Course Introduction

FCC 5 : Cyber Security and OSINT

  • Course Outline
  • Curriculum
  • FAQ
  • Case Studies
  • Reviews

Course Start Date        : 2nd May 2025

Last Date to Register : 25th Apr 2025

Cyber security is the process of securing digital devices, networks, servers, and data from unethical online attacks. The online Cyber Security & OSINT Foundation Certificate Course by Sherlock Institute of Forensic Science (SIFS India) will help you gain knowledge about several online privacy protection techniques you can implement to protect yourself from ever-growing digital world crimes.

Over the month, you will learn internet security basics along with several case studies and digital threat detection techniques. The curriculum is regularly updated as per the latest industry trends and requirements and is taught by cyber security experts and researchers constantly working to devise new methods of online security. You will learn cyberspace architecture, types of cyber crimes, IT acts, social media platforms monitoring, eCommerce threats, digital payment frauds, data back up, device security, how to collect publicly available data and analyze it for any malicious content that can harm the online security of individuals, organizations, or even countries. along with several other crucial cyber security aspects.

In this era of digitalization, the scope of this field can never go down and is emerging as the most lucrative field of study. However, globally, there is a huge gap between the current number of skilled cyber security experts and what is actually needed. To fill this demand and supply gap, we would like you to enroll in this web-based cyber security course and begin your journey to protect society from such threats.


Become Proficient to Answer:

- What is cyberspace architecture, how does it relate to the internet infrastructure and governance of data transfer, and what are the cyber security challenges?

- What are the various types of cybercrimes, including those targeting computers and mobile devices, and what are the modus operandi of cybercriminals?

- What are the steps to report cybercrimes, and what role does the IT Act 2000 play in addressing cybercrime in India?

- What are the different types of social media platforms and the challenges and opportunities presented by online social networks?

- How can security issues like inappropriate content and privacy concerns related to social media be addressed in accordance with the legal system?

- What are the main components and elements of e-commerce security and the threats faced by this industry?

- What are the various modes, common frauds, preventive measures, and RBI guidelines related to digital payments?

- What are the security measures and policies for endpoint devices and mobile phones, including password policies, data backup, and device security?

- What are the best cyber security practices, including the significance of host firewalls, antivirus software, and Wi-Fi security?

- What are the goals, capabilities, and limitations associated with open-source intelligence (OSINT) investigations?

- How do you use web-based and proprietary open-source search tools to conduct investigations?

- How can social media research be conducted effectively to obtain and utilize sensitive personal data in investigations?

- What is metadata in files, and how can it be accessed, modified, or deleted for investigative purposes?


Learning Outcomes:

Understanding Cyber Security Fundamentals: After completing this course, you will have a strong understanding of the basic cyber security principles, including the identification of common threats and their preventive measures.

Effective Network and OS Security: You will learn how to implement security measures to protect computer networks and operating systems, thereby minimizing the risk of cyberattacks and unauthorized access.

Proficiency in OSINT Techniques: You will gain an understanding of using tools and techniques for gathering publicly available information from different sources for security and investigative purposes.

Ethical Hacking and Vulnerability Assessment: You will become aware of the difference between ethical and unethical hacking and learn ways to address security weaknesses in systems and applications.

Practical Application of Knowledge: You will become proficient in applying your cyber security and OSINT knowledge in real-world scenarios and making decisions to protect yourself from cyber threats.


Course Details:

Fee

National: 1770 INR (1500 INR + 18% GST)

International: 50 USD 

Duration

1 Month

Eligibility

12th Passed

Session Timing

From 6 to 7 PM IST  | Monday, Wednesday, Friday

Payment Details:

International Student : PayPal: forensicdocument@gmail.com

Account Details for National Student

Bank Name  - ICICI BANK
Acc. Name    - SIFS INDIA PVT. LTD.
Account No. - 663505500086
Type         - Current
IFSC Code    -   ICIC0000160
Address         - ICICI Bank, H-4, Model Town -III, New Delhi - 110009


  • Curriculum


    MODULE 1 – INTRODUCTION TO CYBERSPACE AND CYBERSECURITY

    In this module, you will learn the basics of cyberspace and computer web technology, as well as the storage and transmission of digital information across networks. This module also covers internet infrastructure, data transfer and governance, and the cyberspace regulatory framework. You will be introduced to cyber security, its role in safeguarding digital assets, the challenges involved, and the need for strong protection against cyber threats in the digital era.

    MODULE 2 – CLASSIFICATION AND MODUS OPERANDI OF CYBER CRIMES

    This module covers an in-depth understanding of cybercrime classifications, crimes targeting computers and mobile devices, cybercrimes against women and children, financial frauds, malware and ransomware attacks, and social engineering attacks. You will also learn about advanced cyber threats, like zero-day and zero-click attacks. This module also covers the modus operandi of cybercriminals, with insights about their techniques and strategies.

    MODULE 3 – REPORTING, MITIGATION, AND CYBER CRIMES LEGAL ASPECTS

    In this module, you will gain knowledge about cybercrime reporting along with measures to minimize the impact of cyber attacks and protect digital assets. You will gain insights about the Information Technology Act of 2000 and its subsequent amendments that govern cybercrimes and offenses in India. This module also covers the role of organizations that handle cybercrime and cybersecurity matters in India and the resources available to combat digital threats.

    MODULE 4 – SOCIAL MEDIA AND ONLINE NETWORKING

    This module explores the world of social networking, including types of social media platforms, social media monitoring, the role of hashtags, and viral content in online interactions. You will learn about the need to protect your personal information in digital spaces, the challenges involved, and the potential shortcomings associated with online social networking. You will become aware of the potential risks and benefits of these platforms, which are a must in today’s interconnected world.

    MODULE 5 – SOCIAL MEDIA SECURITY, CONTENT MODERATION, AND CASE STUDIES

    In this module, you will learn about social media security issues, awareness about potential threats, processes of flagging and reporting inappropriate content, and users’ role in maintaining a safe online environment. This module also covers laws related to posting inappropriate content on social media platforms, along with best practices that can be implemented for secure use of social media. It also includes a few real-world case studies with insights about challenges and resolutions in this field.

    MODULE 6 – E-COMMERCE AND ONLINE TRANSACTIONS SECURITY

    In this module, you will gain an understanding of eCommerce fundamental concepts, its main components, elements of eCommerce security, and measures to protect digital transactions and sensitive information. You will also learn about eCommerce threats and vulnerabilities in the digital marketplace. Also, you will gain insights about the best eCommerce security practices that equip individuals and organizations alike with how to safely carry out online transactions.

    MODULE 7 – DIGITAL PAYMENTS SECURITY AND LEGAL FRAMEWORK

    This module covers an introduction to digital payments, its significance in the modern era, components of digital payment systems, different modes of digital payments, and digital payment-related frauds and preventive measures. You will learn about the Reserve Bank of India's (RBI) guidelines on digital payments and customer protection in unauthorized banking transactions, along with relevant provisions of the Payment Settlement Act of 2007, to help you understand the legal framework governing digital payments in India.

    MODULE 8 – ENDPOINT AND MOBILE DEVICE SECURITY

    In this module, you will learn about the security of endpoint devices and mobile phones, password policies, the role of strong and secure passwords to protect sensitive information, the need to keep software and systems up to date, and data backup strategies to safeguard your devices from vulnerabilities. This module covers how to safely download and manage third-party software to reduce the risk of malware, along with guidelines to maintain endpoint device security.

    MODULE 9 – CYBERSECURITY BEST PRACTICES AND HOST SECURITY

    This module covers cybersecurity best practices, the significance of host firewalls and antivirus software, host firewall and antivirus program management and proper configuration, and Wi-Fi security measures to minimize the occurrence and effects of digital threats. You will also learn about the configuration of basic security policies and consent to access and protect sensitive data, which will help reduce vulnerabilities and enhance resilience.

    MODULE 10 – OPEN SOURCE INTELLIGENCE (OSINT) AND INTELLIGENCE LIFECYCLE

    In this module, you will learn about the intelligence lifecycle and its various stages, goals, capabilities, and limitations associated with open source intelligence (OSINT), techniques used in OSINT investigations to gather information from publicly available sources, and OSINT uses in legal and cyber security contexts. This module also covers ethical and legal standards to be followed while conducting OSINT investigations.

    MODULE 11 – OSINT SEARCH TECHNIQUES AND TOOLS

    This module covers effective use of web-based and proprietary open source search tools, practical skills in information retrieval, the importance of language understanding, and concepts like geo-tagging, global tagging, keywords, buzzwords, and specialized lingo that can influence search results. You will also learn about Boolean logic and algorithmic influences on query outcomes. You will be equipped with the skills to use these tools to extract relevant information for various investigative purposes.

    MODULE 12 – SOCIAL MEDIA RESEARCH AND USER DATA EXTRACTION

    In this module, you will learn how to conduct social media research, methodologies to extract valuable information or sensitive personal data from social media platforms, and social media uses and best practices from an investigative perspective. This module also covers ways to locate social data for specific individuals who have protected online profiles or do not have public social media accounts.

    MODULE 13 – METADATA MANAGEMENT, IMAGE & VIDEO ANALYSIS AND DARK WEB

    This module covers various types of metadata containing files and ways to access, modify, and delete metadata for digital forensic analysis. You will also learn to use reverse image search to find data like origin, alterations made, and geolocation associated with images and videos. It also covers methods to find an individual’s IP address or geolocation to trace online activities. You will also gain insights into the Dark Web concept, where illicit activities often take place.

  • What steps should I follow to enroll for this foundation certificate course?

    To enroll, click on the “Register for Course” option available on the right side of the screen, followed by the provided instructions and payment procedure.

  • Who is eligible to enroll in this foundation certificate course?

    12th (of any stream) pass or any graduate student can enroll in the foundation certificate course.

  • How will I receive confirmation once I have completed the payment procedure?

    Admission Confirmation email will be sent to your registered email ID once the payment is verified.

  • Are there any prerequisites for this foundation certificate course?

    In case of any prerequisites provided by the resource person, we will provide the students with prior information on their WhatsApp group.

  • Are there any live lectures provided in this foundation certificate course?

    Yes, live lectures will be conducted through Zoom.

  • How will I receive the session joining link?

    Enrolled students will receive the session joining link via WhatsApp group.

  • What will be the duration of the lecture?

    The duration of each lecture will be 1 hour and 15 minutes of discussion.

  • Will I get the recorded lectures?

    Yes, recorded lectures will be provided through your portal.

  • Can the study materials be accessed at any time?

    All the course material will be available on the portal. Hence, you can access it 24/7 and study at your own pace.

  • What are the benefits of completing this foundation certificate course?

    Completing the Online Foundation Certificate Course will equip you with the essential knowledge and skills required for entry-level positions. It can also serve as a strong foundation for further education or career advancement in forensic science.

  • Is there a certificate awarded upon completion of the foundation certificate course?

    Yes, upon successful completion of the foundation certificate course, you will receive an eCertificate, which can be a valuable addition to your resume and may enhance your career prospects in the field.

  • Where to contact in case of any queries?

    Write to us at education@sifs.in, call: +91-1147074263, or WhatsApp: +91-7303913002.  

  • Is a refund available after payment and registration?

    Kindly go through the syllabus and curriculum of the course carefully. No refund is possible once the payment is made.

Larry J. Thomas vs. State of Indiana Case Study

Larry J. Thomas was found accountable in 2016 for the murder of Rito Llamas-Juarez during his attempt to rob. Though eyewitnesses present confirmed his presence at the crime scene, solid evidence was still required to convict him. To strengthen the case against him, digital forensic techniques were used.

During the investigation, the authorities took the content posted on the culprit’s Facebook account into consideration.

They found that he had been using a handle named “Slaughtaboi Larro” and had posted photos of himself carrying an assault rifle. The ammunition used in the murder case matched that of the weapon shown in Thomas’s online images. The photos were also used to match a bracelet found at the crime scene. Thomas had been wearing a similar bracelet in the pictures posted online. Consequently, Thomas was arrested and imprisoned.


Note: This is only a glimpse of one of a few case studies that we might cover. All case studies are subject to change as per current trends and developments, except a few famous ones from the past.

Preeti Shah

5

The Cyber Security and OSINT course is incredible! I gained an in-depth understanding of the field and what practical skills are needed to pursue a career in it, along with superb guidance from highly knowledgeable faculty. Highly recommended.

Aliya

5

All the techniques learned during this cyber security course are invaluable. A must for tech enthusiasts!

Himanshu

5

I am thankful to SIFS for conducting such courses. I learned a lot from real-world case studies. The course definitely opens your pathway to learning to protect the digital world.

Dr. N. Sayee Ganesh

5

SIFS India's Cyber Security and OSINT program is top-notch. Expert instructors, comprehensive content, and a bright future in cybersecurity

Ekta Pradhan

5

I had a thrilling experience with SIFS India! cyber security and OSINT course. I now feel ready to dive into the world of digital defense confidently.

 

Instructors

Nitin Pandey

Nitin Pandey

Technical Trainer, CyberPeace Foundation
Rakshit Tandon

Rakshit Tandon

Cyber Security Evangelist, Risk Advisory
Rohit Gautam

Rohit Gautam

Director, Hacktify Cyber Security
Shifa Cyclewala

Shifa Cyclewala

Director, Hacktify Cyber Security
Shubham Gautam

Shubham Gautam

Cybersecurity maestro

Preview this course

₹ 1770
Call for Assistance
7303913002

Ask Your Query

Enquiries from Forensic Learners


In the Cyber Security and OSINT course, you will learn a variety of topics, including threat analysis, digital footprint reduction, cyber crime investigation techniques, legal aspects, social media and e-commerce security, mobile device security, open source intelligence (OSINT) and intelligence lifecycle, OSINT search techniques and tools, image and video analysis, and dark web cyber security best practices, among others. Techniques like tracking online activity, conducting vulnerability assessments, and using advanced search tools to gather data are included along with real-life case studies.

By taking this course, you will gain knowledge of how to protect systems, analyze online threats, and conduct intelligence gathering using open-source tools. The course will boost your practical skills in the cyber security domain and threat analysis, making you a valuable asset to employers in the cyber security industry. Also, having a certificate upon completion will add credibility to your expertise and increase your chances of landing an entry-level job in the field, especially in roles like cyber security analyst, digital investigator, or OSINT researcher. To receive an industry-recognized e-certificate, you need to pass an online MCQ-based exam with a minimum of 40% marks.

The course start date, class timings, and cost will be updated on our website and also on social media pages, which you can follow for reference. The course runs for a month, comprising of live sessions of one hour duration scheduled at specific times by experts. You will receive login credentials upon enrolment to access our online study portal, where we upload all the recordings and study material. Also, the link to live sessions will be shared via email and in the WhatsApp group to which you will be added after enrolling.

If the registration deadline has passed, you can contact our course coordinator to check if they can make any exceptions for late enrolment. If you are allowed to enroll, you will get your login credentials to access our online study portal. There you will find recordings of all the previous sessions you missed and study material for reference. This material is view only and comes with lifetime access.

Yes, you can connect with instructors during the course for collaborative learning and feedback. You will get an opportunity to clarify your doubts at the end of each session. Though we do not provide assignments during the course, at the end there will be an online MCQ-based exam. You will also receive an industry-recognized e-certificate for which you need to score at least 40% marks.

Yes, the course covers the ethical and responsible use of OSINT, especially regarding privacy concerns. It discusses the ethical boundaries of collecting open-source intelligence, emphasizing the importance of following legal frameworks and respecting privacy rights. The course will also address the risks, such as unintentional data breaches or misuse of personal information, and outline strategies to mitigate these risks while maintaining integrity and accountability in your investigations.

Yes, in addition to the core curriculum, you will receive extra resources and reading materials for deeper learning on specific topics. These additional materials include recorded sessions, case studies, study material, and information about reference books. This material can be accessed through our online Study portal using your login credentials. These resources come with lifetime validity. To make the most of these resources, we advise you to read them alongside your sessions and practice applying what you have learned. This will help solidify your understanding and enhance your overall learning experience.

The course is designed to stay updated with the ever-changing field of cyber security, and the curriculum is regularly updated to meet the latest trends, tools, and technologies shaping the industry. You will get an overview of recent developments such as artificial intelligence in threat detection, cloud security, and the rise of cyber crime. Through case studies and real-world examples, you will also gain insights into how experts tackle evolving cyber threats.

This is a foundation course, so you cannot expect to land high-level job roles straight after completing it. You can start with entry-level positions and search for job roles that match your expertise through job boards and industry connections you made during the course. While specific job placement is not guaranteed, these resources are designed to boost your chances of securing a role in cyber security. You can also connect with industry professionals through webinars or alumni networks to get support for your job search.

The course curriculum is aligned with the latest trends in cyber security and OSINT and is regularly updated. The course also addresses the impact of modern cyber threats, such as ransomware, phishing, and deepfakes, and their implications for both investigators and organizations. You will also gain insights about the latest OSINT tools that are essential for gathering open-source intelligence in real-world investigations. This ensures that you are prepared to handle the most current challenges in the industry.

Be a Part of Revolutionized Learning

Our courses acknowledge comprehensive learning through synergistic sessions and also while staying rooted.

Need help?

Contact by WhatsApp

Hello SIFS INDIA