Applications are invited for Certificate Course On Cyber Security And Digital Forensics at IIIT Pune on 4 Dec 2023- 3 Jan 2024. The last date of registration is 30 September.

Course Overview

This course is aimed at training cybersecurity professionals in identifying and reporting the security bugs, especially those related to security exploits and vulnerabilities in a legal and ethical manner. The course allows one to upscale and pursue a career in challenging, adventurous and rewarding field of bug bounty research with hands on experience.

The proposed program is an Instructor-led program that covers essential training on cyber security and digital forensic investigation techniques. The course provides knowledge of real-world scenarios with hands-on experience on case studies to develop forensic skills.

The course delves into the concepts of forensic investigation, security, volatility framework, autopsy, scalpel, Nmap, DNS pharming, DoS attack, session high jacking, hashcat, etc. that are essential to become an advanced cybersecurity professional.

The proposed program is designed to equip students and professionals aspiring to start a technical career in cyber security. This is a technical skilling program, essential to launch a professional career in the exciting domain of Cyber Security and Digital Forensics.

Course Highlight

Course Modules

Module-1: Basics of Cyber Security

  • Security Goals: Confidentiality, integrity, and availability, 
  • Authentication, Authorization and, Auditing. 
  • Information security risk management.

Module-2: Basics of Networking

  • OSI/TCP
  • Networking devices and security equipments
  • Protocols
  • Subnetting and super netting
  • Cryptography and hashing

Module-3: Vulnerability Analysis Process, Tools and Techniques

  • Active & Passive Foot-printing, 
  • Protocol Analyzers and Port Scanners, 
  • OS Fingerprinting, 
  • Vulnerability Scanners.

Module-4: Malware and Static & Dynamic Analysis 

  • Social engineering 
  • Malicious logic, Trojan horses, viruses.
  • Boot sector and executable infectors.
  • Spyware, adware, and ransomware.

Module-5: Securing Linux System: Access Control mechanism 

  • Discretionary access control 
  • Mandatory access control
  • Role-based access control
  • Linux permission model
  • Shadow and password file

Module-6: Digital Forensics: Process, Tools & Techniques and Research Challenges 

  • Definition of Digital Forensics
  • Disk Drives and their characteristics
  • Understanding Hard Disk Partitions
  • Booting Process in different Operating Systems
  • Slack Space
  • Forensics Imaging 
  • Imaging using FTK Imager

Module-7: Understanding Hard Disks and File Systems (NTFS & Ext4)

  • Disk Drives and their characteristics 
  • Understanding Hard Disk Partitions Booting Process in different Operating Systems 
  • Slack Space 
  • Metadata in NTFS and Ext4 file systems 

Module-8: Data Acquisition: Imaging and Cloning 

  • Hashing and Write Blockers 
  • Forensics Imaging in Kali Linux using dd, dcfldd, dc3dd 
  • Imaging using FTK Imager 

Module-9: File Systems Analysis using TSK 

  • Analyzing disk images using TSK utilities

Module-10: Windows Forensics

  • Registry Forensics
  • Recycle Bin Forensics
  • Jump List Forensics
  • SRUDB.dat forensics
  • Prefetching in Windows
  • Program Executions Artifacts

Module-11: Anti-forensics and Anti-anti-forensics

  • Data Hiding into Slack Space
  • Secure Deletion 
  • Timestomping

Module-12: Volatile Memory Forensics

  • Why/What Memory Forensics
  • Volatility Configuration 
  • Volatility Analysis
  • Windows Memory Analysis

Module-13: Linux Forensics

  • Basic Linux Commands 
  • File Hierarchy Standard
  • Hunt Users and Groups
  • File Hunting
  • Failed logins and Actors IP address
  • Timestamps and Deleted files in Journal

Module-14: Email and Drone Forensics

  • Examining Email messages
  • Email Server Examination 
  • Tracing emails
  • Email Forensics Tools
  • Introduction to Drone forensics and challenges

Module-15: Password Recovery

  • Password Cracking Methods
  • Password Cracking Tools
  • Hashcat for Windows password cracking

Module-16: Mobile Forensics

  • Phone Locks and Discuss Rooting of Android 
  • Mobile Forensics Process 
  • Perform Logical Acquisition on Android 
  • Perform Physical Acquisition on Android
  • Mobile Forensics Challenges
  • CDR Analysis

Eligibility

  • UG/PG graduated students.
  • Ph.D. Scholars from higher education institutes.
  • Faculties / Staffs / Lab Instructors from technical and academic institutions.
  • Industry/working professionals seeking cyber security skills.
  • Any other Cyber Security enthusiasts.

Fees

Important dates

  • Application Open Date: 8th August, 2023
  • Application Closure Date: 30th Sept, 2023
  • Course Commencement: 4th Dec, 2023
  • Course End Date: 3rd Jan, 2024

Registration

Interested candidates can register online via this page.

Learning Outcomes

  • Proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks
  • Identify & Evaluate Information Security threats and vulnerabilities in Information Systems and apply security measures to real time scenarios
  • Identify common trade-offs and compromises that are made in the design and development process of Information Systems
  • Demonstrate the use of standards and cyber laws to enhance information security in the development process and infrastructure protection.

Clic khere to view the official notification of Certificate Course On Cyber Security And Digital Forensics at IIIT Pune.