Cyber Law Awareness Program

Note: This course is no longer available.
This page is maintained only for archival purposes.

We are already into the era of cyberspace, where boundaries, borders and territorial demarcations do not exist.

The traditional notions of distance and space have given way to more dynamic and modern ones, the implications of which have not been fully accepted.

Cyber laws are a result of this skeptical acceptance of cyberspace. Governments across the world are trying to bring some semblance of order to the chaotic world of cyberspace by enacting cyber laws.

The all-pervasive nature of cyber space necessarily demands that cyber law influence all other disciplines.

Hence cyber law encompasses commercial as well as criminal law and its influence continues to grow with each passing day.


  1. To give an overview of cyber law.
  2. To understand how cyber law deals with cyber crimes.
  3. To understand how cyber law ensures authentication in electronic commerce.
  4. To realize the importance of cyber law at all places.

Course Contents:

  1. Overview of Information Technology Law
  2. Digital Signatures
  3. Cyber Crimes

ASCL Certified Computer Forensics Professional

The latest version of this course is available at:

Computer forensics involves the preservation, identification, extraction and documentation of electronic evidence.

It is a relatively new science that becomes more important as criminals use computers progressively more in their illegal activities.

Computer forensic analysts assist law enforcement, prosecutors, and organizations by identifying, collecting, and documenting evidence consistent with legal guidelines for evidence collection procedures for possible use in a court of law.


  1. To understand basic issues involved in Computer Forensics
  2. To utilize different Computer Forensics tools and techniques.
  3. To learn the rules of Computer Forensics and understand the issues involved in collection and analysis of electronic evidence.
  4. To prepare proper documentation for successful prosecution of cyber crime.


Preliminary concepts

  • Overview of the forensic process
  • Legal and ethical implications of forensic analysis
  • Chain-of-custody

Computer forensic investigative techniques

  • Understanding File systems and other relevant operating system concepts
  • Obtaining and working on bit stream images
  • Mathematical authentication of data
  • Decrypting files and retrieving information from password protected files
  • Recovering deleted files and data

Presenting Electronic Evidence in Court This section examines the storage, preservation, documentation and presentation of electronic evidence in a court of law.