UNIT 1:
Introduction to Cyber Crime.
Information Technology ACT 2000
Controlling And Preventing Cybercrime.
Legal Recognition of Electronic Records.
UNIT 2:
Regulating Certifying Authorities
Recognition of Foreign Authorities
License to Issue Electronic Signature Certificates
Penalty and Compensation for Damaging to Computer System
Compensation for Failure to Protect Data
License to Issue Electronic Signature Certificates
UNIT 3:
Interception & Monitoring of Electronic Communications
Tampering with Computer Source Documents
Tampering with Computer Source Documents
Punishment for Cyber Terrorism
Interception & Monitoring of Electronic Communications
UNIT 4:
Personal Jurisdiction in Cyberspace
Freedom of Expression and privacy in Cyberspace.
Cyber Crimes & Legal Framework Cyber Crimes against Individuals, Institution and State
Cyber Crimes & Legal Framework Cyber Crimes against Individuals, Institution and State
Governance of social media
UNIT 5:
Introduction to ethical hacking
Vulnerability scanning using NMAP and Nessus
Differences between a bug bounty and a client-initiated pentest
Ethical hacking tool: Burp Suite
Configuring Burp Suite-Setting up proxy listeners
Creating target scopes in Burp Suite.