2
Professional Diploma in Cyber Investigations and Laws (DCIL) Computer and communication technologies have emerged as the backbone for mission critical infrastructure services of our society. In an effort to share information and organize operations, enterprises are creating complex networked systems and exposing their networks to customers, suppliers, and other business partners. Advanced network intricacies, and a dynamic insistence on the Internet have opened up security issues, leading to cyber-crime as a major byproduct, which is a cause of concern for organizations. Professional Diploma in Cyber Investigations and Laws aims at equipping the individuals with conceptual foundations leading to advanced understanding of computing technology, cyber forensic technology and up skilling their technical capabilities to manage the cyber security ecosystem. The cyber ecosystem is an eco-chain which starts from software design, development, bugs, testing, vulnerability assessment, hacking, digital investigation and forensic trails, and legal framework. Course is highly focused to equip personnel in the field of security management, IT professionals, Software Engineer, System administrators, Security administrators, Network Security, digital security, enterprise cyber security, Data base administrator, Network Analyst, Cloud administrator & IT Security Dept personnel from Corporate, lawyers, Detective Agencies & Investigators. It’s University recognized diploma program, scheduled mostly on weekends. Scope of program The course is designed to develop a working knowledge of the ecosystem leading to protecting the system and with new generation investigative skills supported by applicable legal framework. The course begins with security of the crime scene and concludes with the presentation of evidence. The course explores the policy and law on computer crime leading to differentiating "cybercrimes" with conventional crime and their Trans aggressive behavior in physical space. Students are expected to recognize, appraise, classify, and demonstrate dexterity in investigating computer related crimes. The student will apply his learning to solve problems exposed through informal appraisal, such as oral communication among students and between teacher and students. This course includes lab study designed to inflate important investigative and forensic skills. This course is mapped to various certifications exams from an industrial point of view. Cyber security being an upcoming industry calls for new areas of work including Cyber profiling, Cyber policing, Cyber Patrolling, Cyber forensics, Cyber investigation, apart from specializations like Image forensics, audio forensics, video forensics, Disk forensics, Software forensics, cloud forensics etc. Challenges to outwit the security problems exposed to the society at large. Professional Diploma in Cyber Investigations and Laws Institute of Technology Management & Research (ITMR)

Professional Diploma in Cyber Investigations and Lawsdata security, integrity maintenance and ethical hacking. The combination of domain expertise with practical experience will be

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Professional Diploma in Cyber Investigations and Lawsdata security, integrity maintenance and ethical hacking. The combination of domain expertise with practical experience will be

Professional Diploma in Cyber

Investigations and Laws (DCIL)

Computer and communication technologies

have emerged as the backbone for mission

critical infrastructure services of our society. In

an effort to share information and organize

operations, enterprises are creating complex

networked systems and exposing their

networks to customers, suppliers, and other

business partners. Advanced network

intricacies, and a dynamic insistence on the

Internet have opened up security issues,

leading to cyber-crime as a major byproduct,

which is a cause of concern for organizations.

Professional Diploma in Cyber Investigations

and Laws aims at equipping the individuals with

conceptual foundations leading to advanced

understanding of computing technology, cyber

forensic technology and up skilling their

technical capabilities to manage the cyber

security ecosystem. The cyber ecosystem is an

eco-chain which starts from software design,

development, bugs, testing, vulnerability

assessment, hacking, digital investigation and

forensic trails, and legal framework.

Course is highly focused to equip personnel in

the field of security management, IT

professionals, Software Engineer, System

administrators, Security administrators,

Network Security, digital security, enterprise

cyber security, Data base administrator,

Network Analyst, Cloud administrator & IT

Security Dept personnel from Corporate,

lawyers, Detective Agencies & Investigators.

It’s University recognized diploma program,

scheduled mostly on weekends.

Scope of program

The course is designed to develop a working

knowledge of the ecosystem leading to

protecting the system and with new generation

investigative skills supported by applicable

legal framework. The course begins with

security of the crime scene and concludes with

the presentation of evidence. The course

explores the policy and law on computer crime

leading to differentiating "cybercrimes" with

conventional crime and their Trans aggressive

behavior in physical space. Students are

expected to recognize, appraise, classify, and

demonstrate dexterity in investigating

computer related crimes.

The student will apply his learning to solve

problems exposed through informal appraisal,

such as oral communication among students

and between teacher and students. This

course includes lab study designed to inflate

important investigative and forensic skills. This

course is mapped to various certifications

exams from an industrial point of view.

Cyber security being an upcoming industry

calls for new areas of work including Cyber

profiling, Cyber policing, Cyber Patrolling,

Cyber forensics, Cyber investigation, apart

from specializations like Image forensics, audio

forensics, video forensics, Disk forensics,

Software forensics, cloud forensics etc.

Challenges to outwit the security problems

exposed to the society at large.

Professional Diploma in

Cyber Investigations and Laws

Institute of Technology Management & Research (ITMR)

Page 2: Professional Diploma in Cyber Investigations and Lawsdata security, integrity maintenance and ethical hacking. The combination of domain expertise with practical experience will be

About ITMR

Institute of Technology Management & Research (ITMR) is a division of Mamta Trust catering to the educational needs of the society along the lines of Technology Management & cutting edge Research. The program is offered through ITMR, Chennai.

Contact for More Information

Mail to [email protected] or contact +91-9840730610 / 9787401008 / 9566168196

Career path

Main Topics

Due to the dependency on Internet, all the

major organizations are in the look out to

enhance their human resource capital with

higher security skill set in order to protect their

business interests. Government of India has

called for more than 5 lakh security

p ro fess iona ls fo r na t iona l secur i t y

requirements. The Police force is in the lookout

for security expertise. Organizations including

public sector organizations, Managed security

service providers, banking and financial

industries are in the lookout for specialized

security skills. Foreign nations have started to

track good security skill-sets.

Cyber Law & IT Acts, Overview of Cyber Crime,

I n f o r m a t i o n G a t h e r i n g , E v i d e n c e

Management, System Cloning, Security

(Windows & Linux), Password Cracking

Techniques, Log Analysis, File Systems, Data

Hiding Techniques , Viruses, Trojans, Bots, Key

loggers & Spywares, Malware, IDS, IPS and

Honeypots, Proxy Server & Virtual Private

Network (VPN) Technology ,Searching

Techniques, Email Analysis & Security Issues ,

Social Media Analysis, Mobile, Disk & Software

Forensics, Security & Forensic Click jacking &

Tab nabbing Attacks , Advanced Methodology

for Privacy on Internet, Credit Card Frauds &

Cases , Vulnerability Assessment of Website,

Database, Webservers & Applications,

Penetration Testing Tools & Methodologies,

Wireless Attacks & Countermeasures.

PDCIL is conducted by highly qualified and well

experienced faculty having over 20 plus years

of consulting experience in network security,

data security, integrity maintenance and ethical

hacking. The combination of domain expertise

with practical experience will be an added

advantage for the students.

Corporate office:

HTC Towers, No.41, GST Road, Guindy,

Chennai - 600 032

Campus:

2/850, Mugalivakkam Main Road,

Manapakam, Chennai – 600 116

Faculty

Venue

Institute of Technology Management &

Research

(Division of Mamta Trust)

2/850, Mugaliwakkam Road, Mugaliwakkam, Chennai - 600 125

Admin Office: HTC Towers, No.41, GST Road, Guindy, Chennai – 600 032, Tamil Nadu, INDIA

Phone: +91 44 4345 3500 / +91 44 4345 3349

, Tamil Nadu, INDIA

Institute of Technology Management & ResearchITMR

www.itmr.ac.in

Course structure

Theory

1. Computer Network -

2. File System & Storage Management -

3. Cyber Forensics -

4. Cyber Crime & Related Laws -

5. SIEM & Log Trails -

DCE101

DCE102

DCE103

DCE104

DCE105

Practical

6. Forensics and VA lab - Network

Forensic Laboratory, Email Forensic

Laboratory, Forensic Imaging

Laboratory & Unconventional Testing

Laboratory -

7. Project -

DCE106

DCE107