As the name suggests, Cyber Law encapsulates the legal issues related to use of the Internet. IT law covers mainly the digital information (including information security and electronic commerce) aspects and it has been described as "paper laws" for a "paperless environment". India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology) enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic contracts, recognition of electronic signatures. This is a modern legislation which makes acts like hacking, data theft, spreading of virus, identity theft, defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.
It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction.
Our course is specially designed to make the participant an expert of Cyber Law Fundamentals and Digital Forensics. This is made possible by discussing the in-depth concepts of computers and networks, Cyber-crime and Cyber Terrorism, the hacking techniques used by terrorist communities, encryption standards they use and other algorithms as well. Concepts of Internet Security, Digital Signature and Electronic Payment System, Digital Law, Law of Intellectual Property.
Cutting-edge techniques are used to demonstrate Investigative process and Media Analysis of various disk structures. Application analysis, report making, laws related to analysis of application, copyrights, publication measures and trademarks are discussed in sessions with the participants.
Copyright act, Trade and Merchandise Act, Patent Act, Domain Name Disputes and all other Important Case laws are included in our specially designed course. International Perspective on Cyber Law including the Cyber Laws of Major Countries, and their Electronic Signature Laws. Territorial jurisdiction, Extra Territorial jurisdiction, Cyber-Space jurisdiction and other principals are included in this course.
Module-1 Computer and networks
Computer networks is a worldwide, archival journal given that a publication vehicle for whole coverage of interest to those involved in the computer infrastructures networking area. In this module you will acquaint with the introduction to early computing machines, software, computer memory, basics of networks and internet, networks topology, types of networks, history of internet, concept of internet and web publications, cyber space, organisations of internet management and fundamentals of computers.
Electronic commerce or EC or e-commerce is the buying and selling of goods and facilities, or the transferring of funds or data, over an electronic networks, mainly the internet. Under this module, you will familiarize with the basic of e-commerce, types of e-commerce, its benefits and fundamentals of e-commerce.
Module-3 Cybercrimes and cyber terrorism
Cyber-crime is defined as crimes that are committed against persons with a criminal reason to intentionally harm the standing of the victim or effect physical or mental harm to the victim directly or indirectly, using recent telecommunication nets such as internet and mobile. It flattering more organized crime and established as a worldwide business. Module will introduce you to the cybercrimes and the categories of crime such as Cyber frauds, cyber thefts and cyber stacking, cyber terrorism, hacking, virus, trojans, worms etc.
Module-4 Internet security concept
Internet securities concepts is a graphic division of computer security specially related to the internet, frequently involving browser safety however also network safety on a more overall level as it smears to further applications or operating systems on an entire. It will comprises the internet securities, concept of security, firewalls and types, security products and biometrics.
Cryptography is a technique of keeping and spreading data in a specific method so that only those for whom it is envisioned can read and procedure it. The term is furthermost regularly related with scrambling plain text formerly back again called as decryption. Under this module, students would be taught about the introduction of cryptography, type of cryptography, cryptographic goals and Key and Key pair.
Module-6 Digital signatures and electronic payment system
Digital signature is mostly a way to confirm that an automatic document is reliable. Reliable means that you recognize who produced the text and you know that it has not been changed in any method since that person formed it. In this module, the students will be introduced with introduction to digital signatures and electronic signatures, technical issue of digital and electronic signature, recognition and authentication of digital and electronic signatures, and electronic payment system and taxation.
Module-7 Information technology act- 2000
IT Act 2000 is an act of the Indian parliament (No. 21 of 2000) informed on 17 Oct 2000. This IT act is existence opposed by save your voice movement and further civil societies organizations. It will introduce you to the various authorities under IT act and their powers, salient features of IT act – 2000, its definition, electronic record, digital signature authentication, electronic governance, penalties, offences, miscellaneous, impact on other related acts (amendments) such as amendments to Indian penal code, amendments to evidence act, amendments to bankers book evidence act and amendments to reserve bank of India act.
Module-8 Cyber and cyber crimes
Under this module, you will familiarize with the concept of cyber: space jurisdiction and other principal of jurisdiction, territorial jurisdiction, extra territorial jurisdiction, cyber – space jurisdiction, investigation of cyber-crime (technical issue) etc.
Module-9 Cyber law
Cyber-crimes can include criminal actions that are traditional in manner like thefting, frauds, forgeries, defamation, mischief etc., all of which are subjected to the IPC. The abuse of computer systems has moreover given birth to a range of new age crimes that are addressing by the IT Act, 2000. It will acquaint you to the cyber law: international perspective, electronic data interchange, EDI: concept and legal issues, UNCITRAL model law, electronic signature laws of major countries, cryptography laws and Cyber laws of major countries.
Module-10 Law of intellectual property
Law of intellectual property would be familiarize you to the cyber law act, copy right act, trade and merchandise act, patent act, domain name disputes, cyber-squatting and important case laws.
Module-11 Digital forensics and relate it to an investigative process
This module is framed to make the students understand what actually digital forensic is all about. This module would help students gather information and use of application of digital forensic investigation, introduction to legal issues, context, and digital forensics, media Analysis- disk structure, file systems (NTFS, EXT 2/3, HFS), and physical layer issues, analysis techniques- keyword searches, timelines, hidden data, application analysis, midterm, analysis of cell phones, PDAs, etc., binary code analysis (Guest lecturer: Alex Berry), evidence- collection, preservation, testimony, legal community panel, digital forensics and relate it to an investigative process, legal issues of preparing for and performing digital forensic analysis based on the investigator's position and duty, digital forensics tools and recognize the state of the practice and the gaps in technology, policy, and legal issues.
The evaluation process varies depending upon the course you enroll for, likewise: if you are enrolled for Certification, you will be allotted an assignment during the mid-session of the course, which you are deemed to complete within the month. Similar process is followed in Diploma. But in PG Diploma, after the completion of the assignment during the mid-sessions; a Project-work is assigned during the last quarter, which you have to complete in a month’s time.
The mode of examination will be online for the students enrolled either in online courses or in distance course. After the completion of the respective course duration, a username and password would be generated for all the enlisted students. The username and the password would be mailed to every student prior to the date allotted for the examination to be held, and accordingly they would be requested by the concerned authorities to check their mails, so that they could use the specified details in order to give their exams on our online examination portal on the allocated date and time.
Note: Every student will be given a username and password a month before the conducting of the exams for the demo-exams, so that they get to know every detail concerned with the online examination pattern.
The complete correction and evaluation takes about two weeks. After the evaluation process is finally done, the mark sheets and certificates are posted on to the postal address of every student, but only after verifying their postal addresses as mentioned on the submitted application forms. Therefore, the students are always requested to mention their correct and complete address on their application form, in order to avoid further confusion and disappointment.
Training is a decisive part to get a practical and professional knowledge. SIFS India provides an affluence training of Cyber Law and Digital Forensics. Training schedule is arranged to provide a sympathetic knowledge of cyber forensic investigation practices, case studies and so on.
This collaborative training session is designed for online and distance students. The practical training module comprising such topics-
Module-1: Computer and networks- During this training module you'll know the introduction to early computing machines, software, computer storage, basics of networks and net, networks topology, styles of networks, history of net, thought of net and World Wide Web, net publications, cyber area, and organisations of net management and fundamentals of computers.
Module-2: Internet security practice- Internet securities ideas could be a graphic division of pc security specially associated with the web, oft involving browser safety but conjointly network safety on additional overall level because it smears to more applications or operational systems on a whole. Training module will includes the web securities, thought of security, firewalls and kinds, security product and bioscience.
Module-3: Introduction to cryptography- Under this training module, you would be taught about the introduction of cryptography, type of cryptography, cryptographic goals and key and key pair. It will also familiarize you cover the all aspects of practical knowledge of cryptography.
Module-4: Digital signatures and electronic payment system- In practical training module, the students will be introduced with introduction to digital signatures and electronic signatures, technical issue of digital and electronic signature, recognition and authentication of digital and electronic signatures, and electronic payment system and taxation.
Module-5: Digital forensics and relate it to an investigative process- This module is framed to form the scholars perceive what truly digital forensic is all concerning. This module would facilitate students gather info and use of application of digital forensic investigation, introduction to legal problems, context, and digital forensics, media Analysis- disk structure, file systems (NTFS, EXT 2/3, HFS), and physical layer problems, analysis techniques- keyword searches, timelines, hidden knowledge, application analysis, midterm, analysis of cell phones, PDAs, etc., code analysis (Guest lecturer: Alex Berry), evidence- assortment, preservation, testimony, profession panel, digital forensics associate degreed relate it to an fact-finding method, legal problems with getting ready for and acting digital rhetorical analysis supported the investigator's position and duty, digital forensics tools and acknowledge the state of the apply and therefore the gaps in technology, policy, and legal problems.
DURATION OF TRAINING
The duration scheduled for the training is one month during the summer vacations.
ADVANTAGES OF TRAINING
>> The training session specially focusses to bring together online and distance students to enhance their knowledge.
>> Training will provide you the practical knowledge and opportunities to investigate the legal cases.
>> The training session of the course FSP 203 Cyber Law and Digital Forensics course familiarize you to brief knowledge of course in classroom assembly.
>> Online and distance students attend to plenary training session and case studies, and learn more about the Cyber Law and Digital Forensics.
>> Upon completing this training session, you should be able to develop your potential in an analytical manner.
FEE FOR TRAINING
The training would be payable for online and distance learning students. But they already being enrolled as students, therefore they can avail an add-on advantage of earning 15% scholarship on their respective course fee.
After the successful completion of one month training, a valedictory function is organized on the last day where students are distributed the certificate and a farewell treat is arranged for the students from the Organization.
Outline towards Cyber Law & Digital Forensics career paths
Now a days Forensic Science stands in a very broad manner with multiple sub-fields. Cyber Law & Digital Forensics is also one of the chief and gradually advancing sub-disciplines of Forensic Science, which offers a myriad career opportunities to the keen aspirants. After a thorough theoretical and practical sessions provided under this course, the student would be able to gain the capability of analyzing and assessing the application and utility of the respective subject in law enforcement cases.
Educational Qualification to set a career in Cyber Law & Digital Forensics
First level course of the Cyber Law & Digital Forensics is a Certification Programme. The advantage of this course is, any students can set their career in Cyber Law & Digital Forensics, if they have a keen interest in technicalities of computers and their use and misuse in the present computer world. In order to groom one’s carrier in this field, the aspiring students can also take one of the sub-field of the respective science as one of his subjects in his majors.
Students and professionals both can do Certification, Diploma Course and P.G. Diploma course offered in Cyber Law & Digital Forensics
Cyber Law & Digital Forensics
The students keen to groom their careers in this field have numerable options for them in various Government as well as Private Sectors. Other than these options, students also have opportunities into the corporate world as malpractices using computers has grown very rapidly these days in all the firms and companies, as the use of computers have become a requirement these days.
1. What is Cyber Law & Digital Forensics?
Cyber Law & Digital Forensics is defined as the application of the skills and techniques of cyber law and investigation in computer-related cases.
2. What is the course content of FSP 203?
In the course Cyber Law & Digital Forensics (FSP 203), students will be taught about all the investigative skills acquired to be a Digital Forensic Investigator. Course will introduce you to interactive training session and practicals on the scientific and technical methods involved in a sequential examination used in digital and computer related crime investigation.
For more details click on- http://www.sifs.in/prospectus/FSP-203-cyber-law-cyber-security.pdf
3. What is the course duration of Certificate, Diploma and PG Diploma courses?
All online and distance courses are divided into three certifications i.e. Certificate course for three months, Diploma course for six months and PG Diploma for one year.
4. What qualification is required to be eligible for the above-mentioned courses?
If you are looking for Certificate and Diploma courses, you must have completed your 10+2 or appearing in any discipline from Recognized Board/ School and for PG Diploma course graduation will be required. In the admission process, self-attested mark-sheets and certificates of the previous school/college and transfer certificate along with 2 passport size photographs will be required from the student.
5. Where can I register for distance or online education courses?
We provide online application form for all online or distance students. To download application, form click on- http://www.sifs.in/application-form.pdf
6. When will I receive my study materials, books etc.?
After the completion of your admission process and payment of fee, the students enrolled for online courses will receive a username and password to access e-library within 7-10 working days through mail on their mail id which is mentioned on the application form; whereas distance education students will receive hardcopy of related course materials on the mentioned address by courier or post within 15 working days.
7. What about exams and course credits?
In the last month of your course, we will conduct your online exam. All details regarding your exam will sent to you on the mail id provided by you and the course credits differs according to course code and divided into assignment, project and exam.
For more detail please click on- www.sifs.in/ims
8. How do I get my certificate/mark-sheet, when I have completed my exams?
You will receive your mark-sheet and certificate within a month on your mentioned address by courier or post.
9. What is the difference between online and distance education? Which is the best mode of education?
Both modes of education are good. The only difference between online and distance education is distance education students will get hardcopy material related to their course code, and so the distance learning students will pay Rs. 1000 more as compared to online education students. An extra amount is charged for distance learning students, as the postal charges are included in the course fee.
10. Where do I find out what courses are being offered distance or online?
We provide all information on the website- www.sifs.in
11. Although my degree is in an unrelated field of study, I have taken quite a few science courses. Am I eligible to apply?
Yes. You are eligible for this Cyber Law & Digital Forensics (FSP 203), if you have completed or if you are pursuing your 10+2 or graduation in any discipline from a Recognized Board/ School/ College. All you need is a keen interest to explore the limits.
12. What is the scope and career of forensic education and related courses?
Forensic Science offers a wide range of opportunity to the students aspiring to make their careers as Forensic Scientists and Investigators. With a sense of keen observation and the ability of seeing the unseen are a few traits that would promise the aspiring students to make a colorful career in the wonderful arena of Forensic.
13. Should I pay any extra fee for examination, study materials etc.?
No. Your course fee includes Study materials, Books, Notes, I-Card, Examination Fee. You are not required to pay any extra amount, but in some cases- additional taxes / fees may apply. If you are living out of India and interested in printed notes and books, then you have to pay shipping/postal charges extra. Summer training and practical sessions will be payable for online and distance students with 15% scholarship.
14. What will I get after joining distance course?
You will get User-id and password to access e-library within 7-10 working days. Study materials, notes and books related to your course and id-card will be sent on the address mentioned by you, either by courier or post within 15 working days.
15. How can I pay my course fee by credit card in USD?
Indian Students may use Universal Currency Converter from http://www.xe.com/ucc/ to pay fee in other currencies, or International students visit this link- http://www.sifs.in/onlinefee.php to check out the fee structure. You can pay your course fee from here- http://www.sifs.org.in/payment (Students enrolled for courses having course duration more than 6 months can pay their Course Fee in maximum two instalments, but Rs. 2000 will be charged extra.)
16. Why is training important?
Training is a vital part of online and distance students. It is intended to provide students with the opportunity to place theories into practicals. It is also very helpful to develop their skills that support professional life by preparing and encouraging them to apply their abilities and knowledge acquired through study in a work later on. So, even before the students complete their course they are trained to be job-ready, therefore increasing the student’s employment prospects.
17. Where can I apply the science of Cyber Law & Digital Forensics?
SIFS INDIA provides professional course Cyber Law & Digital Forensics (FSP 203) to acquire knowledge from the basics. There are numerous opportunities for the students enrolled in the course. A student can be appointed by any company to investigate the case related to the misuse of computer systems, data-theft etc.
18. How can a Cyber Law & Digital Forensic Investigator assist in legal proceedings?
The task of a Forensic Engineer is to acquaint and assist the court of law regarding the facts and related aspects by applying his technical skills in cases related to the misuse of digital and cyber-related evidences. He is liable to produce proper evidences and data before the court of law.
19. I am interested in a career in this field. Where do I start?
In order to initiate a career into this field, you should have a zeal and urge to learn the technical and investigative skills with a 4-year engineering degree. A certificate, diploma and PG diploma course would help you groom your knowledge theoretically as well as practically, thereby ensuring a safe and secure career.
20. What are the other specialized forensic science careers can be found outside the crime laboratory?
Other than working in the Crime Laboratory, you can also be appointed as a Cyber Law & Digital Forensic Investigator in Police Stations or you can also be appointed as an Investigator for the Mobile Forensic Laboratory. You can work as a Digital Forensic Investigator in any of the fields by your technical skills and expertise.
2000 Michelle Theer: E-mails document the conspiracy to murder her husband
On Dec. 17, 2000, John Diamond shot and killed Air Force Capt. Marty Theer. "There is no direct evidence, no eyewitness evidence. There is no physical evidence. There is no confusion," said Theer's attorney Daniel Pollitt after the conviction. But what prosecutors did have was 88,000 e-mails and instant messages on Theer's computer, including personal ads that Theer had written in 1999, web-mail that she had written in response to those ads, clear evidence of a sexual relationship between Theer and Diamond, and messages documenting the conspiracy to murder Theer's husband. Theer was found guilty on December 3, 2004 of murder and conspiracy and sentenced to life in prison.
All these courses are Online / Distance mode. Each student can access their course module by login our online study portal i.e.
Apart from above course details, there are some additional details of this course. More details can be get by clicking here such as-
1. Eligibility for the Admission
2. Admission Procedure
3. Examination Pattern
4. Grading System in Examination
5. Course Fee and Concession
6. Types of Certificates
7. Study Materials
For further Course details Click Here-->>
2443, Hudson Lane, Kingsway Camp, Delhi-09
Telephone: +91 11 47074263