Course Introduction

FCC 5 : Cyber Security and OSINT

  • Course Outline
  • Curriculum
  • FAQ
  • Case Studies
  • Reviews

Course Start Date        : 2nd May 2025

Last Date to Register : 25th Apr 2025

Cyber security is the process of securing digital devices, networks, servers, and data from unethical online attacks. The online Cyber Security & OSINT Foundation Certificate Course by Sherlock Institute of Forensic Science (SIFS India) will help you gain knowledge about several online privacy protection techniques you can implement to protect yourself from ever-growing digital world crimes.

Over the month, you will learn internet security basics along with several case studies and digital threat detection techniques. The curriculum is regularly updated as per the latest industry trends and requirements and is taught by cyber security experts and researchers constantly working to devise new methods of online security. You will learn cyberspace architecture, types of cyber crimes, IT acts, social media platforms monitoring, eCommerce threats, digital payment frauds, data back up, device security, how to collect publicly available data and analyze it for any malicious content that can harm the online security of individuals, organizations, or even countries. along with several other crucial cyber security aspects.

In this era of digitalization, the scope of this field can never go down and is emerging as the most lucrative field of study. However, globally, there is a huge gap between the current number of skilled cyber security experts and what is actually needed. To fill this demand and supply gap, we would like you to enroll in this web-based cyber security course and begin your journey to protect society from such threats.

Become Proficient to Answer:

- What is cyberspace architecture, how does it relate to the internet infrastructure and governance of data transfer, and what are the cyber security challenges?

- What are the various types of cybercrimes, including those targeting computers and mobile devices, and what are the modus operandi of cybercriminals?

- What are the steps to report cybercrimes, and what role does the IT Act 2000 play in addressing cybercrime in India?

- What are the different types of social media platforms and the challenges and opportunities presented by online social networks?

- How can security issues like inappropriate content and privacy concerns related to social media be addressed in accordance with the legal system?

- What are the main components and elements of e-commerce security and the threats faced by this industry?

- What are the various modes, common frauds, preventive measures, and RBI guidelines related to digital payments?

- What are the security measures and policies for endpoint devices and mobile phones, including password policies, data backup, and device security?

- What are the best cyber security practices, including the significance of host firewalls, antivirus software, and Wi-Fi security?

- What are the goals, capabilities, and limitations associated with open-source intelligence (OSINT) investigations?

- How do you use web-based and proprietary open-source search tools to conduct investigations?

- How can social media research be conducted effectively to obtain and utilize sensitive personal data in investigations?

- What is metadata in files, and how can it be accessed, modified, or deleted for investigative purposes?

Learning Outcomes:

Understanding Cyber Security Fundamentals: After completing this course, you will have a strong understanding of the basic cyber security principles, including the identification of common threats and their preventive measures.

Effective Network and OS Security: You will learn how to implement security measures to protect computer networks and operating systems, thereby minimizing the risk of cyberattacks and unauthorized access.

Proficiency in OSINT Techniques: You will gain an understanding of using tools and techniques for gathering publicly available information from different sources for security and investigative purposes.

Ethical Hacking and Vulnerability Assessment: You will become aware of the difference between ethical and unethical hacking and learn ways to address security weaknesses in systems and applications.

Practical Application of Knowledge: You will become proficient in applying your cyber security and OSINT knowledge in real-world scenarios and making decisions to protect yourself from cyber threats.

Course Details:


National: 1770 INR (1500 INR + 18% GST)

International: 50 USD 


1 Month


12th Passed

Session Timing

From 6 to 7 PM IST  | Monday, Wednesday, Friday

Payment Details:

International Student : PayPal:

Account Details for National Student

Bank Name  - ICICI BANK
Acc. Name    - SIFS INDIA PVT. LTD.
Account No. - 663505500086
Type         - Current
IFSC Code    -   ICIC0000160
Address         - ICICI Bank, H-4, Model Town -III, New Delhi - 110009

  • Curriculum


    In this module, you will learn the basics of cyberspace and computer web technology, as well as the storage and transmission of digital information across networks. This module also covers internet infrastructure, data transfer and governance, and the cyberspace regulatory framework. You will be introduced to cyber security, its role in safeguarding digital assets, the challenges involved, and the need for strong protection against cyber threats in the digital era.


    This module covers an in-depth understanding of cybercrime classifications, crimes targeting computers and mobile devices, cybercrimes against women and children, financial frauds, malware and ransomware attacks, and social engineering attacks. You will also learn about advanced cyber threats, like zero-day and zero-click attacks. This module also covers the modus operandi of cybercriminals, with insights about their techniques and strategies.


    In this module, you will gain knowledge about cybercrime reporting along with measures to minimize the impact of cyber attacks and protect digital assets. You will gain insights about the Information Technology Act of 2000 and its subsequent amendments that govern cybercrimes and offenses in India. This module also covers the role of organizations that handle cybercrime and cybersecurity matters in India and the resources available to combat digital threats.


    This module explores the world of social networking, including types of social media platforms, social media monitoring, the role of hashtags, and viral content in online interactions. You will learn about the need to protect your personal information in digital spaces, the challenges involved, and the potential shortcomings associated with online social networking. You will become aware of the potential risks and benefits of these platforms, which are a must in today’s interconnected world.


    In this module, you will learn about social media security issues, awareness about potential threats, processes of flagging and reporting inappropriate content, and users’ role in maintaining a safe online environment. This module also covers laws related to posting inappropriate content on social media platforms, along with best practices that can be implemented for secure use of social media. It also includes a few real-world case studies with insights about challenges and resolutions in this field.


    In this module, you will gain an understanding of eCommerce fundamental concepts, its main components, elements of eCommerce security, and measures to protect digital transactions and sensitive information. You will also learn about eCommerce threats and vulnerabilities in the digital marketplace. Also, you will gain insights about the best eCommerce security practices that equip individuals and organizations alike with how to safely carry out online transactions.


    This module covers an introduction to digital payments, its significance in the modern era, components of digital payment systems, different modes of digital payments, and digital payment-related frauds and preventive measures. You will learn about the Reserve Bank of India's (RBI) guidelines on digital payments and customer protection in unauthorized banking transactions, along with relevant provisions of the Payment Settlement Act of 2007, to help you understand the legal framework governing digital payments in India.


    In this module, you will learn about the security of endpoint devices and mobile phones, password policies, the role of strong and secure passwords to protect sensitive information, the need to keep software and systems up to date, and data backup strategies to safeguard your devices from vulnerabilities. This module covers how to safely download and manage third-party software to reduce the risk of malware, along with guidelines to maintain endpoint device security.


    This module covers cybersecurity best practices, the significance of host firewalls and antivirus software, host firewall and antivirus program management and proper configuration, and Wi-Fi security measures to minimize the occurrence and effects of digital threats. You will also learn about the configuration of basic security policies and consent to access and protect sensitive data, which will help reduce vulnerabilities and enhance resilience.


    In this module, you will learn about the intelligence lifecycle and its various stages, goals, capabilities, and limitations associated with open source intelligence (OSINT), techniques used in OSINT investigations to gather information from publicly available sources, and OSINT uses in legal and cyber security contexts. This module also covers ethical and legal standards to be followed while conducting OSINT investigations.


    This module covers effective use of web-based and proprietary open source search tools, practical skills in information retrieval, the importance of language understanding, and concepts like geo-tagging, global tagging, keywords, buzzwords, and specialized lingo that can influence search results. You will also learn about Boolean logic and algorithmic influences on query outcomes. You will be equipped with the skills to use these tools to extract relevant information for various investigative purposes.


    In this module, you will learn how to conduct social media research, methodologies to extract valuable information or sensitive personal data from social media platforms, and social media uses and best practices from an investigative perspective. This module also covers ways to locate social data for specific individuals who have protected online profiles or do not have public social media accounts.


    This module covers various types of metadata containing files and ways to access, modify, and delete metadata for digital forensic analysis. You will also learn to use reverse image search to find data like origin, alterations made, and geolocation associated with images and videos. It also covers methods to find an individual’s IP address or geolocation to trace online activities. You will also gain insights into the Dark Web concept, where illicit activities often take place.

  • What steps should I follow to enroll for this foundation certificate course?

    To enroll, click on the “Register for Course” option available on the right side of the screen, followed by the provided instructions and payment procedure.

  • Who is eligible to enroll in this foundation certificate course?

    12th (of any stream) pass or any graduate student can enroll in the foundation certificate course.

  • How will I receive confirmation once I have completed the payment procedure?

    Admission Confirmation email will be sent to your registered email ID once the payment is verified.

  • Are there any prerequisites for this foundation certificate course?

    In case of any prerequisites provided by the resource person, we will provide the students with prior information on their WhatsApp group.

  • Are there any live lectures provided in this foundation certificate course?

    Yes, live lectures will be conducted through Zoom.

  • How will I receive the session joining link?

    Enrolled students will receive the session joining link via WhatsApp group.

  • What will be the duration of the lecture?

    The duration of each lecture will be 1 hour and 15 minutes of discussion.

  • Will I get the recorded lectures?

    Yes, recorded lectures will be provided through your portal.

  • Can the study materials be accessed at any time?

    All the course material will be available on the portal. Hence, you can access it 24/7 and study at your own pace.

  • What are the benefits of completing this foundation certificate course?

    Completing the Online Foundation Certificate Course will equip you with the essential knowledge and skills required for entry-level positions. It can also serve as a strong foundation for further education or career advancement in forensic science.

  • Is there a certificate awarded upon completion of the foundation certificate course?

    Yes, upon successful completion of the foundation certificate course, you will receive an eCertificate, which can be a valuable addition to your resume and may enhance your career prospects in the field.

  • Where to contact in case of any queries?

    Write to us at, call: +91-1147074263, or WhatsApp: +91-7303913002.  

  • Is a refund available after payment and registration?

    Kindly go through the syllabus and curriculum of the course carefully. No refund is possible once the payment is made.

Larry J. Thomas vs. State of Indiana Case Study

Larry J. Thomas was found accountable in 2016 for the murder of Rito Llamas-Juarez during his attempt to rob. Though eyewitnesses present confirmed his presence at the crime scene, solid evidence was still required to convict him. To strengthen the case against him, digital forensic techniques were used.

During the investigation, the authorities took the content posted on the culprit’s Facebook account into consideration.

They found that he had been using a handle named “Slaughtaboi Larro” and had posted photos of himself carrying an assault rifle. The ammunition used in the murder case matched that of the weapon shown in Thomas’s online images. The photos were also used to match a bracelet found at the crime scene. Thomas had been wearing a similar bracelet in the pictures posted online. Consequently, Thomas was arrested and imprisoned.

Note: This is only a glimpse of one of a few case studies that we might cover. All case studies are subject to change as per current trends and developments, except a few famous ones from the past.

Preeti Shah


The Cyber Security and OSINT course is incredible! I gained an in-depth understanding of the field and what practical skills are needed to pursue a career in it, along with superb guidance from highly knowledgeable faculty. Highly recommended.



All the techniques learned during this cyber security course are invaluable. A must for tech enthusiasts!



I am thankful to SIFS for conducting such courses. I learned a lot from real-world case studies. The course definitely opens your pathway to learning to protect the digital world.

Dr. N. Sayee Ganesh


SIFS India's Cyber Security and OSINT program is top-notch. Expert instructors, comprehensive content, and a bright future in cybersecurity

Ekta Pradhan


I had a thrilling experience with SIFS India! cyber security and OSINT course. I now feel ready to dive into the world of digital defense confidently.



Nitin Pandey

Nitin Pandey

Technical Trainer, CyberPeace Foundation
Rakshit Tandon

Rakshit Tandon

Cyber Security Evangelist, Risk Advisory
Rohit Gautam

Rohit Gautam

Director, Hacktify Cyber Security
Shifa Cyclewala

Shifa Cyclewala

Director, Hacktify Cyber Security

Preview this course

₹ 1770
Call for Assistance

Ask Your Query

Be a Part of Revolutionized Learning

Our courses acknowledge comprehensive learning through synergistic sessions and also while staying rooted.

Need help?

Contact by WhatsApp