MODULES FOR TRAINING PROGRAMMES ON CYBER
SECURITY
1) Awareness Programme on Cyber Security for Users of Computer Training Module Details
Course Title Awareness Programme on Cyber Security for
Users of Computer
Duration 1 day
Objective of the Course To make the users of computers and cell phones aware of cyber crimes and the precautions to be taken to get rid of cyber criminals. .
Eligibility of Participants Government employees with working knowledge of computer and internet
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Different types of cyber crimes • Impacts of cyber crimes
• Cyber Security Guidelines
• Email, communication and Safe browsing • Digital Signature
• Cyber Law and Security Practices • Remedies against cyber crimes
• Sources of security related information • Government of India agencies involved in
cyber security
• Government of Kerala agencies for ensuring cyber security
2)Foundation Course on Cyber Security For Govt. Employees (Collaboration with DOEACC )
Training Module Details
Course Title Foundation Course on Cyber Security for Government Employees
Duration 2 days
Objective of the Course
Eligibility of Participants
To impart knowledge on cyber security to
Government employees who are users of Computer. Government employees with working knowledge of computer and internet.
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Kozhikode
Course Contents
• BasicWindowsSecurity • Passwords
• Viruses,Worms,and Other Malware • Spyware and Adware
• E-mail Safety
• Patching and Updates • Perimeter Security
3)The Advanced Course on Cyber Security for Govt. Employees (Collaboration with DOEACC )
Training Module Details
Course Title The Advanced Course on Cyber Security for Government Employees
Duration 5 days
Objective of the Course
Eligibility of Participants
To impart knowledge on cyber security to to System Administrators,Data Processors Programme Officers, Developers and IT Professionnels .
Govt employees discharging the duties of System Administrators, Developers Programme Officers and IT Professionnels.
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Kozhikode
Course Contents
• Understanding and recognizing Internet Protocols and Ethernet Packets
• Packet Analysis (Demo and Practical)
• Incident handling and Response • Vulnerability Analysis, attacks and Management
• Network Attacks like Scanning, Sniffing, Spoofing, Password cracking, Trojans, Denial of Service Attack etc (Practical)
• Secure Sockets Layer (SSL), Secure Shell ( SSH) • Internet Protocols
• Access and Authentication:
• Access Control in Practice, models, techniques,
• Role of Kerberos for secure authentication (Theory with Demo) • Network Security Protocols and Authentication:
• Hands on Exercises • Application Security
• Host System Hardening-Window and Linux • Web Server Security,
• Mail Server Security
• Host and Network based firewall installations and configurations • Understating and configuring rules,
• Understanding the Intrusion Detection System (I D S) • Configuring the IDS
• Cyber Laws- Information Technology Act 2000 • Computer Forensic &Analysis
• Practical oriented demonstration.
4) Training Programme on Cyber Security and Cyber Law for Judicial Officers Training Module Details
Course Title
Training Programme on Cyber Security and Cyber Law for Judicial Officers
Duration 3 days
Objective of the Course
Eligibility of Participants
To impart knowledge to enable judges to handle cases involving cyber crimes efficiently and
effectively.
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Role of Judges in combating with cyber crimes • Different types of cyber crimes and punishments • Information Technology Act 2000- An overview, • Electronic records and the law
• Fundamentals of E- Commerce
• Digital signature and electronic signature
• Crimes relating to Electronic Signature Certificate • Electronic signature as evidence.
• Civil and Criminal Remedies against cyber crimes • Role of Adjudicating Officers
• Cyber Appellate Tribunal;
• Judges competent to try cyber crimes.
• Collection and analysis of digital evidence, admissibility of electronic records • Cyber forensics
• Govt. agencies and expert bodies assisting cyber crime investigation and promoting Cyber Security .
• Basic E-governance applications w. r. t. Judicial Officers- E-Courts,
5) NLP on Cyber Security ,Cyber Law and Cyber Forensics for Public Prosecutors Training Module Details
Course Title
Duration 3 days Objective of the Course
Eligibility of Participants
To impart knowledge to Public Prosecutors to enable them to handle cases involving cybercrimes
efficiently and effectively.
Assistant Public Prosecutors / Public Prosecutors
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Role of Public Prosecutors in combating with cyber Crimes • Traditional crimes committed by using computers
• Cyber crimes against individuals • Cyber crimes against property
• Cyber crimes against the Government • Punishments for cyber crimes
• Cyber Law and Security Practices
• Digital signature and Electronic signature • Crimes relating to Electronic Signature Certificate • Civil and Criminal Remedies against cyber crimes • Cyber Appellate Tribunal;
• Compounding of offences
• Police Powers- power to arrest, investigate ,search and seizure. • Liability of intermediaries
• Protected systems, critical infrastructure • Judges competent to try Cyber cases. • Cyber crime Investigation
6) NLP on Cyber Security ,Cyber Law and Cyber Forensics for Police Officers Training Module Details
Course Title
Training Programme onCyber Security, Cyber Law and Cyber Forensics for Police Officers
Duration 3 days
Objective of the Course
Eligibility of Participants
To enable PoliceOfficers to handle cases involving cybercrimes efficiently and effectively.
Police Officers above the rank of Sub Inspectors / Assistant Public Prosecutors / Public Prosecutors
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Role of police officers in combating with cyber Crimes • Traditional crimes committed by using computers • Cyber crimes against individuals
• Cyber crimes against property
• Cyber crimes against the Government • Punishments for cyber crimes
• Information Technology Act 2000 as amended by Act 10 of 2009 • Digital signature and Electronic signature
• Crimes relating to Electronic Signature Certificate • Civil and Criminal Remedies against cyber crimes • Cyber Appellate Tribunal;
• Compounding of offences
• Police Powers- power to arrest, investigate ,search and seizure. • Liability of intermediaries
• Judges competent to try Cyber cases. • Cyber crime Investigation
• Cyber forensics
7) NLP on Cyber Law and Security for Teachers of Schools and Institutes Training Module Details
Course Title
Training Programme on Cyber Law and CyberSecurity for Teachers of Schools and Institutes
Duration 3 days
Objective of the Course
Eligibility of Participants
To impart knowledge on cyber law and cyber security to teachers of schools and institutes so that they in turn can share the knowledge with their students.
Teachers of schools, polytechnic institutes, teachers of training institutes etc.
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Introduction to Information Security • Basic Security Threats
• Protecting Data
• E Mail security
• Browser and Web Security • Network Security
• Security Tools • Basic Cryptography
• Sources of security related information • web security guidelines
• Govt. of India and Govt of Kerala agencies involved in cyber security
• Remedies against cyber crimes • Cyber Forensics.
• Creating security culture in the organization • Duties of teachers in combating with cyber crimes
8) NLP on Cyber Law and Cyber Security for Teachers of Colleges
Training Module Details
Course Title
Training Programme on Cyber Law and CyberSecurity for Teachers of Colleges
Duration 3 days
Objective of the Course
Eligibility of Participants
To impart knowledge on cyber law and cyber security to teachers of colleges so that they in turn can share the knowledge with their students. Teachers of colleges
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Duties of teachers in combating with cyber crimes
• Dual role of students as culprits and victims of cyber crimes • Basic Security Threats
• Protecting Data
• How to choose a good password • E Mail security
• Browser and Web Security • Network Security
• Security Tools
• Cryptography and Sources of security related information • Web security guidelines
• Govt. agencies in India involved in cyber security- designing, testing etc. Special focus on GOI agencies and GoK agencies.
• Remedies against cyber crimes • Cyber Forensics.
9) Training Programme on Cyber Law and Cyber Security for the Employees of Various Departments
Training Module Details
Course Title
Training Programme on Cyber Law and Cyber Security for the Employees of Various Departments
Duration 3 days
Objective of the Course
Eligibility of Participants
To impart knowledge on Cyber law and Cyber Security to Government employees .
Government employees with working knowledge of computer and internet.
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Different types of cyber crimes and punishments • Electronic records and the law
• Fundamentals of E- Commerce
• Digital signature and electronic signature
• Crimes relating to Electronic Signature Certificate • Civil and Criminal Remedies against cyber crimes • Role of Adjudicating Officers
• Information Technology Act 2000- An overview • Cyber Crime Cases investigated by Police • Computer Users’ responsibilities
• Govt. agencies and expert bodies assisting and promoting Cyber Security .
10) NLP on Cyber Security for System Administrators / IT Professionnels Training Module Details
Course Title
Training Programme on CyberSecurity for System Administrators / Programme Officers/ IT
Professionnels
Duration 3 days
Objective of the Course
Eligibility of Participants
To impart knowledge on cyber law and cyber security to to System Administrators, Programme Officers and IT Professionnels for countering cyber attacks.
System Administrators, Programme Officers and IT Professionnels.
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Security Awareness - An Overview • Network Security
• Web application Security • Internet Protocols
• Cryptography and Digital Signature • Hardening of Windows System • Securing Linux System
• Cyber Law and Security Practices • Cyber Crime Investigation
• Cyber Forensics
11) Training Programme onCyber Security for IAS/IPS/IFS Officers and the Officers of the Defence Department
Training Module Details
Course Title
Mid-Career Interaction between Armed Forces and Civil Services Officers on Cyber Security
Duration 2 days
Objective of the Course
Eligibility of Participants
To impart knowledge on cyber security and to facilitate interaction between Armed Forces and Civil Services Officers for countering cyber attacks in a better way.
How to Apply Through the Controlling Officer
Whom to Contact Dr. A Prasanna Associate Fellow & Course Director
Location IMG, Thiruvananthapuram
Course Contents
• Introduction to Information Security • Different types of cyber crimes • Identifying Security
• Securing the Network and Environment • Network Monitoring and Intrusion Detection • Security Policies and Procedures
• Security Administration • Fundamentals of File systems
• Understanding and recognizing Ethernet Packets • Incident handling and Response • Vulnerability Analysis, Attacks and Management • Security Auditing
• Role of Cryptography in Network Security: • Data Encryption Standard & RSA algorithms • Internet Protocols
• Secure Sockets Layer (SSL), Secure Shell ( SSH) • Access and Authentication:
• Access Control in Practice, models, techniques, • Network Security Protocols and Authentication • Application Security
• Web Server Security, • Mail Server Security
• Understating and configuring rules,
• Understanding the Intrusion Detection System (I D S) • Configuring the IDS