• General

     Program on Cyber Investigation Management

    • Name: Cyber Investigation Management
    • Credits: 3 
    • Faculty: Dr.Muthukumaran
    • Mode: Online / Classroom
    • Level: Beginner / Intermediate 
    • Medium: English
    • Resources: Case Studies and Assignments
    • Prerequisite: Basic knowledge of Computer
    • Program Outline

      Investigation is an art by itself. It calls for a specific mindset. investigators, / forensic investigators, / cyber investigators  are the  professionals who work for detecting the attacks / attacks on the  computer system of an organization along with extracting the evidences  properly to report the crime to the higher authorities. They also help  in preventing the hacker attacks in future by auditing the system  thoroughly.

      The simple meaning of computer forensic is the application  of the techniques of computer investigation and analysis to determine  potential legal evidences for the safety of the computer system of the  organization in future. These evidences can be required to resolve a  number of computer related misuse or crimes along with theft or damage  of intellectual property, frauds and theft of trade secrets etc. In order to discover the data or recovering encrypted or deleted data or  information of damaged files from in the computer system of an organization these computer hacking forensic investigators use various  methods.

      The course in cyber Investigation management at ITMR  offers an interdisciplinary approach that combines criminal justice and cybersecurity. The course aims to provide participants with the required knowledge and skills to investigate cyber crime attacks. The course consists of various modules covering a wide range of topics and is ideally aligned with practical requirements. It promotes the development of skills through a combination of knowledge and applied learning.

      This course is a part of Professional Diploma in cyber investigation and law affiliated to Hindustan University. Please more information refer here. This is also offered as a stand alone course for highly focused aspirants.

      Mode of delivery:

      The course is offered in English.

      Code of conduct

      Ethical behavior is an important part of this course. Since some of the methods, codes and tools that will be discussed and experimented in the course can be very harmful, if abused, it is expected that students will behave in a responsible manner. In particular, always ask your local site administrator for permission before experimenting with security-related tools. In-class discussions of techniques for exploiting potential security threats and risks do not imply to use them! You will be sole responsible for any such violation.