trojan Horse Virus Worm Impersonation Time bomb Logic bomb Dos Attacks

B. Ethical Hacking & Cyber Security Email Hacking & its security Social Media Hacking & its Security Web Hacking & its Security Mobile Hacking & its Security Fake Calls, fake SMS & its Security Wi-Fi Network Hacking & its Security Windows Hacking & its Security DDOS Attack & its Security Software Hacking & Reverse Engineering Cross site scripting & its Security Basics of cryptography, Encryption & Decryption Security breaches case studies Categorization of Digital Security Multimedia Security (Steganography) Malware Concepts (Virus, Worms, Trojan etc.) Firewall & IDS/IPS Concepts Basics of Vulnerability Assessment & Penetration Testing Spying & Cyber Reccy Email forgery and E-mail Tracing C. Cyber Laws Introduction to Information technology & Cyber Law Basics of E-commerce and Computer Fraud Techniques Cyber Security Fundaments, Techniques and Core Principles Cyber Space, Technology & Issues Regulating Cyber Space: International

Regulating Cyber Space: National E-contract & Electronic Data Interchange E-signature and E-governance legality under I.T.Act, 2000 Cyber Contraventions, Compensation & Crimes under I.T.Act, 2000 ISPs and Websites Legal Liability under I.T.Act, 2000 Corporate Legal Liability under I.T.Act, 2000 Adjudication Process For Recovery of Losses under I.T.Act, 2000 Case Studies and Case Laws D. Cyber Forensics Forensic Imaging & Storage Media Duplication (FTK Imager) Windows Forensics Artifacts (Nirsoft/SysInternals) Various Case Studies Data Recovery (TestDisk/PhotoRec) Forensic Investigation of Image (Autopsy) Malware Analysis (Static/Dynamic) DEFT OS Social Media Forensics (FB/Twitter/LinkedIn etc.) Multimedia Forensics (JPEGSnoop/ImageHeader Analysis) File Header Analysis, Office Files Analysis (FOCA), File Signature Smart Phone Forensics (AFLogical, ViaForensics, MobileEdit) Timeline Analysis (Event Log Analysis) Registry, NTUSER.DAT, USERCLASS.DAT Analysis (Regedit, FRAT, Scripts) RAM Forensics (Concepts & Artifacts Analysis)

Study Material Specially compiled exclusive study material will be provided along with copy of the Information Technology Bare Act. Duration of the program Week end program (on Sundays - 5 hours) for 2 months @ Ahmedabad (Gujarat) Evaluation The candidates will be evaluated for maximum of 100 marks for which one MCQ (Multiple Choice Questions) Open Book Exam will be conducted on the last Sunday of program. The candidate needs to score at least 40% marks to complete the course and get the certificate of participation. Fee Structure Tuition Fees: Rs. 8,500/- Application Charges: Rs. 150/- How to Apply The application form can be downloaded from www.cyberralegalservices.com or http://ieeegujaratsection.org/ or write to Program Coordinator. Candidate should write Certificate Program on Cyber Crime, Ethical Hacking, Cyber Security, and Forensics & Cyber Laws on the envelope containing Application. Contact Us

Ms. C M Thakker (Advocate & Cyber Law Advisor) Coordinator IEEE CLS Training Program on Cyber Crime, Ethical Hacking, Cyber Security, Forensics & Cyber Laws Address: CLS - 2 nd Floor, Asha Complex, Bh. Navarangpura Police Station, Navarangpura, Ahmedabad 380009 (Gujarat) M: +91 095101 22995 Landline: 079-400 300 31 Email: cyberlawcourse.ahmedabad@gmail.com Website: http://ieeegujaratsection.org Website: www.cyberralegalservices.com