Search in
Courses Providers, List Your Courses for FREE
Menu

ASCL Certified Digital Evidence Analyst


Asian School of Cyber Laws
Certificate

by Asian School of Cyber Laws


Pune, Mumbai, Panaji
Starting from:
INR 44,000
Per Course
(Plus 12.36% Tax)
Request Info
Subjects Covered & Categories
Basic Details
Level:Advanced
Eligibility:
(Pre-requisites)

Graduate in any discipline.

Medium of instruction:English
Overview, Content & Syllabus

Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled digital forensic investigators to contain this US $ 114 billion annual cost.

As per Ministry of Human Resources Development estimates - India needs 2.5 lakh cyber experts and professionals to effectively tackle cyber crimes. (Source: Times of India Feb 10, 2011).

 

"Taking into account the requirement emerging for protection of information technology infrastructure in the country as well as to serve the export market, a demand for 4.7 lakh cyber security professionals has been estimated by the year 2015."

- Minister of State for Communications and IT Milind Deora said in a written reply in Rajya Sabha on 30 November, 2012.

 

ASCL Certified Digital Evidence Analyst is an advanced level course in digital evidence analysis. Digital Evidence Analysis involves the collection, investigation and analysis of digital evidence.

 

This course is currently available in Digital Mode in 67 countries.

This course is available in classroom mode in India in Mumbai and Pune.

This course will equip you to:

  • Start your own consultancy

  • Independently investigate cyber cases

  • Assist law enforcement agencies

 

On successfully completing the course, you will receive 1 ASCL certification, namely -

  • ASCL Certified Digital Evidence Analyst

 

Additionally, you get the option to undertake -

4 week Industrial Training

Research Project

 

Digital Evidence Analysis Skills

1. A thorough understanding of the cyber crime investigation process including Cyber Investigation Essentials, Digital Evidence in Computer Devices, Cyber Forensics Essentials, Web Investigation, Investigating Emails, Cyber Crime Law in India and Cyber Investigation & Forensics Documentation.

2. A thorough understanding of the digital evidence analysis process including Applied Cyber Forensics, Investigating Server Logs, Investigating Financial Crimes, Investigating Encryption and Digital Signature Crimes, Password Forensics and Windows Forensics.

3. A thorough understanding of the investigation and forensic principles specified in internationally recognized digital forensic guides including:
(A) Good Practice Guide for Computer-Based Electronic Evidence by Assn of Chief Police Officers (ACPO), UK,
(B) Best Practices For Seizing Electronic Evidence by the United States Secret Service,
(C) Investigations Involving the Internet and Computer Networks by the US Department of Justice,
(D) Cyber Crime Investigation Manual by Asian School of Cyber Laws.

4. A thorough understanding of the provisions of the Information Technology Act relating to cyber crime, investigation and digital evidence.

5. Ability to analyze First Information Report (FIR), Property Search & Seizure Form and Final Form/ Report under the Code of Criminal Procedure.

6. Ability to follow, prepare and analyze relevant checklists and reports.

7. A thorough understanding of several digital forensic tools for live and non-live digital evidence analysis on the Windows platform.

8. A basic knowledge of financial concepts and instruments and ability to investigate financial crimes.

9. Ability to recover file and operating system passwords and work with hashes.

10.A thorough knowledge of digital forensics on the Windows platform including forensic analysis of the recycle bin, hiberfil.sys file, logs files, paging files, thumbs.db files and the registry.

 

Digital Evidence Analysis

Digital Evidence Analysis involves the collection, investigation and analysis of digital evidence.

This digital evidence may be found in computer hard disks, cell phones, ipods, pen drives, digital cameras, CDs, DVDs, floppies, computer networks, the Internet etc.

Digital evidence can be hidden in pictures (steganography), encrypted files, password protected files, deleted files, formatted hard disks, deleted emails, chat transcripts etc.

Digital evidence can relate to online banking frauds, online share trading fraud, source code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email hijacking, denial of service, hacking, divorce cases, murder cases, organized crime, terrorist operations, defamation, pornography, extortion, smuggling etc.

 

What does a Digital Evidence Analyst do?

  • Performs forensic analysis of digital information using standard computer forensics & evidence handling techniques.

  • Uses forensically sound procedures to identify network computer intrusion evidence and identifies perpetrators.

  • Employs forensic tools and techniques to identify and examine malicious files.

  • Employs forensic tools and techniques to crack file and system passwords.

  • Detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types.

  • Observes proper evidence custody and control procedures.

  • Documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports.

 

Course Topics

Internet Fundamentals

  • History of the Internet

  • How the Internet is managed

  • Architecture of the Internet

  • Basics of networking

  • IP Addresses, Packet Switching

  • Internet Routing, DNS, WWW

  • Internet Security Essentials

  • Website creation & hosting

  • Building an E-commerce Site

  • Major Open Source Projects

  • Important RFCs

 

Cyber Crime Essentials

  • Cyber Crime Terms

  • Timeline of cyber crime cases (1903 - 2012)

  • (In) famous cyber criminals

  • Indian cases of cyber crime

  • Cyber Crime Surveys

 

Cyber Investigation Essentials

  • What is Cyber Investigation?

  • Sample Cases

  • Cyber Investigation Process

  • Basic Terminology

  • Cyber Investigation Techniques

  • Real World Investigations

  • CERTs

  • Cyber Investigation Cells

  • Relevant Organizations

 

Digital Evidence in Computer Devices

  • What is Evidence?

  • What is Digital Evidence?

  • Order of Volatility of Digital Evidence

  • Digital Evidence & Hardware Devices

  • Digital Evidence & Data Storage Devices

  • Digital Evidence & Peripheral Devices

  • Digital Evidence & Other Devices

  • Collecting Digital Evidence

 

Cyber Forensics Essentials

  • The Forensic Process

  • Digital Forensic Analysis Methodology

  • File Systems

  • Operating Systems

  • File Extensions

  • Archive Formats

  • File Signatures

  • Using Data from Data Files

  • Data from Operating Systems

  • Data From Network Traffic

  • Data from Applications

  • Data from Multiple Sources

 

Applied Cyber Forensics

  • Forensic Imaging & Cloning

  • Mathematical Authentication of Digital Evidence

  • Media Sanitization

  • Analyzing Active Data

  • Analyzing Latent Data

  • Analyzing Archival Data

  • Analyzing JPEG files

  • Detecting pornography

  • Wireless Forensics

  • Network forensics

  • Database forensics

 

Web Investigation

  • Whois search

  • IP Tracking and Tracing

  • Investigating DNS records

  • Web Services Forensics

  • Investigation involving Web Sites

  • Investigations involving Instant Message Services & Chat Rooms

  • Investigations involving File Sharing Networks

  • Investigations involving Bulletin Boards & Newsgroups

 

Investigating Emails

  • History of Email

  • How Email Works

  • Email Clients

  • Email Security

  • Analyzing email headers

  • Tracking email accounts

  • Email Investigation Case Studies

 

Investigating Server Logs

  • Server hardware

  • Server operating systems

  • Types of servers

  • Configuring an FTP Server

  • Configuring a DNS Server

  • Configuring a Web Server

  • Analyzing FTP Server Logs

  • Analyzing Web Server Logs

  • Case Studies on Investigating Server Logs

 

Investigating Financial Crimes

  • Hackers for Hire

  • Online Share Trading Crimes

  • Online Banking Crimes

  • Online Payment Systems

  • Online Credit Card Fraud

  • Internet Scams and Frauds

  • Online Gambling

  • Tax evasion

  • Money Laundering & the World Wide Web

  • Case Studies

 

Investigating Encryption and Digital Signature Crimes

  • Symmetric Cryptography

  • Asymmetric Cryptography

  • Digital Signatures

  • File encryption

  • Disk encryption

  • Full disk encryption

  • Steganography

  • SSL

  • Email encryption

 

Cyber Crime Law in India

  • Computer viruses & malware

  • Cyber stalking

  • Cyber Terrorism

  • Data Privacy

  • Identity Theft, Phishing, Internet Scams, credit card frauds

  • Offensive emails & SMS

  • Hacking

  • Software & Music Piracy

  • Voyeurism

  • Investigation & Adjudication

 

Windows Forensics

  • Windows Disks, Files and Partitions

  • Windows Boot Sequence

  • Recycle bin forensics

  • Analyzing the hiberfil.sys file

  • Analyzing logs files

  • Paging files

  • Analyzing thumbs.db files

  • Registry Analysis

 

Cyber Investigation & Forensics Documentation

  • First Information Report

  • Property Search & Seizure Form

  • Final Form/ Report

  • Relevant checklists

  • Relevant reports

 

Password Forensics

  • Password Concepts

  • MS Office Passwords

  • Other File Passwords

  • Windows Passwords

  • Hashes

  • Case Studies on Password Forensics

 

List of Practicals

The practical issues covered in this course include:

Internet Fundamentals

  • Getting the detailed information about TCP/IP network protocol statistics

  • Displaying all connections and listening ports of a particular system

  • Finding out the IP address of the local computer being used for networking

  • Finding out the Port Number of the local computer being used for networking

  • Finding out the IP address of the remote host to which the socket is connected

  • Finding out the Port Number of the remote host to which the socket is connected

  • Finding out the state of TCP/UDP connection

  • Tracking the path of a packet being transferred from source to destination

  • Getting the details of a public IP Address

  • Getting the details of a domain name

 

Basic Cyber Forensics (Windows)

  • Mathematical authentication of a file

  • Mathematical authentication of a disk

  • Imaging a disk

  • Imaging a drive

  • Detecting File Extension mismatch

  • Cloning the RAM

  • Analyzing RAM to collect evidence

  • Cracking steganographic files

  • Recovering deleted data from a forensic image

 

Advanced Cyber Forensics (Windows)

  • Generating and analyzing the Address Resolution Protocol Cache entries

  • Generating and analyzing a list for the USB devices previously connected to a Windows system

  • Generating and analyzing the Boot.ini file settings

  • Generating and analyzing the list of all installed devices drivers and their properties

  • Generating and analyzing the list of event triggers

  • Generating and analyzing the list of executables involved in creating connections / listening ports

  • Generating and analyzing the list of all current file name extensions

  • Generating and analyzing the list of Group Policy settings and Resultant Set of Policy

  • Generating and analyzing the list of media access control address and list of network protocols associated with each network interface card

  • Generating and analyzing the list of full TCP/IP configuration for all adapters

  • Generating and analyzing the list of applications and services with their Process ID (PID) for all tasks running on the system

  • Generating and analyzing the list of active TCP connections / ports on which the computer is listening

  • Generating and analyzing the detailed configuration information about a computer and its operating system

  • Generating and analyzing the list of network adapters of a particular system

  • Generating and analyzing the list of list of all currently opened TCP/IP and UDP ports

  • Generating and analyzing the list of processes that are currently running on the system (hidden as well)

  • Analyzing the cache and history files of the computer's web browser

  • Generating and analyzing the list of all network resources on LAN

  • Searching for a file using its attributes as key search elements.

  • Using the MAC address of a computer to find out the vendor's details.

  • Revealing the passwords stored by browsers on a system

  • Generating and analyzing the list of all the installed drivers and services on the system

  • Analyzing the log files created by the Skype application

  • Finding out the details of incoming / outgoing calls, chat messages, and file transfers made by the specified Skype account

  • Finding out the list of all applications that are loaded when Windows boots.

  • Generating and analyzing the list of all the user profiles currently available in a system

  • Recovering deleted content from NTFS, FAT or FAT32 partitions

  • Keyword search analysis techniques such as fuzzy, phonic, wildcard, stemming and thesaurus search options.

  • Image Ballistics

  • Recovering "location" information from photos taken using Android phones

  • Recovering "location" information from photos taken using Apple phones

  • Recovering "location" information from photos taken using Blackberry phones

 

Investigating Emails

  • Analyzing Gmail headers

  • Analyzing Yahoo headers

  • Analyzing Rediff headers

  • Understanding security features and options in Gmail

  • Understanding security features and options in Yahoo

  • Email Tracking

  • Using the Hidden Web

  • Analyzing headers of emails received through the Hidden Web

 

Web Investigations

  • Tracking and tracing a particular IP

  • Searching for the details of a particular IP Address

  • Defacing a website

  • Analyzing a defaced web site

 

Investigating Encryption and Digital Signature Crime

  • Encrypting text using symmetric key cryptography

  • Encrypting a file using symmetric key cryptography

  • Defeating TEMPEST attacks

  • Generate an asymmetric public-private key pair

  • Analyzing a digital signature certificate

  • Encrypting text using asymmetric key cryptography

  • Encrypting a file using asymmetric key cryptography

  • Signing and verifying text using asymmetric key cryptography

  • Signing and verifying a document using asymmetric key cryptography

  • Splitting and rejoining an asymmetric key

  • Revoking an asymmetric key

  • Signing an asymmetric key

  • Creating an encrypted drive

  • Creating a secret partition within an encrypted drive

  • Encrypting the drive where windows is installed

  • Using steganography to append one file to another file

  • Using steganography to hide documents within a photo

  • Hiding data within blank spaces in a text file

 

Password Forensics

  • Scanning a Windows system for identifying password protected and encrypted files

  • Cracking passwords for camouflaged files

  • Cracking passwords for Microsoft Word files

  • Cracking passwords for Microsoft Excel files

  • Cracking passwords for zip archives

  • Cracking passwords for PDF files

  • Cracking passwords for Microsoft Outlook Accounts

  • Cracking passwords for Microsoft Outlook data files

  • Cracking passwords for Outlook Express Accounts and Identities

  • Recovering stored passwords

  • Cracking passwords for network connections

  • Cracking passwords for Remote Desktop connections

  • Resetting Windows XP administrator password

  • Recovering BitLocker encryption keys

  • Cracking PGP

  • Cracking Trucrypt

  • Generating and bashing MD5 hash values

 

Windows Registry Analysis

  • Ascertaining the list of most recently used files

  • Ascertaining the list of files recently used or executed using windows explorer

  • Ascertaining the list of URLs browsed on a specific system

  • Finding out the configuration for a Windows Paging file

  • Ascertaining the list of all the installed programs in a system

  • Ascertaining the list of all mounted devices on a system

  • Ascertaining the details for all mounted devices on a system

  • Ascertaining the list of all window services available on a system

  • Ascertaining the recent settings for all the network adapters

  • Ascertaining relevant information for a particular system gathered at runtime

  • Ascertaining information about registered applications on a specific system

  • Ascertaining keys for each active user loaded on the machine

  • Ascertaining information about hardware devices, including Plug and Play and network performance statistics.

  • Ascertaining the list of recently created documents

  • Ascertaining detailed information about the hardware of a specific system

 

Investigating Server Logs

  • Configuring an FTP server

  • Configuring a DNS server

  • Configuring a Web server

  • Analyzing FTP server logs

  • Analyzing Web server logs

 

All students are provided detailed presentations of the practical sessions, in case they are unable to attend the practical lab sessions.



Digital Mode (India)

  • This is open to residents of India.

  • Students are provided course ware and reference material in printed / digital form.

  • Contact classes are conducted at Pune and Mumbai.

  • Assessments consist of an online test.

  • You must obtain 50% in the online test to pass this course. Re-exam fees is Rs 1500.

  • You can take the online test from your home / office.

 

Digital Mode (International)

Algiers, Argentina, Australia, Austria, Bahrain, Belgium, Brazil, Bulgaria, Canada, Chile, China, Colombia, Cyprus, Czech Republic, Denmark, Egypt, Estonia, Finland, France, Germany, Greece, Hong Kong, Hungary, Hungary, Indonesia, Ireland, Italy, Japan, Jordan, Kenya, Korea, Lebanon, Luxembourg, Macau, Malaysia, Malta, Mexico, Morocco, Netherlands, New Zealand, Norway, Pakistan, Peru, Philippines, Poland, Portugal, Qatar, Romania, Russia, Saudi Arabia, Senegal, Singapore, Slovakia, South Africa, Spain, Sweden, Switzerland, Taiwan, Thailand, Tunisia, Turkey, UAE, UK, Ukraine, USA, Vietnam.

 

  • Students are provided course ware and reference material in digital form.

  • Contact classes are conducted in virtual mode.

  • Contact classes are also available through video conference facilities subject to additional fees.

  • Assessments consist of an online test.

  • You must obtain 50% in the online test to pass this course. Re-exam fees is US $ 50.

  • You can take the online test from your home / office.

Classroom Mode @ Mumbai

  • Students are provided course ware and reference material in printed / digital form.

  • Regular classes are conducted at our Churchgate Learning Center

  • Assessments consist of an online test.

  • You must obtain 50% in the online test to pass this course. Re-exam fees is Rs 1500.

  • You can take the online test from your home / office.

 

Admissions Procedure Digital Mode (India)

Paper based application

1. Download the Application form in PDF form.

2. Obtain a bank draft for the course fee favouring "ASCL Academy Private Limited" payable "Pune".

3. Send the filled-in application form, bank draft and relevant documents to:

Asian School of Cyber Laws
6th Floor, Pride Senate,
Behind Sigma House,
Senapati Bapat Road,
Pune - 411016.
India

 

Online application

Step 1: Before you begin

Make sure you have the following at hand:

1. Soft copy of a recent passport-size photo

2. Soft copy of any one document relating to proof of your identity (e.g. Driving license, passport, PAN Card, College ID card, Company ID card)

3. Soft copy of any one document relating to proof of your educational qualification (e.g. Marksheet, Degree)

4. If you have availed of a fee concession, soft copy of any one document relevant document (e.g. Declaration on official letter head, College ID card, etc)

Step 2: Fee Payment Options

A. Cheque

1. The cheque should be in favour of "ASCL Academy Private Limited".

2. The cheque should be payable "at par" in Pune. If not, please add Rs 150 for processing charges.

3. Once you have the cheque details, fill up the: online application form

B. Online Banking (NEFT)

Make the fee payment to:
Account Name: ASCL Academy Private Limited
Bank - AXIS BANK LTD.
Account Number: 315010200006842
IFSC Code: UTIB0000315

Once you have the Reference ID / Transaction ID, fill up the: online application form

C. Bank Draft

1. The bank draft should be in favour of "ASCL Academy Private Limited".

2. The bank draft should be payable at Pune.

3. Once you have the bank draft details, fill up the: online application form

 

Admissions Procedure (International)

Step 1: Before you begin

Make sure you have the following at hand:

  • Soft copy of a recent passport-size photo

  • Soft copy of any one document relating to proof of your identity (e.g. Driving license, passport, College ID card, Company ID card)

  • Soft copy of any one document relating to proof of your educational qualification (e.g. Marksheet, Degree)

  • If you have availed of a fee concession, soft copy of any one document relevant document (e.g. Declaration on official letter head, College ID card, etc)

Step 2: Fee Payment (SWIFT)

Make the fee payment to:
Account Name: ASCL Academy Private Limited
Bank - AXIS BANK LTD.
Account Number: 315010200006842
IFSC Code: UTIB0000315
SWIFT Code: AXISINBB315

Once you have the Reference ID / Transaction ID, fill up the: online application form

 

Admissions Procedure (Mumbai)

Step 1: Before you begin

Make sure you have the following at hand:

  • Soft copy of a recent passport-size photo

  • Soft copy of any one document relating to proof of your identity (e.g. Driving license, passport, PAN Card, College ID card, Company ID card)

  • Soft copy of any one document relating to proof of your educational qualification (e.g. Marksheet, Degree)

  • If you have availed of a fee concession, soft copy of any one document relevant document (e.g. Declaration on official letter head, College ID card, etc)

Step 2: Fee Payment Options

A.Cheque

1. The cheque should be in favour of "Data64 Technologies Private Limited".

2. The cheque should be payable "at par" in Mumbai. If not, please add Rs 150 for processing charges.

3. Once you have the cheque details, fill up the: online application form

B

B. Online Banking (NEFT)

Make the fee payment to:
Account Name: DATA64 TECHNOLOGIES PRIVATE LIMITED
Bank - AXIS BANK LTD.
Account Number: 911020059050660
IFSC Code: UTIB0000695

Once you have the Reference ID / Transaction ID, fill up the: online application form

C. Bank Draft

1. The bank draft should be in favour of "Data64 Technologies Private Limited".

2. The bank draft should be payable at Mumbai.

3. Once you have the bank draft details, fill up the: online application form

D. Cash

1. Currently cash payment is accepted only at our Churchgate, Mumbai office.

2. If you can pay cash at our Churchgate, Mumbai office, fill up the: online application form.

 

 

Fee Concessions for students resident in India

Fee payable by

Basic Fee (Rs.)

Service Tax (Rs.)

Total Fee Payable (Rs.)

Documentary Evidence

ASCL Certified Cyber Crime Investigators

36,000

4,450

40,450

Certificate of course completion

Students / alumni of other ASCL / Data64 courses

42,000

5,192

47,192

Certificate of course completion

Professionals working in the Physical Security or Cyber Security or Fraud Control domain in a corporate or Government department.

40,000

4,944

44,944

Declaration on official letter head

Serving / retired officers of the Indian police, military and other law enforcement agencies

40,000

4,944

44,944

Declaration on official letter head

Faculty or Students of Computer Engineering / Computer Science at the graduate or post graduate level e.g. B.E., B.Tech, B.Sc, BCA, M.E., M.Tech, M.Sc, MCA etc

40,000

4,944

44,944

College ID card

Others

44,000

5,439

49,439

-

Fee Concessions for students resident outside India

This is open to residents of 66 countries 

Algiers, Argentina, Australia, Austria, Bahrain, Belgium, Brazil, Bulgaria, Canada, Chile, China, Colombia, Cyprus, Czech Republic, Denmark, Egypt, Estonia, Finland, France, Germany, Greece, Hong Kong, Hungary, Hungary, Indonesia, Ireland, Italy, Japan, Jordan, Kenya, Korea, Lebanon, Luxembourg, Macau, Malaysia, Malta, Mexico, Morocco, Netherlands, New Zealand, Norway, Pakistan, Peru, Philippines, Poland, Portugal, Qatar, Romania, Russia, Saudi Arabia, Senegal, Singapore, Slovakia, South Africa, Spain, Sweden, Switzerland, Taiwan, Thailand, Tunisia, Turkey, UAE, UK, Ukraine, USA, Vietnam.

 

Fee payable by

Total Fee Payable (US$)

Documentary Evidence

ASCL Certified Cyber Crime Investigators

1,500

Certificate of course completion

Students / alumni of other ASCL / Data64 courses

1,700

Certificate of course completion

Professionals working in the Physical Security or Cyber Security or Fraud Control domain in a corporate or Government department.

1,600

Declaration on official letter head

Serving / retired officers of the police, military and other law enforcement agencies

1,600

Declaration on official letter head

Faculty or Students of Computer Engineering / Computer Science at the graduate or post graduate level e.g. B.E., B.Tech, B.Sc, BCA, M.E., M.Tech, M.Sc, MCA etc

1,600

College ID card

Others

1,800

-


Course Schedule & Price
Online
When Duration Where Remarks Price
1st April, 2013
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (India) Batch: DEA-D62 Course Date: 1... more INR 44,000
Per Course
(Plus 12.36% Tax)
1st July, 2013
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (India) Batch: DEA-D63 Course Date: 1... more INR 44,000
Per Course
(Plus 12.36% Tax)
1st October, 2013
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (India) Batch: DEA-D64 Course Date: 1... more INR 44,000
Per Course
(Plus 12.36% Tax)
1st January, 2014
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (India) Batch: DEA-D65 Course Date: 1... more INR 44,000
Per Course
(Plus 12.36% Tax)
1st April, 2014
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (India) Batch: DEA-D66 Course Date: 1... more INR 44,000
Per Course
(Plus 12.36% Tax)
Price Notes: Digital Mode (India) - Re-exam fees is Rs 1500.
Online
When Duration Where Remarks Price
1st April, 2013
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (International) Batch: DEA-G62 Course... more USD 1800
Per Course
(Taxes As Applicable)
1st July, 2013
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (International) Batch: DEA-G63 Course... more USD 1800
Per Course
(Taxes As Applicable)
1st October, 2013
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (International) Batch: DEA-G64 Course... more USD 1800
Per Course
(Taxes As Applicable)
1st January, 2014
No attendance for this course
1 Years
Study Online (on your computer) Digital Mode (International) Batch: DEA-G65 Course... more USD 1800
Per Course
(Taxes As Applicable)
Price Notes: Digital Mode (International) - Re-exam fees is US $ 50.
Classroom - Regular
When Duration Where Remarks Price
Not Specified Not Specified Churchgate, Mumbai (Branch) Not Specified INR 44,000
Per Course
(Plus 12.36% Tax)
Price Notes: Re-exam fees is Rs 1500.

Venues (Locations)
Pune, Senapati Bapat Marg (Head Office):- 6th Floor, Pride Kumar Senate, Behind Sigma House Senapati Bapat Marg, Pune - 411016, Maharashtra, India


Mumbai, Churchgate (Branch):- 7 Vaswani Mansions, Opp. H.R. College, Dinshaw Wachha Road Churchgate, Mumbai - 400020, Maharashtra, India


Panaji, Nevgi (Branch):- F2, Vistar Estates, Near Four Pillars Nevgi, Panaji - 403001, Goa, India


About Course Provider

Asian School of Cyber Laws


Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy Law in India.

Browse similar courses by category


Subscribe & get details about interesting courses & events free in your mail