Search in
Courses Providers, List Your Courses for FREE
Menu

Advanced Executive Program in Cyber Security, Audit & Compliance


Asian School of Cyber Laws
Training/Coaching/Tuition

by Asian School of Cyber Laws


Pune, Mumbai, Panaji
Request Info
Subjects Covered & Categories
Basic Details
Level:Advanced
Medium of instruction:English
Overview, Content & Syllabus

Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled cyber security professionals to contain this US $ 114 billion annual

cost. This advanced program prepares you for a career in Cyber Security.

The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment. This advanced program enables you to carry out Information Technology Act Compliance Audits.

 

This program is a combination of 3 programs:

  • Advanced Executive Program in Cyber Security

  • Advanced Executive Program in IT Act Audit & Compliance

  • ASCL Certified Digital Evidence Analyst

 

On admission, you will receive:

  • Courseware & reference material in printed form.

  • Courseware & reference material in electronic form.

  • 1 year access to the Data64 Digital Learning Platform.

 

On course completion, you will receive:

  • Cyber Security Professional Competency Card.

  • Enterprise Information Security Professional Competency Card.

  • Web security Professional Competency Card.

  • Information Technology Law Professional Competency Card.

  • Information Technology Act Audit & Compliance Professional Competency Card.

  • Information Security Standards Competency Card.

  • Cyber Crime Investigator Competency Card.

  • Digital Evidence Analyst Competency Card.

  • Web Investigator Competency Card.

  • Financial Cyber Crime Investigator Competency Card.

  • Windows Forensics Professional Competency Card.

  • Cyber Crime Law Competency Card.

  • Customized visiting cards.

  • Membership to Association of Digital Forensic Investigators

  • Limited license to use ASCL and Data64 logos.

 

On course completion, you will get 12 certifications:

  • Cyber Security Professional

  • Enterprise Information Security Professional

  • Web security Professional

  • Information Technology Law Professional

  • Information Technology Act Audit & Compliance Professional

  • Information Security Standards

  • Cyber Crime Investigator

  • Digital Evidence Analyst

  • Web Investigator

  • Financial Cyber Crime Investigator

  • Windows Forensics Professional

  • Cyber Crime Law

 

Cyber Security overview

Over the past decade, security attacks have become increasingly complex due, in part, to the emergence of an illegal black market around the personal information that can be obtained from businesses, governments and members of the public and a growing realization that valuable intellectual property can be stolen from IT systems.

 

"Cyber security is a rapidly growing market, with 90% of employers finding it hard to fill all positions." - The Guardian, UK

Some estimates put the global cost to business as high as $1 trillion.

"9772 websites with .in domains were defaced in 2010"

- Indian Computer Emergency Response team (CERT-In), Annual Report (2010)

 

Today, cyber security is a rapidly growing global issue and an ever increasing market. Adversaries range from small scale hackers to extensive communities of interest or activism, organised crime and foreign governments. All have access to very sophisticated technology and are focused on a specific goal.

As a result, cyber attacks can be very costly and dangerous - often becoming evident only once the information or data is already in the wrong hands. (Source: The Guardian, UK)

Cyber security is the activity of protecting information and information systems (networks, computers, data bases, data centers and applications) with appropriate procedural and technological security measures.

 

"America's economic prosperity in the 21st century will depend on cyber security." - President Barack Obama, May 2009

In that sense, the notion of cyber security is quite generic and encompasses all protection activities. (Source: National Cyber Security Policy, Govt. of India)

 

Role of cyber security professionals:

+ plan, coordinate, and implement the organization's information security,

+ educate users about cyber security,

+ install and manage security software,

+ monitor networks for security breaches,

+ respond to cyber attacks,

+ gather data and evidence to be used in prosecuting cyber crime.

 

IT Act Audit & Compliance Overview

The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates.

Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment.

 

The primary law for data privacy in India is the Information Technology (Reasonable security practices

and procedures and sensitive personal data or information) Rules, 2011 issued by the Central Government in exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act, 2000.

The data privacy rules define sensitive personal data or information to include passwords, financial information, physical, physiological and mental health condition, sexual orientation, medical records and history and biometric information.

Non-compliance with any of the provisions of the data privacy rules is penalized with a compensation / penalty of upto Rs. 25,000 under section 45 of the Information Technology Act.

Additionally, in some cases there may be liability under section 43A of the Information Technology Act.

Under the original Information Technology Act, 2000, compensation claims were restricted to Rs. 1 crore. Now claims upto Rs 5 crore are under the jurisdiction of Adjudicating Officers.

Claims above Rs 5 crore are under the jurisdiction of the relevant courts.

Additionally, in some cases there may be liability under section72A of the Information Technology Act. This section provides for imprisonment upto 3 years and / or fine upto Rs 5 lakh.

 

Some of the other relevant IT Act provisions are:

Legal Provisions

Penalties in case of non compliance

Section 69 of the Information Technology Act, 2000 read with Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.

7 years imprisonment and fine

Section 69A of the Information Technology Act,

2000 read with Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.

7 years imprisonment and fine

Section 69B of the Information Technology Act,

2000 read with Information Technology (Procedure and Safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009.

3 years imprisonment and fine

Section 70B of the Information Technology Act,

2000

1 year imprisonment and / or fine upto Rs 1 lakh

 

Advanced Executive Program in Cyber Security Syllabus

1. Conceptual Framework

  • Data64 Cyber Security Sphere

  • Cyber Security Terminology

  • Electronic Authentication

  • Selecting IT Security Products

  • Managing Risk from Information Systems

  • Information Security Testing and Assessment

 

2. End Point Security

  • Desktop and Laptop Security

  • Cell Phone and PDA Security

  • Bluetooth Security

  • Patch and Vulnerability Management

  • Password Management

  • Security for Full Virtualization Technologies

  • Media Sanitization

  • Securing Radio Frequency Identification (RFID) Systems

 

3. Network Security

  • Intrusion Detection & Prevention systems

  • Firewalls and Firewall Policy

  • Computer Security Log Management

  • Enterprise Telework and Remote Access Security

  • Securing WiMAX Wireless Communications

 

4. Web Security

  • Server Security

  • Electronic Mail Security

  • Securing Public Web Servers

  • Secure Deployment of IPv6

  • Secure Domain Name System (DNS) Deployment

  • SSL VPNs

  • Unified Threat Management

 

5. Application Security

  • Active Content and Mobile Code

  • Web Application Security

 

6. Data Protection

  • Data Encryption

  • Data Leakage Prevention

 

7. Digital Evidence Analysis

  • Internet Fundamentals

  • Cyber Crime Essentials

  • Cyber Investigation Essentials

  • Digital Evidence in Computer Devices

  • Cyber Forensics Essentials

  • Applied Cyber Forensics

  • Web Investigation

  • Investigating Emails

  • Investigating Server Logs

  • Investigating Financial Crimes

  • Investigating Encryption and Digital Signature Crimes

  • Cyber Crime Law in India

  • Cyber Investigation & Forensics Documentation

  • Password Forensics

  • Windows Forensics

 

IT Act Audit & Compliance

1. Information Technology Law

  • The Information Technology Legal Framework in India

  • Complying with the Indian Data Privacy Law

  • Liability of Intermediaries

  • Cyber Crime

  • Investigation of Cyber Crimes

  • Adjudication of Cyber Crimes

  • Digital Evidence

  • Complying with CERT and other reporting requirements

  • Technological Standards under the Information Technology Law

  • Liability of companies under the Information Technology Act

 

2. Information Security Standards

  • ISO 27001

  • ISO 18044

  • FIPS PUB 200

 

3. Information Technology Act Compliance

  • IT Act compliance for Banking, Finance & Insurance (BFI) Sector

  • IT Act compliance for e-Commerce Sector

  • IT Act compliance for Education Sector

  • IT Act compliance for Healthcare Sector

  • IT Act compliance for Hospitality Sector

  • IT Act compliance for Manufacturing Sector

  • IT Act compliance for Outsourcing Sector

  • IT Act compliance for Retail Sector

 

Digital Mode

Flexibility to study at your own pace. Assessments in the comfort of your home / office.

Step 1: We send you the printed and electronic course ware and reference material.

Step 2: You study the course ware and reference material.

Step 3: We conduct a contact class for you.

Step 4: We resolve your queries through email.

Step 5: You successfully take the online assessments.

Step 6: Congratulations!! You receive your certification, competency cards, customized visiting cards etc.

 

Intensive Professional Mode

Fast Track program for busy professionals. Intensive classroom and practical sessions

  • We send you printed & electronic course material

  • You study the course material

  • We conduct intensive classes for you

  • We resolve your queries through email

  • You take the assessments

  • Congrats

 

Before you enroll for a fast track program the first thing you should consider is your personal learning style because a fast track program requires commitment and dedication.

Learning a new skill at a rapid pace can sometimes be very difficult and intense. So, if you feel that you do not function well under pressure and require a more relaxed classroom-like environment then you should avoid the fast track mode.

However, if you are familiar with the topics and the concept and you are ready to learn at a rapid pace then this type of course may be perfect for you.

Last but not the least, before you enroll for a fast track program it is advisable to evaluate your own suitability for this type of learning environment.

 

Classroom Mode

  • Regular classroom sessions

  • Get to work on Live Projects

  • Special sessions on Presentation skills

  • Special sessions on Interview skills

  • Internship Support

  • Placement Support

 

Customized Mode

You choose the batch dates and timings. Customized Fast Track program for busy professionals.

Intensive classroom and practical sessions as per your convenience.

  • We send you printed & electronic course material

  • You study the course material

  • We conduct intensive classes for you

  • We resolve your queries through email and in class

  • You take the assessments

  • Congrats

 

Before you enroll for a customized fast track program the first thing you should consider is your personal learning style because a fast track program requires commitment and dedication.

Learning a new skill at a rapid pace can sometimes be very difficult and intense. So, if you feel that you do not function well under pressure and feel you require a more relaxed classroom like environment then you should avoid fast track course.

However, if you are familiar with the topics and the concept and you are ready to learn at a rapid pace then this type of course may be perfect for you.

Last but not the least before you enroll for a fast track program it is advisable to evaluate your own suitability for this type of learning environment.


Course Schedule & Price
Online
When Duration Where Remarks Price
Not Specified Not Specified Study Online (on your computer) Not Specified Price On Request
Classroom - Crash/Intensive
When Duration Where Remarks Price
Not Specified Not Specified All Venues Not Specified Price On Request
Classroom - Regular
When Duration Where Remarks Price
Not Specified Not Specified All Venues Not Specified Price On Request
Classroom - Crash/Intensive
When Duration Where Remarks Price
Not Specified Flexible Duration
Flexible Sessions
All Venues Not Specified Price On Request

Venues (Locations)
Pune, Senapati Bapat Marg (Head Office):- 6th Floor, Pride Kumar Senate, Behind Sigma House Senapati Bapat Marg, Pune - 411016, Maharashtra, India


Mumbai, Churchgate (Branch):- 7 Vaswani Mansions, Opp. H.R. College, Dinshaw Wachha Road Churchgate, Mumbai - 400020, Maharashtra, India


Panaji, Nevgi (Branch):- F2, Vistar Estates, Near Four Pillars Nevgi, Panaji - 403001, Goa, India


About Course Provider

Asian School of Cyber Laws


Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy Law in India.

Browse similar courses by category


Subscribe & get details about interesting courses & events free in your mail