Course Introduction

FSP 203 : Cyber Law & Digital Forensics

  • Course Outline
  • Curriculum
  • FAQ
  • Case Studies
  • Reviews

As the name suggests, Cyber Law encapsulates the legal issues related to use of the Internet. IT law covers mainly the digital information (including information security and electronic commerce) aspects and it has been described as "paper laws" for a "paperless environment". India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology) enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic contracts, recognition of electronic signatures. This is a modern legislation which makes acts like hacking, data theft, spreading of virus, identity theft, defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.


It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction.


Our course is specially designed to make the participant an expert of Cyber Law Fundamentals and Digital Forensics. This is made possible by discussing the in-depth concepts of computers and networks, Cyber-crime and Cyber Terrorism, the hacking techniques used by terrorist communities, encryption standards they use and other algorithms as well. Concepts of Internet Security, Digital Signature and Electronic Payment System, Digital Law, Law of Intellectual Property.


Cutting-edge techniques are used to demonstrate Investigative process and Media Analysis of various disk structures. Application analysis, report making, laws related to analysis of application, copyrights, publication measures and trademarks are discussed in sessions with the participants.


Copyright act, Trade and Merchandise Act, Patent Act, Domain Name Disputes and all other Important Case laws are included in our specially designed course. International Perspective on Cyber Law including the Cyber Laws of Major Countries, and their Electronic Signature Laws. Territorial jurisdiction, Extra Territorial jurisdiction, Cyber-Space jurisdiction and other principals are included in this course. 

  • Level I : Cyber Law & Digital Forensics

    MODULE 1 – COMPUTER AND NETWORKS

    Computer networks is a worldwide, archival journal given that a publication vehicle for whole coverage of interest to those involved in the computer infrastructures networking area. In this module you will acquaint with the introduction to early computing machines, software, computer memory, basics of networks and internet, networks topology, types of networks, history of internet, concept of internet and web publications, cyber space, and organisations of internet management and fundamentals of computers.

    MODULE 2 – CYBER CRIMES AND CYBER TERRORISM

    Cyber-crime is defined as crimes that are committed against persons with a criminal reason to intentionally harm the standing of the victim or effect physical or mental harm to the victim directly or indirectly, using recent telecommunication nets such as internet and mobile. It flattering more organized crime and established as a worldwide business. Module will introduce you to the cybercrimes and the categories of crime such as Cyber frauds, cyber thefts and cyber stacking, cyber terrorism, hacking, virus, trojans, worms etc.

    MODULE 3 – INTERNET SECURITY CONCEPT

    Internet securities concepts is a graphic division of computer security specially related to the internet, frequently involving browser safety however also network safety on a more overall level as it smears to further applications or operating systems on an entire. It will comprises the internet securities, concept of security, firewalls and types, security products and biometrics.

    MODULE 4 – DIGITAL SIGNATURES AND ELECTRONIC PAYMENT SYSTEM

    Digital signature is mostly a way to confirm that an automatic document is reliable. Reliable means that you recognize who produced the text and you know that it has not been changed in any method since that person formed it. In this module, the students will be introduced with introduction to digital signatures and electronic signatures, technical issue of digital and electronic signature, recognition and authentication of digital and electronic signatures, and electronic payment system and taxation.

    MODULE 5 – CYBER LAW

    Cyber-crimes can include criminal actions that are traditional in manner like thefting, frauds, forgeries, defamation, mischief etc., all of which are subjected to the IPC. The abuse of computer systems has moreover given birth to a range of new age crimes that are addressing by the IT Act, 2000. It will acquaint you to the cyber law: international perspective, electronic data interchange, EDI: concept and legal issues, UNCITRAL model law, electronic signature laws of major countries, cryptography laws and Cyber laws of major countries.

  • Level II : Cyber Law & Digital Forensics

    MODULE 1 – COMPUTER AND NETWORKS

    Computer networks is a worldwide, archival journal given that a publication vehicle for whole coverage of interest to those involved in the computer infrastructures networking area. In this module you will acquaint with the introduction to early computing machines, software, computer memory, basics of networks and internet, networks topology, types of networks, history of internet, concept of internet and web publications, cyber space, and organisations of internet management and fundamentals of computers.

    MODULE 2 – CYBER CRIMES AND CYBER TERRORISM

    Cyber-crime is defined as crimes that are committed against persons with a criminal reason to intentionally harm the standing of the victim or effect physical or mental harm to the victim directly or indirectly, using recent telecommunication nets such as internet and mobile. It flattering more organized crime and established as a worldwide business. Module will introduce you to the cybercrimes and the categories of crime such as Cyber frauds, cyber thefts and cyber stacking, cyber terrorism, hacking, virus, trojans, worms etc.

    MODULE 3 – INTERNET SECURITY CONCEPT

    Internet securities concepts is a graphic division of computer security specially related to the internet, frequently involving browser safety however also network safety on a more overall level as it smears to further applications or operating systems on an entire. It will comprises the internet securities, concept of security, firewalls and types, security products and biometrics.

    MODULE 4 – DIGITAL SIGNATURES AND ELECTRONIC PAYMENT SYSTEM

    Digital signature is mostly a way to confirm that an automatic document is reliable. Reliable means that you recognize who produced the text and you know that it has not been changed in any method since that person formed it. In this module, the students will be introduced with introduction to digital signatures and electronic signatures, technical issue of digital and electronic signature, recognition and authentication of digital and electronic signatures, and electronic payment system and taxation.

    MODULE 5 – INFORMATION TECHNOLOGY ACT- 2000

    IT Act 2000 is an act of the Indian parliament (No. 21 of 2000) informed on 17 Oct 2000. This IT act is existence opposed by save your voice movement and further civil societies organizations. It will introduce you to the various authorities under IT act and their powers, salient features of IT act – 2000, its definition, electronic record, digital signature authentication, electronic governance, penalties, offences, miscellaneous, impact on other related acts (amendments) such as amendments to Indian penal code, amendments to evidence act, amendments to bankers book evidence act and amendments to reserve bank of India act.

    MODULE 6 – CYBER LAW

    Cyber-crimes can include criminal actions that are traditional in manner like thefting, frauds, forgeries, defamation, mischief etc., all of which are subjected to the IPC. The abuse of computer systems has moreover given birth to a range of new age crimes that are addressing by the IT Act, 2000. It will acquaint you to the cyber law: international perspective, electronic data interchange, EDI: concept and legal issues, UNCITRAL model law, electronic signature laws of major countries, cryptography laws and Cyber laws of major countries.

    MODULE 7 – DIGITAL FORENSICS AND RELATED INVESTIGATIVE PROCESS

    This module is framed to make the students understand what actually digital forensic is all about. This module would help students gather information and use of application of digital forensic investigation, introduction to legal issues, context, and digital forensics, media Analysis- disk structure, file systems (NTFS, EXT 2/3, HFS), and physical layer issues, analysis techniques- keyword searches, timelines, hidden data, application analysis, midterm, analysis of cell phones, PDAs, etc., binary code analysis (Guest lecturer: Alex Berry), evidence- collection, preservation, testimony, legal community panel, digital forensics and relate it to an investigative process, legal issues of preparing for and performing digital forensic analysis based on the investigator's position and duty, digital forensics tools and recognize the state of the practice and the gaps in technology, policy, and legal issues.

  • Level III : Cyber Law & Digital Forensics

    MODULE 1 – COMPUTER AND NETWORKS

    Computer networks is a worldwide, archival journal given that a publication vehicle for whole coverage of interest to those involved in the computer infrastructures networking area. In this module you will acquaint with the introduction to early computing machines, software, computer memory, basics of networks and internet, networks topology, types of networks, history of internet, concept of internet and web publications, cyber space, and organisations of internet management and fundamentals of computers.

    MODULE 2 – E-COMMERCE

    Electronic commerce or EC or e-commerce is the buying and selling of goods and facilities, or the transferring of funds or data, over an electronic networks, mainly the internet. Under this module, you will familiarize with the basic of e-commerce, types of e-commerce, its benefits and fundamentals of e-commerce.

    MODULE 3 – CYBER CRIMES AND CYBER TERRORISM

    Cyber-crime is defined as crimes that are committed against persons with a criminal reason to intentionally harm the standing of the victim or effect physical or mental harm to the victim directly or indirectly, using recent telecommunication nets such as internet and mobile. It flattering more organized crime and established as a worldwide business. Module will introduce you to the cybercrimes and the categories of crime such as Cyber frauds, cyber thefts and cyber stacking, cyber terrorism, hacking, virus, trojans, worms etc.

    MODULE 4 – INTERNET SECURITY CONCEPT

    Internet securities concepts is a graphic division of computer security specially related to the internet, frequently involving browser safety however also network safety on a more overall level as it smears to further applications or operating systems on an entire. It will comprises the internet securities, concept of security, firewalls and types, security products and biometrics.

    MODULE 5 – CRYPTOGRAPHY

    Cryptography is a technique of keeping and spreading data in a specific method so that only those for whom it is envisioned can read and procedure it. The term is furthermost regularly related with scrambling plain text formerly back again called as decryption. Under this module, students would be taught about the introduction of cryptography, type of cryptography, cryptographic goals and Key and Key pair.

    MODULE 6 – DIGITAL SIGNATURES AND ELECTRONIC PAYMENT SYSTEM

    Digital signature is mostly a way to confirm that an automatic document is reliable. Reliable means that you recognize who produced the text and you know that it has not been changed in any method since that person formed it. In this module, the students will be introduced with introduction to digital signatures and electronic signatures, technical issue of digital and electronic signature, recognition and authentication of digital and electronic signatures, and electronic payment system and taxation.

    MODULE 7 – INFORMATION TECHNOLOGY ACT- 2000

    IT Act 2000 is an act of the Indian parliament (No. 21 of 2000) informed on 17 Oct 2000. This IT act is existence opposed by save your voice movement and further civil societies organizations. It will introduce you to the various authorities under IT act and their powers, salient features of IT act – 2000, its definition, electronic record, digital signature authentication, electronic governance, penalties, offences, miscellaneous, impact on other related acts (amendments) such as amendments to Indian penal code, amendments to evidence act, amendments to bankers book evidence act and amendments to reserve bank of India act.

    MODULE 8 – CYBER SPACE AND INVESTIGATION

    Under this module, you will familiarize with the concept of cyber: space jurisdiction and other principal of jurisdiction, territorial jurisdiction, extra territorial jurisdiction, cyber – space jurisdiction, investigation of cyber-crime (technical issue) etc.

    MODULE 9 – CYBER LAW

    Cyber-crimes can include criminal actions that are traditional in manner like thefting, frauds, forgeries, defamation, mischief etc., all of which are subjected to the IPC. The abuse of computer systems has moreover given birth to a range of new age crimes that are addressing by the IT Act, 2000. It will acquaint you to the cyber law: international perspective, electronic data interchange, EDI: concept and legal issues, UNCITRAL model law, electronic signature laws of major countries, cryptography laws and Cyber laws of major countries.

    MODULE 10 – LAW OF INTELLECTUAL PROPERTY

    Law of intellectual property would be familiarize you to the cyber law act, copy right act, trade and merchandise act, patent act, domain name disputes, cyber-squatting and important case laws.

    MODULE 11 – DIGITAL FORENSICS AND RELATED INVESTIGATIVE PROCESS

    This module is framed to make the students understand what actually digital forensic is all about. This module would help students gather information and use of application of digital forensic investigation, introduction to legal issues, context, and digital forensics, media Analysis- disk structure, file systems (NTFS, EXT 2/3, HFS), and physical layer issues, analysis techniques- keyword searches, timelines, hidden data, application analysis, midterm, analysis of cell phones, PDAs, etc., binary code analysis (Guest lecturer: Alex Berry), evidence- collection, preservation, testimony, legal community panel, digital forensics and relate it to an investigative process, legal issues of preparing for and performing digital forensic analysis based on the investigator's position and duty, digital forensics tools and recognize the state of the practice and the gaps in technology, policy, and legal issues.

  • What is Cyber Law & Digital Forensics?

    Cyber Law & Digital Forensics is defined as the application of the skills and techniques of cyber law and investigation in computer-related cases. It is multidisciplinary in nature and includes data retrieval from digital evidences and legal reforms applicable to the evidence in the court of law.

  • How can I become a Cyber Expert?

    The insights would be provided to the learner through the course designed with professional guidance. These would give the learner a clear insight from the basic to the required expertise for handling and analysing the digital evidence. They are made to absorb the legal challenges that Experts face in the court of law.

  • What are the responsibilities of a Cyber Expert?

    Experts are responsible for handling the cyber crimes and the digital evidence. They perform duties like data collection, formatted disk and data recovery, evidence recovery and application of the skills into the court of law for admissibility of the evidence. 

  • What are the scope and the opportunistic aspects of the course?

    The learners keen to groom their careers in this field can work in various Government as well as Private Sectors. They also have opportunities into the corporate world as malpractices using computers has grown very rapidly now days.

  • Where can I contact in case of any queries?

    You can write to us at education@sifs.in or call us at +91-1147074263 or WhatsApp us +91-7303913002 or +91-7303913003.


2000 Michelle Theer: E-mails document the conspiracy to murder her husband

On Dec. 17, 2000, John Diamond shot and killed Air Force Capt. Marty Theer. "There is no direct evidence, no eyewitness evidence. There is no physical evidence. There is no confusion," said Theer's attorney Daniel Pollitt after the conviction. But what prosecutors did have was 88,000 e-mails and instant messages on Theer's computer, including personal ads that Theer had written in 1999, web-mail that she had written in response to those ads, clear evidence of a sexual relationship between Theer and Diamond, and messages documenting the conspiracy to murder Theer's husband. Theer was found guilty on December 3, 2004 of murder and conspiracy and sentenced to life in prison.

Adwaith Ram

5

The online course offered by Sifs was really good and was Informative. Looking forward to attend such quality courses.

Anamika Verghese

5

This course was incredibly interesting and Specifically, I appreciate our instructor's, ability to maintain the progression of a discussion overthe course of the class.
Thank you Sir and all others for your valuable time and effort.

Callistus Izunna Iheme

4

Memorable Experience

Mahesh Chavan

4

I learned basic things from this course.

 

Instructors

Vaishnavi Thakre

Vaishnavi Thakre

Forensic Expert

Preview this course

Select Course Level
Call for Assistance
7303913002

Be a Part of Revolutionized Learning

Our courses acknowledge comprehensive learning through synergistic sessions and also while staying rooted.