Cyber Commando Training 2025 - Indian Cyber Crime Coordination Center
Document Details
Uploaded by SuperJasper7425
2025
Tags
Summary
This document outlines the Cyber Commando Training program for 2025, organized by the Indian Cyber Crime Coordination Center (I4C). The program aims to create a specialized force to address cyber threats. Important dates and procedures for nomination, screening test, and training are described within.
Full Transcript
MINISTRY OF HOME AFFAIRS INDIAN CYBER CRIME COORDINATION CENTER (I4C) Cyber Commando Training 2025 Indian Cyber Crime Coordination Center (I4C) 2 Cyber Commando Training 2025...
MINISTRY OF HOME AFFAIRS INDIAN CYBER CRIME COORDINATION CENTER (I4C) Cyber Commando Training 2025 Indian Cyber Crime Coordination Center (I4C) 2 Cyber Commando Training 2025 Table of Content 1. About I4C.............................................................................................................. 5 2. Cyber Commando................................................................................................ 5 a. Course Objectives....................................................................................... 5 b. Roles and Responsibilities.......................................................................... 6 c. Syllabus.......................................................................................................6 d. Field Visits................................................................................................... 7 3. Nomination For Cyber Commando.................................................................... 7 4. Screening Test......................................................................................................8 a. Exam Center............................................................................................... 8 b. List of Centres............................................................................................. 8 c. Admit Card................................................................................................ 10 d. Important Instructions for Screening Exam............................................... 10 e. Result Declaration..................................................................................... 11 5. Selection of Training Institute...........................................................................12 a. Center Allocation....................................................................................... 12 6. Commencement of Training..............................................................................12 a. Feedback.................................................................................................. 13 b. Final Assessment and Certification........................................................... 13 7. Contact Details................................................................................................... 13 8. Annexure I.......................................................................................................... 15 9. Annexure II......................................................................................................... 32 10. Annexure III........................................................................................................ 33 11. Annexure IV........................................................................................................ 35 12. Annexure V......................................................................................................... 37 13. Annexure VI........................................................................................................ 38 14. Annexure VII....................................................................................................... 39 3 Cyber Commando Training 2025 Important Dates at a Glance (Please refer to Information Brochure for details) S.No Events Date 1. Release of Information Brochure 22nd October 2024 2. Inviting Nomination for Cyber Commando 2025 22nd October 2024 3. Last date to send nominations by 10th November 2024 States/UTs/CAPFs 4. Release of Admit Cards First week of December 2025 5. Date Of Screening Exam 8nd December 2024 6. Result Declaration Last week of December 2024 7. Last Date to submit Annexure IV & Annexure V First Week of January 2025 8. Training Center Allocation Last Week of January 2025 9. Commencement of training February/March 2025 4 Cyber Commando Training 2025 About I4C The Ministry of Home Affairs has set up the Indian Cyber Crime Coordination Centre (l4C) to create an effective framework and ecosystem for prevention, detection, investigation and prosecution of cybercrime in a comprehensive and coordinated manner. National Cybercrime Training Centre (NCTC) , one of the verticals of I4C-MHA, is working towards imparting training for the Capacity Building of LEAs, Public Prosecutors and Judges in the field of Cybercrime. As per the recommendation of Hon’ble Prime Minister of India, I4C-MHA is working towards the Special Wing of suitably trained Cyber Commandos who would counter the threats of cyber security to safeguard the cyberspace. Cyber Commando Due to a series of cyberattacks during national events such as the G20 Summit (September 2023), Virtual G20 Leaders Summit (November 2023), and the Consecration Ceremony (January 2024), it has become evident that India faces increasingly sophisticated cyber threats from global hacker groups. State-sponsored threat actors and groups have actively targeted government and private websites, engaging in data breaches, ransomware attacks, impersonation, password attacks, website takedowns, and more. There is an urgent need for an agile and well-coordinated response to handle cyberattacks; the need for this force is inevitable. Course Objectives The six-month residential course for Cyber Commandos aims to equip participants with comprehensive knowledge and advanced skills in various aspects of cyber security. Trainees will benefit by gaining hands-on experience and advanced skills that are crucial in the evolving field of cyber security. They will be prepared to identify and mitigate cyber threats, manage security incidents, and implement robust security measures across various sectors. After completing the course, these trained professionals will be utilized in critical roles within government, military, and private 5 Cyber Commando Training 2025 sector organizations to strengthen cyber defenses, conduct security assessments, and respond to cyber incidents, thereby enhancing the overall security posture of their respective institutions. Roles and Responsibilities To effectively manage a computer security incident. All Incident Response (IR) team members must clearly understand their roles and responsibilities within the IR process. This will ensure: i) Efficient Coordination: Avoiding duplication of efforts and minimizing gaps in coverage. ii) Swift Response: Enabling a rapid and effective response to security incidents. iii) To be assigned roles and responsibilities according to the expertise developed during Incident Response, Securing ICT Infrastructure, and Digital forensics training. Cyber Commandos will be deemed to be a national resource. After training, the Commandos will go back to their parent organization. They should be assigned roles and responsibilities according to the expertise they have developed in cybercrime and cyber security. Under no condition can they be utilized for duties unrelated to duties as a Cyber-Commando. As a functional requirement, These Commandos may be requisitioned and deployed by I4C,MHA in consultation with respective parent organizations to attend to cyber incidents of National importance. Syllabus The course features a thoughtfully curated syllabus designed to address contemporary cyber security challenges and trends. The curriculum encompasses a comprehensive range of topics, from foundational IT and networking principles to advanced cyber 6 Cyber Commando Training 2025 security techniques such as threat hunting, digital forensics, and ransomware defense. It includes emerging technologies like IoT, 5G, blockchain, and cloud security, ensuring participants are well-versed in the latest advancements. The program integrates on-the-job hands-on training, practical exercises, real-world simulations, and field visits, providing participants with the opportunity to apply theoretical knowledge in practical scenarios. This forward-looking approach ensures that trainees develop the necessary skills to effectively combat modern cyber threats, making them invaluable assets to their organizations and preparing them to excel in the dynamic field of cyber security. The detailed syllabus is attached as ANNEXURE – I Field Visits Participants will undertake field visits to various strategic locations across India. These visits are designed to provide practical exposure and hands-on experience in real-world cyber security environments. Trainees will visit key cyber security installations, government agencies, tech companies, and industrial sites to observe and engage with operational technologies, network security infrastructures, and incident response mechanisms in action. These visits will enable participants to apply theoretical knowledge to practical scenarios, understand the complexities of cyber security implementation in different sectors, and network with industry professionals and experts, thereby enhancing their learning experience and preparing them for advanced roles in cyber Defense. Moreover, the travel and the accommodation expenditure during the field visits will be incurred by the training institute. Nomination For Cyber Commando In order to identify suitable serving personnel (all ranks) in the various police organizations of the States/UTs, CAPFs and CPOs with basic knowledge of computer networks and operating systems, nominations have been invited by I4C-MHA vide our letter number 22003/34/2023-I4C dated 22 October 2024 from the respective authorities. All States/UTs and central police organizations are requested to identify at least twenty candidates in your organization and send their details with Director, NCTC 7 Cyber Commando Training 2025 at [email protected] and mark copy to CEO, I4C-MHA at [email protected] in the format enclosed as Annexure - II by 24 November 2024. Also, it is requested that States/UTs, CAPFs and CPOs nominate one Nodal officer for cyber commandos in order to ensure better coordination. Officials interested in cyber commando training, can approach their respective authorities for inclusion of their names in the nomination list. I4C will strictly adhere to the received nomination list and will not add candidates other than those received through official channels. Upon receiving the nomination list, I4C Team will add all the nominated participants in a common group for timely and seamless communication throughout the training process. Screening Test A screening test will be conducted on 8 December 2024 for all the nominated candidates. The screening test will be conducted in consultation with IITs/IIITs/RRU and NFSU. It will be held for the duration of 1 Hours 30 minutes with 100 multiple choice questions and no negative marking will be marked for incorrect answers. The syllabus for the screening exam is attached as Annexure III. The pre-course material created by Rashtriya Raksha University (RRU) Gandhinagar for the preparation of cyber commando screening exam is attached as Annexure VII. Exam Center The exam will be conducted at 33 training centers across the country. This list may be further modified as per the number of nominations received. The list of 33 training centers is as follows: 8 Cyber Commando Training 2025 List of Centres State/UTs for concerned S.No Exam Centers exam centers 1 Delhi Campus Rohini, NFSU Delhi Computer Lab, Special Task Force, Gandhi Road, Dehradun, 2 Uttarakhand Uttarakhand 3 Police Lines Bharari, Shimla, Himachal Pradesh Himachal Pradesh 4 SKPA, Udhampur, UT of J&K Jammu 5 CID Hall, Srinagar Kashmir 6 Police Headquarters, Leh, UT of Ladakh Ladakh 7 Gandhinagar- NFSU Campus, Gujarat Gujarat 8 NFSU Campus, Ponda, Goa Goa 9 NFSU Campus, Agartala, Tripura Tripura State Cyber Forensic Training Centre, SCRB, SP Aizawl Office 10 Building, Treasury Square, Aizawl, Mizoram Mizoram Institute Of Forensic Science, 15 Maharashtra Madam Cama Road, Opposite UT of Dadar & Nagar Haveli 11 Golden Gate Hotel, Mumbai 32 and Daman & Diu 12 NFSU Campus, - Bhopal, Madhya Pradesh Madhya Pradesh Intelligence Training Academy, near RPA, Shastri Nagar, Jaipur, 13 Rajasthan Rajasthan 14 NFSU Campus, Guwahati, Assam Assam 15 PHQ, Kohima Nagaland 16 Gangtok Sikkim 17 NEPA, Shillong, Meghalaya Meghalaya 18 NFSU Campus, Imphal, Manipur Manipur 9 Cyber Commando Training 2025 Cybercrime Division, Criminal Investigation Department, Palace 19 Road, Bengaluru, Karnataka Karnataka 20 RRU Campus, Lucknow, Uttar Pradesh Uttar Pradesh 21 State Cyber Forensics cum Training Lab,Bihar, Patna Bihar 22 RRU Campus,Pasighat , Arunachal Pradesh Arunachal Pradesh 23 Insight Lab, Police Headquarters,Thiruvananthapuram, Kerala Kerala 24 District Training Center, Police Headquarter, Kavaratti, Lakshadweep UT of Lakshadweep RBVRR Telangana State Police Academy, Himayat Sagar, 25 Hyderabad 500091 Telangana Lecture Hall, 6th Battalion APSP, Mangalagiri - 520010 Andhra 26 Pradesh Andhra Pradesh Kendriya Vidyalaya,No. 18 Dr.Natesan Salai,Ashok Nagar 27 Chennai-83. Tamil Nadu 28 Cyber Lab, CID Complex , Aberdeen Bazaar, Port Blair, ANI Andaman & Nicobar Islands 29 Police Training School, Shanmugapuram, Gorimedu, Puducherry. Puducherry Haryana Punjab 30 RTC Police Lines, Sector-26, Chandigarh UT of Chandigarh 31 Cyber Complex 3rd floor, Bhubaneshwar, Odisha Odisha 32 Police Training School, Mana, Raipur, Chattisgarh Chhattisgarh CID Conference hall, CID Headquarters, Raja Rani Kothi, Doranda, Ranchi, Jharkhand 33 Pin- 834002 Jharkhand 34 Kolkata Police Law Institute West Bengal Admit Card The admit card for the screening test will be issued by the first week of December 2024. The States/UTs Police organizations will be allotted exam center at their respective State/UT whereas CAPFs and CPOs candidates will be allotted center at their current posting State/UT. 10 Cyber Commando Training 2025 Important Instructions for Screening Exam 1. The duration of the Screening Test is 1 Hour 30 Minutes. 2. The medium of examination will be English. 3. There will be 100 questions carrying one mark each and all questions will be mandatory. 4. All the questions will be Multi Choice Questions (MCQ) type. 5. The question will be asked from the given syllabus. 6. No negative marking for wrong answers shall be applicable as per the scheme of examination. 7. Candidates must reach the exam center 30 minutes before the scheduled time of the exam. No candidate will be allowed inside the exam hall after the commencement of examination 8. No electronic gadgets will be allowed inside the examination premises (like mobile phones, smart watches, bluetooth devices, calculators, tablets, etc.) 9. Candidates MUST bring the following documents on the day of examination at the test center. Candidates who will not bring these will not be allowed to sit for the examination. a. Print copy of Admit Card. b. One passport size photograph (same as uploaded on the Online Application Form) for pasting on the specific space in the Attendance Sheet at Centre during the examination. c. Any one of the authorized photo IDs (must be original, valid, and non-expired) – PAN card/ Driving License/ Voter ID/ Passport/ Aadhaar Card (With photograph)/E-Aadhaar with photograph/ Ration Card with photograph/ Bank Passbook with Photograph. d. A simple transparent Ball Point Pen. 10. No candidate is allowed to leave the exam hall before the completion of the allotted time of examination. 11 Cyber Commando Training 2025 Result Declaration The result for the screening exam will be declared by the last week of December 2024 and the same will be shared with the respective States/UTs, CAPFs and CPOs through proper official channels. After result declaration, a cut off marks will be announced by I4C -MHA and only candidates scoring marks above cutoff will undergo the training for Cyber Commando. Kindly Note: In case of similar marks, Official rank and Date of birth will be considered for screening test rank wise result. Selection of Training Institute To facilitate information about the training pathways, facilities and resources at training institutes, online sessions will be organized for the selected participants wherein, all the training institutes will give presentations covering the relevant information regarding the training process of Cyber Commandos. These sessions will further help the participants to select the training institutes more wisely and rationally based on the training facilities. Post these sessions an online preference form to select training institutes will be shared with the selected participants. The participants will have to mandatorily give preference in decreasing order for all the available institutes options. There will be no option to edit the preference form. Center Allocation The centers will be allocated on merit basis i.e candidates with higher rank will be given first preference during center allocation until the seats are available in the given institute. In case seats are not available in the institute of first preference, automatically the second preference institute will be allocated and likewise the process will continue for all the selected candidates. 12 Cyber Commando Training 2025 Commencement of Training Once the centers are allocated to all the selected participants, joining dates for each institute will be shared with the selected candidates. The candidates will be required to share the following 3 documents with I4C-MHA before joining the course: 1. Declaration for 5 years of Service (Annexure IV) 2. Non Objection Certificate from the department. (Annexure V) 3. Cytrain Certificates: (Annexure VI) (All nominated Cyber Commandos are required to complete the Basic Responder Track course as a prerequisite before joining the training program. This foundational training is essential to ensure that all participants have the necessary skills and knowledge to maximize their effectiveness during the advanced training sessions.) Individual Training institute wise groups will be further created with the selected participants which will be continuously monitored by the I4C Team. The institute will permit a maximum of six days of leave for the entire training tenure (except medical leave). I4C-MHA will regularly be informed of the leaves and attendance. I4C will maintain close liaison with the Cyber Commandos for continuous learning, knowledge upgradation, simulation exercises, and exposure to real incidents. Feedback An online form will be shared to collect feedback from the faculty regarding the trainee cyber commandos' performance, and likewise, feedback will be collected from the trainee cyber commandos regarding the faculty and training institute in order to ensure participants are administratively and academically comfortable during the course. The feedback will be collected on a monthly basis. 13 Cyber Commando Training 2025 Final Assessment and Certification The institutes will carry out assessment based on the training , and I4C-MHA will issue a joint certificate with the institute on successful completion of the training programme. Contact Details For any queries regarding Training of Cyber Commandos you can reach us at [email protected] 14 Cyber Commando Training 2025 Annexure I Cyber Commando Training Syllabus Instructor/ Module Topics Week Faculty Fundamentals of IT Introduction to Information Technology Overview of IT -- Definition and Significance Types of Software OS overview -- Basic Operations and file management Module - 1 Networking Basics -- Importance of Week 1 networking, Types of Networks -- LAN, WAN, etc. OSI and TCP/IP models Networking Protocols Fundamentals to Linux programming Introduction to Cybersecurity The evolving landscape of cybersecurity Overview of cybersecurity -- CIA Triad Types of Cyber Threats -- malware, phishing and social engineering, network attacks, insider threats Cybersecurity Principles -- Authentication & Authorization, encryption, etc. Module - 2 Types of cyber-attacks -- malware, phishing, DDoS, and social engineering Week 2 Basic security mechanisms -- password management, 2-F authentication, encryption, and access control 15 Cyber Commando Training 2025 Introduction to MITRE TTPs and cyber kill chain Discussion on real world cyber fraud and cybercrime cases IoT, Wireless and 5G Overview of IoT, Wireless Technologies and 5G IoT Architecture and Protocols - IoT architecture -IoT Protocols like MQTT, IPv6, etc. Wireless communication Principles IoT Devices and sensors Wireless communication standards and technologies Module - 3 - Wi-Fi standards Week 3 - Bluetooth and Zigbee Other Wireless Technologies 5G Technology and Architecture 5G Use Cases and Applications IoT security and Privacy IoT Data Management and Analytics Operational Technology & OT security Week 4 Fundamentals of OT and OT security Module - 4 Fundamentals of ICS -- including SCADA, DCS, and PLC Security challenges specific to OT environments Securing industrial communication protocols and data protection techniques 16 Cyber Commando Training 2025 Module Topics Week Instructor/ Faculty Cloud computing and Cloud security Week 5 Introduction to Cloud computing -Definition and characteristics of cloud computing -Benefits and challenges of cloud computing -Evolution of cloud computing Cloud service models -Infrastructure as a Service (IaaS) -Platform as a Service (PaaS) -Software as a Service (SaaS) Cloud Deployment Models -Public cloud, private cloud, and hybrid cloud Module - 5 Virtualization Technology -Role of virtualization in cloud computing -Hypervisors and virtual machines (VMs) Containerization -Docker and Kubernetes basics Identity and Access Management (IAM) Data Security in the Cloud -Data encryption -Data Privacy and compliance Cloud security services and Tools -- CASB Cloud Compliance and Governance 17 Cyber Commando Training 2025 Malware analysis Introduction to malware -Definition and types of malware -Common infection vectors and propagation techniques Malware analysis techniques -Static vs. Dynamic analysis techniques -Tools and environments for malware analysis Static Malware analysis -File format analysis (PE files, ELF files) Module - 6 Week 6 -Code analysis (disassembly, decompilation) -String analysis and identification of indicators of compromise (IOCs) Dynamic malware analysis -Sandboxing and virtualization -Behavioral analysis (API calls, network traffic analysis) -Memory forensics and runtime analysis Blockchain and Cryptocurrency Week 7 Introduction to blockchain technology -Definition of blockchain -Key concepts decentralized consensus, immutability, transparency -Evolution of blockchain technology and its significance Module - 7 Blockchain Fundamentals -Components of a blockchain: blocks, transactions, nodes -Types of blockchains: public, private, consortium -Cryptography basics in blockchain: hash functions, digital signatures 18 Cyber Commando Training 2025 Module Topics Week Instructor/ Faculty Cryptocurrency Basics -Introduction to cryptocurrencies -Understanding digital tokens and coins -Popular cryptocurrencies: Bitcoin, Ethereum, Ripple, etc. Blockchain Consensus Mechanisms -Proof of Work (PoW), Proof of Stake (PoS), Proof of Authority (PoA) -Comparison of consensus algorithms -Role of miners and validators in blockchain networks Blockchain Security -Security challenges in blockchain networks -51% attacks, double-spending attacks, and other threats -Best practices for securing blockchain applications Blockchain Development Platforms -Overview of blockchain development platforms (Ethereum, Hyperledger, etc.) -Setting up a blockchain development environment -Developing and deploying smart contracts Cryptocurrency Exchanges and Wallets -Functionality of cryptocurrency exchanges -Types of cryptocurrency wallets: hot wallets, cold wallets -Security considerations for cryptocurrency storage and transactions 19 Cyber Commando Training 2025 Regulatory and Ethical Considerations -Legal frameworks and regulations surrounding cryptocurrencies -Ethical implications of blockchain technology -Compliance and governance in blockchain projects GRC -- Governance, Risk Management, and Compliance Introduction to Governance, Risk Management, and Compliance (GRC) -Definition and principles of GRC -Importance of integrated GRC frameworks -Role of governance in organizational strategy Governance in Organizations -Corporate governance frameworks -Board responsibilities and oversight -Transparency and accountability in governance practices Risk Management Fundamentals Module - 8 -Understanding risks and their types Week 8 -Risk assessment methodologies (qualitative and quantitative) -Risk treatment strategies: mitigation, avoidance, acceptance, transfer Compliance Management -Regulatory compliance requirements -Compliance frameworks and standards (ISO 19600, GDPR, etc.) -Compliance monitoring and reporting 20 Cyber Commando Training 2025 Module Topics Week Instructor/ Faculty Legal Framework for Data Protection -Personal Data Protection Bill (PDPB) and its implications -Data privacy and confidentiality laws in India -Cross-border data transfers and regulatory compliance Cyber Security Standards and Best Practices -Cyber security frameworks (NIST Cybersecurity Framework, ISO 27001) -Implementing cyber security controls and measures -Incident response planning and management Cyber Risk Management -Identifying and assessing cyber risks -Cyber risk mitigation strategies -Cyber insurance and its role in risk management Cyber Defence Simulation Exercise Week 9-10 Module - 9 Advanced Cybersecurity Techniques Introduction to IDS/IPS -Definition, purpose, and objectives -Types of IDS: Network-based (NIDS) vs. Host-based (HIDS) -IPS capabilities and integration with IDS IDS/IPS Deployment and Operation -Placement within the network architecture -Signature-based vs. anomaly-based detection techniques 21 Cyber Commando Training 2025 -Tuning and optimization of IDS/IPS for effective threat detection Firewall Fundamentals -Role of firewalls in network security -Types of firewalls: stateless vs. stateful, proxy vs. packet- filtering -Firewall ruleset management and best practices Advanced Firewall Technologies -Next-Generation Firewalls (NGFW) -Application-layer firewalls and deep packet inspection (DPI) -Firewall bypass techniques and evasion methods Module - 10 Introduction to Honeypots Week 11 -Definition and objectives of honeypots -Types of honeypots: low-interaction vs. high-interaction -Deployment strategies and use cases Honeypot Operation and Management -Monitoring and capturing attacker interactions -Legal and ethical considerations of deploying honeypots -Analyzing honeypot data for threat intelligence Overview of SIEM Purpose and benefits of SIEM solutions -Components of a SIEM architecture: data collection, normalization, correlation, and analysis -Real-time monitoring and incident response capabilities -SIEM Implementation and Integration 22 Cyber Commando Training 2025 Module Topics Week Instructor / Faculty EDR -Definition and capabilities of EDR solutions -Endpoint visibility and threat hunting -Incident response and remediation with EDR EDR Deployment and Management -Integrating EDR with SIEM and other security tools -Continuous monitoring and response to endpoint threats -Evaluating EDR effectiveness through case studies Behavioural Analysis and Machine Learning -Application of behavioural analysis in IDS/IPS, SIEM, and EDR -Machine learning algorithms for anomaly detection -Threat intelligence feeds and their role in advanced threat detection Windows and Linux OS and Hardening Introduction to OS Hardening -Purpose of OS Hardening -Importance of securing operating systems -Goals of OS hardening: confidentiality, integrity, availability (CIA) Windows OS Hardening -Windows Security Fundamentals -Overview of Windows operating system security features -User account management and password policies 23 Cyber Commando Training 2025 -Group Policy settings for security configurations Windows Server Hardening -Securing Windows Server roles and services -Implementing Windows Firewall rules and configurations -Patch management and Windows Update best practices Module - 11 Linux OS Hardening -Linux Security Basics Week 12 -Overview of Linux security architecture -User and group permissions and access controls -Configuring SELinux or AppArmor for mandatory access control Linux Server Hardening -Securing SSH access with key-based authentication -Hardening network services (Apache, MySQL, etc.) -Kernel hardening and system integrity checks File System and Disk Encryption -File System Security -Understanding file system permissions (Windows NTFS, Linux ext4) -File and folder encryption techniques (BitLocker, LUKS) Digital Forensics & Incident Response Module - 12 Definition and Scope of Digital Forensics Week 13,14 -Overview of digital evidence and its importance -Legal and ethical considerations in digital investigations 24 Cyber Commando Training 2025 Module Topics Week Instructor / Faculty Digital Forensics Process Forensic Readiness -Establishing policies and procedures for digital investigations -Incident response planning and preparation Evidence Acquisition -Preservation of volatile and non-volatile data -Imaging techniques and chain of custody Evidence Examination -File system analysis and recovery -Recovering deleted files and artifacts Tools and Techniques in Digital Forensics -Digital Forensics Tools -Overview of forensic software (e.g., EnCase, FTK, Autopsy) -Open-source tools and their capabilities Live Forensics -Conducting forensic analysis on live systems -Volatile data collection and analysis Legal and Ethical Issues in Digital Forensics --Laws and Regulations -Understanding legal requirements and jurisdictions -Admissibility of digital evidence in court Ethical Considerations -Professional standards and codes of conduct -Privacy concerns and handling sensitive information Network, Event Log Analysis 25 Cyber Commando Training 2025 Importance of Log Analysis -Understanding the role of logs in IT infrastructure -Benefits of effective log analysis for security and operations Log Management Fundamentals Log Collection -Overview of log sources: servers, applications, network devices -Log collection methods: agents, syslog, APIs -Log Storage and Retention Strategies for log storage: local storage, centralized logging Module - 13 -Compliance and regulatory requirements for log Week 15 retention Introduction to Log Analysis Tools -Splunk Overview --Features and capabilities of Splunk for log management and analysis --Licensing and deployment options -ELK Stack Overview --Components of ELK Stack: Elasticsearch, Logstash, Kibana --Use cases and benefits of ELK Stack for log analysis 26 Cyber Commando Training 2025 Module Topics Week Instructor/ Faculty Log Parsing Techniques -Extracting structured data from log files -Regular expressions (regex) for log parsing Log Normalization -Standardizing log formats and timestamps -Enriching logs with contextual information Data Visualization -Creating dashboards and visualizations in Splunk -Visualizing log data with Kibana dashboards Contemporary Cyber Threats, CVEs and Exploits Vulnerability assessment and solutions CVE Basics -Introduction to CVEs and their significance -How CVEs are assigned and tracked CVE Databases -Exploring CVE databases (e.g., CVE List, NVD) -Using CVE identifiers for vulnerability management Exploit Development -Common exploit techniques (buffer overflow, SQL injection, XSS, etc.) -Tools and frameworks used in exploit development Exploit Kits -Overview of exploit kits and their capabilities Module - 14 -Case studies of prominent exploit kit campaigns Week 16 27 Cyber Commando Training 2025 Advanced Persistent Threats (APTs) -APTs Overview --Characteristics and objectives of APTs --Tactics, techniques, and procedures (TTPs) used by APT groups -Case Studies of APT Campaigns --Analysis of notable APT attacks and their impact --Lessons learned from APT incidents OSINT Threat Hunting & Cyber Threat Intelligence Introduction to Open-Source Intelligence Gathering information through cyber space Gathering information of a user / organization using open space Search, operators, Image, Lookups Understanding Threat Hunting. Definition and objectives of threat hunting -Role of threat hunting in proactive cybersecurity Threat Hunting Methodologies Steps in the threat hunting processTools and techniques used in threat hunting operations Module - 15 Threat Intelligence Analysis Techniques Week 17,18 Analyzing and interpreting threat intelligence data & Identifying patterns, trends, and indicators of compromise (IOCs). Threat Actor Profiling -Understanding threat actor motivations and tactics. -Attribution and tracking of threat actor activities 28 Cyber Commando Training 2025 Module Topics Week Instructor/ Faculty Threat Hunting Tools, Overview of threat hunting platforms, Use of specialized tools for threat hunting Dark Web and LEAs Introduction to the Dark Web -Definition and distinction between Surface Web, Deep Web, and Dark Web -Accessing the Dark Web: anonymity networks Legal Framework, Laws and regulations governing activities on the Dark Web. Challenges in enforcing Laws and jurisdictional issues Ethical Considerations, Ethical dilemmas in researching and monitoring Dark Web activities. Privacy concerns and balancing law enforcement needs with individual rights Anonymity Networks -Overview of Tor (The Onion Router), I2P, and Freenet -How anonymity networks facilitate Dark Web activities -Cryptocurrencies -Role of cryptocurrencies (Bitcoin, Monero, etc.) in Dark Web transactions -Tracking and tracing cryptocurrency transactions on the Dark Web, Investigative Techniques -Conducting Dark Web investigations: OSINT (Open- Source Intelligence) gathering -Techniques for monitoring and infiltrating Dark Web marketplaces. -Undercover Operations Strategies for undercover operations on the Dark Web Module - 16 -Case studies of successful Dark Web investigations Week 19 LEA Collaboration -Cooperation between law enforcement agencies (LEAs) -Information sharing platforms and initiatives for combating Dark Web activities 29 Cyber Commando Training 2025 -Joint efforts in detecting and mitigating Dark Web threats Module - Cyber Law and Other Acts 17 International Cyber Diplomacy -Introduction to cyber law. -Digital transactions and contracts. -Data protection and privacy laws. Week 20 -Cybercrime and legal remedies. -Intellectual property in cyberspace. -Knowledge of IT Act 2000, IT Rules, IPC. -Understanding the Digital Personal Data Protection Act 2023 and other compliance guidelines and directives. Cyber security Red Blue Team Exercise CTF events Module A 5-day exercise simulating real-world cyber threats. Week 21, - 18 Capture The Flag (CTF) activities and an introduction to the Cyber Range platform. 22 Threat detection, cyber protection, incident reporting, and response Sector Specific Cyber Security FIELD VISIT Week 23, 24,25 30 Cyber Commando Training 2025 Annexure II Following candidates are nominated from …………………………(State/UT/CAPF/CPO) For the six months residential training of Cyber Commandos for the year 2025. S.No Name Rank Date of Father’s Contact Email Id Education Birth Name Number Qualification Date: Signature 31 Cyber Commando Training 2025 Annexure III Cyber Commando Training Program Screening Test Syllabus Unit: 1 Introduction to Binary, Octal, Decimal and Hexadecimal Number Systems; Conversion from Binary to Decimal, Decimal to Binary, Binary to Hexadecimal, Hexadecimal to Binary; Representation of signed and unsigned Binary Numbers; ASCII and UTF. Definition of Computer, History of Computer Evolution, Key Terms, Computer Architecture, Hardware and Software, Programming Languages, Compiler and Interpreter. Unit: 2 Introduction to Computer Hardware - Various Components of a Computer, Motherboard, Processor, Memory, Storage Devices Hardware and Software, Primary and Secondary Storage Devices; and Networking components. Understanding Computer Operating Systems (OS), Booting process of computers., Types of Operating System- Windows and Linux OS architectures, Introduction to Filesystems Unit: 3 Definition of Computer Network, Digital and Analog Signaling Methods, Components of Network, Topology and Types of Networks – LAN, MAN and WAN. Routers and Routing Protocols, Introduction to OSI layer and TCP / IP protocol suite, Communication Devices, Different types of IP Addresses and Classes, Subnet Masks, MAC Addresses, Understanding Internet, Introduction to websites and webpages; understanding Firewall, IDS and IPS; Introduction to Network and Internet Related Crimes. Unit: 4 Introduction to Mobile Technologies – Components of cellular Network (CDMA /GSM), Introduction to Different Mobile Device, Hardware Characteristic of Mobile Device, Software Characteristic of Mobile Device, Mobile Operating System, Component of Mobile Phones, International Mobile Equipment Identity (IMEI), Subscriber Identity Module (SIM), SIM Files, Introduction to Smartphones. Unit: 5 Introduction to social media, Security Issues in social media, Types of crimes of social media – Cyberbullying, Online Grooming, Cyberstalking. Social media and its impact on Business, Politics, and Revolutions, Emerging Trends in social media. Introduction 32 Cyber Commando Training 2025 to Computer related Crimes, Form and Characteristics of Cyber Crime, Internal and External Attacks, Crimes related to social media, and FinTech. Investigation of Cyber Crime, Challenges in the Investigation of Cyber Crime, Do’s and Don’ts while investigation of cyber crime. Unit: 6 General knowledge, General Intelligence & Reasoning, General Awareness, Quantitative Aptitude, English Language & comprehension, Quantitative Aptitude, English Language & Comprehension, Statistics. References and Suggested Readings: 1. Operating Systems | Internals and Design Principles, Ninth Edition by William Stallings 2. John P. Hayes; “Computer Architecture and Organization”, McGraw-Hill, 1988. 3. V. Rajaraman and Niharika Adabala; “Fundamentals of Computers”, 6th Edition, PHI Learning Pvt. Ltd., 2015. 4. Anita Goel; “Computer Fundamentals”, Pearson Publications, 2010. 5. Beherouz. A Forouzan; “Data Communication and Networking”, 4th Edition, TMH, 2000. 6. Andrew S.Tanenbaum; “Modern Operating Systems”, 2nd edition, Addison Wesley, 2001. 7. Gary Nutt; “Operating Systems: A Modern Perspective”, 2nd edition, Pearson Education, 2001. 8. William Stallings; “Operating Systems: Internals and Design Principles”, 5th Edition, Prentice Hall, 2005. 9. Learn Computer Forensics: A beginner’s guide to searching, analyzing, and securing digital evidence 1st Edition by William Oettinger. 10. Practical Guide to Computer Forensics Investigations, A (Pearson IT Cybersecurity Curriculum (ITCC)) 1st Edition by Darren R. Hayes. 11. Nina Godbole and Sunit Belapore; “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley Publications,2011. 33 Cyber Commando Training 2025 Annexure IV BOND TO BE EXECUTED BY LEASs/CAPFs/CPOs WHEN PROCEEDING ON CYBER COMMANDO COURSE AT …………………… INSTITUTE THAT I, …………………………………………………..S/o/D/o/W/o Shri …………., resident of ……………………………..in the District of …………………………at present employed as ………………………………..in Ministry/Office/Department/Organization of ………………………, do hereby bind myself, executors and administrators to compensate to the President of India hereinafter referred to as “ the Government”) on demand with the sum of Course fees (MHA), Salary and allowances (parent organization), together with interest thereon from the date of demand at the Government rates in force at that time, or, if payment is made in a country other than India, the equivalent of the said amount in the currency of that country converted at the official rate of exchange between that country and India, AND TOGETHER with all costs, as well as any charges and expenses that may have been incurred by the Government. WHEREAS I have been granted leave by the Government to attend the Cyber Commando Course. AND WHEREAS, FOR the better protection of the Government, I have agreed to execute this Bond under the conditions set forth below: In the event of my failure to resume duty, resignation, or any other form of departure from service without returning to duty upon the expiry or termination of the Cyber Commando Course, or in the case of failure to complete the course of study, or at any time within five years after my return, I am obligated to promptly compensate the Government of India, or as directed by the Government, upon demand, with the sum of Course fees (MHA), Salary and allowances (parent organization) along with accruing interest from the date of demand at prevailing Government rates. Upon making such payment, the above-written obligation shall be void and of no effect. Otherwise, it shall be and remain in full force and virtue. The Bond shall be governed in all respects by the laws of 34 Cyber Commando Training 2025 India for the time being in force, and the rights and liabilities hereunder shall, where necessary, be accordingly determined by the appropriate Courts in India. NOW FURTHER THE CONDITION OF THE ABOVE-WRITTEN OBLIGATION IS THAT If in case the period of my bond, which mandates the rendering of service for the duration specified above following the expiry of the Cyber Commando Course Leave availed by me, shall be extended by a period equivalent to the aggregate duration of any leave of any kind availed by me during the pendency of the bond period. Signed and dated this … ……… …. day of … … …..… … … …. two thousand and… … … … …. ……….. Signed and delivered by… … … …….. … … … in the presence of Witnesses (1 )… … … … … … … …. (2)… … … … … … … …. ACCEPTED for and on behalf of the President of India. 35 Cyber Commando Training 2025 Annexure V NO OBJECTION CERTIFICATE (NOC) FOR ATTENDING CYBER COMMANDOS TRAINING This is to Certify that the ………working in …………………………. Is allowed to attend the cyber commandos training at the allotted center for duration of Six months commencing in 2025 S.No Name Rank Date of Father’s Contact Email Id Birth Name Number Date: Signature. 36 Cyber Commando Training 2025 Annexure VI Step by Step Registration Procedure on Cytrain Online method Offline method (for (applicable for specific other cases) domains): For officials with email ids of the domain For officials who do not have the said nic.in, gov.in, upcyberpolice.in, type of email ids, must go to the offline police.rajasthan.in can register directly on section available on the site home page, the website, for the rest an offline download the respective excel file registration facility is made available. depending on the type of user you are (State / UT Police, CPO CAPF, etc.). The Create Account Hyperlink below the The details like Names, emails, login button is clicked and then details like designation, present posting etc. of the Names, emails, designation, present officers is provided to the CyTrain Team posting etc. of the officers must be on email : ‘[email protected]’. The entered in the space provided. prescribed format is shared in the excel file. There is a special restriction for password A stamp recommendation letter from the such that the password must have at least competent law officer, of one’s own 8 characters, at least 1 digit(s), at least 1 department, is required. The email should lower case letter(s), at least 1 upper case be addressed to director NCTC, and the letter(s), at least 1 non-alphanumeric content should be related to requesting character(s) such as as *, -, or #. the said officer(s) to be enrolled in Cytrain. After registering an automated The username and password is set by the confirmation mail is received. Cytrain team and the registered credentials are sent back on the email. 37 Cyber Commando Training 2025 Annexure VII Pre-Course Material For Screening Examination 38