• No results found

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

N/A
N/A
Protected

Academic year: 2021

Share "MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

(1)

MODULES FOR TRAINING PROGRAMMES ON CYBER

SECURITY

1) Awareness Programme on Cyber Security for Users of Computer Training Module Details

Course Title Awareness Programme on Cyber Security for

Users of Computer

Duration 1 day

Objective of the Course To make the users of computers and cell phones aware of cyber crimes and the precautions to be taken to get rid of cyber criminals. .

Eligibility of Participants Government employees with working knowledge of computer and internet

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Different types of cyber crimes • Impacts of cyber crimes

• Cyber Security Guidelines

• Email, communication and Safe browsing • Digital Signature

• Cyber Law and Security Practices • Remedies against cyber crimes

• Sources of security related information • Government of India agencies involved in

cyber security

• Government of Kerala agencies for ensuring cyber security

(2)

2)Foundation Course on Cyber Security For Govt. Employees (Collaboration with DOEACC )

Training Module Details

Course Title Foundation Course on Cyber Security for Government Employees

Duration 2 days

Objective of the Course

Eligibility of Participants

To impart knowledge on cyber security to

Government employees who are users of Computer. Government employees with working knowledge of computer and internet.

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Kozhikode

Course Contents

• BasicWindowsSecurity • Passwords

• Viruses,Worms,and Other Malware • Spyware and Adware

• E-mail Safety

• Patching and Updates • Perimeter Security

(3)

3)The Advanced Course on Cyber Security for Govt. Employees (Collaboration with DOEACC )

Training Module Details

Course Title The Advanced Course on Cyber Security for Government Employees

Duration 5 days

Objective of the Course

Eligibility of Participants

To impart knowledge on cyber security to to System Administrators,Data Processors Programme Officers, Developers and IT Professionnels .

Govt employees discharging the duties of System Administrators, Developers Programme Officers and IT Professionnels.

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Kozhikode

Course Contents

• Understanding and recognizing Internet Protocols and Ethernet Packets

• Packet Analysis (Demo and Practical)

• Incident handling and Response • Vulnerability Analysis, attacks and Management

• Network Attacks like Scanning, Sniffing, Spoofing, Password cracking, Trojans, Denial of Service Attack etc (Practical)

(4)

• Secure Sockets Layer (SSL), Secure Shell ( SSH) • Internet Protocols

• Access and Authentication:

• Access Control in Practice, models, techniques,

• Role of Kerberos for secure authentication (Theory with Demo) • Network Security Protocols and Authentication:

• Hands on Exercises • Application Security

• Host System Hardening-Window and Linux • Web Server Security,

• Mail Server Security

• Host and Network based firewall installations and configurations • Understating and configuring rules,

• Understanding the Intrusion Detection System (I D S) • Configuring the IDS

• Cyber Laws- Information Technology Act 2000 • Computer Forensic &Analysis

• Practical oriented demonstration.

4) Training Programme on Cyber Security and Cyber Law for Judicial Officers Training Module Details

Course Title

Training Programme on Cyber Security and Cyber Law for Judicial Officers

Duration 3 days

Objective of the Course

Eligibility of Participants

To impart knowledge to enable judges to handle cases involving cyber crimes efficiently and

effectively.

(5)

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Role of Judges in combating with cyber crimes • Different types of cyber crimes and punishments • Information Technology Act 2000- An overview, • Electronic records and the law

• Fundamentals of E- Commerce

• Digital signature and electronic signature

• Crimes relating to Electronic Signature Certificate • Electronic signature as evidence.

• Civil and Criminal Remedies against cyber crimes • Role of Adjudicating Officers

• Cyber Appellate Tribunal;

• Judges competent to try cyber crimes.

• Collection and analysis of digital evidence, admissibility of electronic records • Cyber forensics

• Govt. agencies and expert bodies assisting cyber crime investigation and promoting Cyber Security .

• Basic E-governance applications w. r. t. Judicial Officers- E-Courts,

5) NLP on Cyber Security ,Cyber Law and Cyber Forensics for Public Prosecutors Training Module Details

Course Title

(6)

Duration 3 days Objective of the Course

Eligibility of Participants

To impart knowledge to Public Prosecutors to enable them to handle cases involving cybercrimes

efficiently and effectively.

Assistant Public Prosecutors / Public Prosecutors

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Role of Public Prosecutors in combating with cyber Crimes • Traditional crimes committed by using computers

• Cyber crimes against individuals • Cyber crimes against property

• Cyber crimes against the Government • Punishments for cyber crimes

• Cyber Law and Security Practices

• Digital signature and Electronic signature • Crimes relating to Electronic Signature Certificate • Civil and Criminal Remedies against cyber crimes • Cyber Appellate Tribunal;

• Compounding of offences

• Police Powers- power to arrest, investigate ,search and seizure. • Liability of intermediaries

• Protected systems, critical infrastructure • Judges competent to try Cyber cases. • Cyber crime Investigation

(7)

6) NLP on Cyber Security ,Cyber Law and Cyber Forensics for Police Officers Training Module Details

Course Title

Training Programme onCyber Security, Cyber Law and Cyber Forensics for Police Officers

Duration 3 days

Objective of the Course

Eligibility of Participants

To enable PoliceOfficers to handle cases involving cybercrimes efficiently and effectively.

Police Officers above the rank of Sub Inspectors / Assistant Public Prosecutors / Public Prosecutors

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Role of police officers in combating with cyber Crimes • Traditional crimes committed by using computers • Cyber crimes against individuals

• Cyber crimes against property

• Cyber crimes against the Government • Punishments for cyber crimes

• Information Technology Act 2000 as amended by Act 10 of 2009 • Digital signature and Electronic signature

• Crimes relating to Electronic Signature Certificate • Civil and Criminal Remedies against cyber crimes • Cyber Appellate Tribunal;

• Compounding of offences

• Police Powers- power to arrest, investigate ,search and seizure. • Liability of intermediaries

(8)

• Judges competent to try Cyber cases. • Cyber crime Investigation

• Cyber forensics

7) NLP on Cyber Law and Security for Teachers of Schools and Institutes Training Module Details

Course Title

Training Programme on Cyber Law and CyberSecurity for Teachers of Schools and Institutes

Duration 3 days

Objective of the Course

Eligibility of Participants

To impart knowledge on cyber law and cyber security to teachers of schools and institutes so that they in turn can share the knowledge with their students.

Teachers of schools, polytechnic institutes, teachers of training institutes etc.

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Introduction to Information Security • Basic Security Threats

• Protecting Data

(9)

• E Mail security

• Browser and Web Security • Network Security

• Security Tools • Basic Cryptography

• Sources of security related information • web security guidelines

• Govt. of India and Govt of Kerala agencies involved in cyber security

• Remedies against cyber crimes • Cyber Forensics.

• Creating security culture in the organization • Duties of teachers in combating with cyber crimes

8) NLP on Cyber Law and Cyber Security for Teachers of Colleges

Training Module Details

Course Title

Training Programme on Cyber Law and CyberSecurity for Teachers of Colleges

Duration 3 days

Objective of the Course

Eligibility of Participants

To impart knowledge on cyber law and cyber security to teachers of colleges so that they in turn can share the knowledge with their students. Teachers of colleges

(10)

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Duties of teachers in combating with cyber crimes

• Dual role of students as culprits and victims of cyber crimes • Basic Security Threats

• Protecting Data

• How to choose a good password • E Mail security

• Browser and Web Security • Network Security

• Security Tools

• Cryptography and Sources of security related information • Web security guidelines

• Govt. agencies in India involved in cyber security- designing, testing etc. Special focus on GOI agencies and GoK agencies.

• Remedies against cyber crimes • Cyber Forensics.

(11)

9) Training Programme on Cyber Law and Cyber Security for the Employees of Various Departments

Training Module Details

Course Title

Training Programme on Cyber Law and Cyber Security for the Employees of Various Departments

Duration 3 days

Objective of the Course

Eligibility of Participants

To impart knowledge on Cyber law and Cyber Security to Government employees .

Government employees with working knowledge of computer and internet.

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Different types of cyber crimes and punishments • Electronic records and the law

• Fundamentals of E- Commerce

• Digital signature and electronic signature

• Crimes relating to Electronic Signature Certificate • Civil and Criminal Remedies against cyber crimes • Role of Adjudicating Officers

(12)

• Information Technology Act 2000- An overview • Cyber Crime Cases investigated by Police • Computer Users’ responsibilities

• Govt. agencies and expert bodies assisting and promoting Cyber Security .

10) NLP on Cyber Security for System Administrators / IT Professionnels Training Module Details

Course Title

Training Programme on CyberSecurity for System Administrators / Programme Officers/ IT

Professionnels

Duration 3 days

Objective of the Course

Eligibility of Participants

To impart knowledge on cyber law and cyber security to to System Administrators, Programme Officers and IT Professionnels for countering cyber attacks.

System Administrators, Programme Officers and IT Professionnels.

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Security Awareness - An Overview • Network Security

(13)

• Web application Security • Internet Protocols

• Cryptography and Digital Signature • Hardening of Windows System • Securing Linux System

• Cyber Law and Security Practices • Cyber Crime Investigation

• Cyber Forensics

11) Training Programme onCyber Security for IAS/IPS/IFS Officers and the Officers of the Defence Department

Training Module Details

Course Title

Mid-Career Interaction between Armed Forces and Civil Services Officers on Cyber Security

Duration 2 days

Objective of the Course

Eligibility of Participants

To impart knowledge on cyber security and to facilitate interaction between Armed Forces and Civil Services Officers for countering cyber attacks in a better way.

(14)

How to Apply Through the Controlling Officer

Whom to Contact Dr. A Prasanna Associate Fellow & Course Director

Location IMG, Thiruvananthapuram

Course Contents

• Introduction to Information Security • Different types of cyber crimes • Identifying Security

• Securing the Network and Environment • Network Monitoring and Intrusion Detection • Security Policies and Procedures

• Security Administration • Fundamentals of File systems

• Understanding and recognizing Ethernet Packets • Incident handling and Response • Vulnerability Analysis, Attacks and Management • Security Auditing

• Role of Cryptography in Network Security: • Data Encryption Standard & RSA algorithms • Internet Protocols

• Secure Sockets Layer (SSL), Secure Shell ( SSH) • Access and Authentication:

• Access Control in Practice, models, techniques, • Network Security Protocols and Authentication • Application Security

• Web Server Security, • Mail Server Security

(15)

• Understating and configuring rules,

• Understanding the Intrusion Detection System (I D S) • Configuring the IDS

References

Related documents

Possibly, the long association of Brazilian economy with the fixed exchange rate and managed floating exchange rate regime has made the economic agents more

An explanatory paragraph following the opinion paragraph, describing that (i) the statement of social insurance presents the actuarial present value of the agency’s estimated

should only be implemented if the GIC can clearly demonstrate that the current situation is not meeting the expectations of small business and domestic consumers and is

For example, according to Armstrong (2006, p.8), “the overall purpose of human resource management is to ensure that the organization is able to achieve success

Specify alert text on the Message Record Action - Detail window or New Event Alert Policy window (shown in Define Alert Classes). For more information about alert text, see

Although existing studies have reported positive effects of music on reading skills, no study thus far has focused on music therapy interventions to address the learning needs of

Alternator Engine stop Coolant overheat Hydraulic oil level Auto lubrication Fast-filling Tension Electric lever Emergency engine stop Top valve.. Engine over run Coolant level