Become a Certified Cyber Law Practitioner (CCLP)
CCLP is a flagship certification by FCRF designed to equip professionals with the legal, technical, and investigative expertise required to navigate India’s Information Technology Act, 2000, the Digital Personal Data Protection Act, 2023, and the new criminal law codes — Bharatiya Nyaya Sanhita (BNS), Bharatiya Nagarik Suraksha Sanhita (BNSS), and Bharatiya Sakshya Adhiniyam (BSA).
Live Classes By Expert
Renowned cyber law practitioners, digital forensics specialists, and legal experts will guide you through the complexities of India’s IT Act, 2000, DPDP Act, 2023, and the new Bharatiya Nyaya Sanhita (BNS), BNSS, and BSA. You’ll learn how courts and regulators interpret cybercrime, digital evidence, and intermediary liabilities in practice.
Cyber Law Landscape
A dedicated track to explore cyber offences, electronic governance, digital signatures, intermediary guidelines, and cross-border challenges. Hands-on exposure to forensic tools, investigation techniques, and case-based simulations prepares you for real-world litigation and compliance environments.
Career-Defining Certification
Position yourself as a Certified Cyber Law Practitioner (CCLP) and open pathways into cybercrime investigation, litigation support, compliance advisory, and regulatory consulting. Gain solid legal and technical skills from both operational and strategic perspectives, making you an indispensable resource in the digital era.
25th Oct, 2025
Starting Date
4 Weeks Duration
Sat & Sun, 11:00 AM
- 1:00 PM
Live Sessions
Recordings will be Provided
16 Modules
Curriculum
Snapshots from Our CCMP Program with CERT-In
Organised in collaboration with CERT-In, FCRF’s Certified Cyber Crisis Management Professional (CCMP) program was attended by over 500 top officials from civil services, defence, cybersecurity, and regulatory bodies. These glimpses capture our commitment to high-impact, nationally recognised training.
India Needs Cyber Law Experts - Will You Be One?
✅ Master the Information Technology Act, 2000 – penalties, offences, and adjudication
✅ Understand the Digital Personal Data Protection Act, 2023 (DPDPA) & its enforcement
✅ Navigate cyber offences under the Bharatiya Nyaya Sanhita (BNS), 2023
✅ Apply BNSS provisions for cybercrime investigation & digital procedure reforms
✅ Prove & present digital evidence under the Bharatiya Sakshya Adhiniyam (BSA), 2023
✅ Learn digital & electronic signatures and their legal implications
✅ Explore intermediary liabilities under IT Rules, 2021 & emerging compliance duties
✅ Gain hands-on expertise in cyber forensics, OSINT & threat intelligence
✅ Tackle new-age challenges like AI, deepfakes, cryptocurrencies & cross-border crimes
Discover Why CCLP is The Perfect Starting Point
A beginner-friendly, expert-crafted program to help you master India’s cyber laws, digital evidence frameworks, and launch a career in cyber law, compliance, and litigation support.
- 16 modules aligned with India’s IT Act, 2000, DPDP Act, 2023, and new criminal codes (BNS, BNSS, BSA).
- Learn key domains like cyber offences, intermediary liability, digital signatures, data protection, digital forensics, and cross-border cybercrime.
- Now is the best time to build your expertise as India enforces new digital laws and cybercrime provisions.
- Designed to address real-world use cases across corporate, law enforcement, financial, and regulatory sectors.
- Practical case studies, templates, and roleplays bridging legal, technical, and investigative perspectives.
- Strong legal and governance foundations to help you step confidently into your first role as a Certified Cyber Law Practitioner.
Who Can Join The CCLP Program?
The program is open to professionals, students, and leaders across legal, IT, governance, compliance, and law enforcement domains—especially those preparing for roles in cyber law, digital forensics, cybercrime investigation, and regulatory compliance.
Course Module
Comprehensive modules covering essential concepts, practical skills, and real-world case studies for effective cyber defense.
Introduction to Cyber Law, Electronic Governance and Intellectual Property in the Digital Age
- Evolution of Cyber Law in India – IT Act, 2000 and Amendment Act, 2008 (key changes).
- Intellectual Property Law – Patent, Trade Marks, Copyright, ADR/ODR (online dispute resolution) in brief.
- Electronic Governance: legal recognition of e-records & e-signatures; IT (Electronic Service Delivery) Rules, 2011 (service delivery, digital certificates, timelines).
Understanding Digital & Electronic Signatures, Certifying Authorities and Subscriber Duties
PKI architecture; Controller of Certifying Authorities / Root CA, CA audit & Certification Practice Statement.
Certifying Authorities: issuance workflow for DSC / e-sign; repository & revocation.
Suspension & revocation; duties of subscribers; liability for compromised private keys.
Validity of electronic & email contracts; hashing & time-stamping for integrity.
Penalties, Compensation, Adjudication and Compounding of Offences under IT Act 2000 & IT Act 2008 (Amend.)
Sec. 43/43A (compensation, reasonable security practices); vicarious liability of companies (Sec. 85).
Adjudicating Officer: powers, factors, procedure; appeal routes.
Compounding of offences under IT Act – what is compoundable, authority & process (with specimen order format).
Civil contraventions vs criminal prosecution; jurisdiction; extra-territorial reach (Sec. 75); confiscation (Sec. 76).
Offences under IT Act 2000 & IT Act 2008 (Amend.) – Civil Contraventions, Criminal Offences and Appellate Tribunals
Detailed map of Secs. 65, 66, 66C, 66D, 66E, 66F, etc.; tampering with source code; identity theft; personation; cyber-terrorism.
Mens rea & evidentiary standards; attempt/abetment; corporate/manager liability.
Search, seizure & arrest under IT Act (Sec. 80) and interplay with BNSS search powers.
Appellate mechanisms (Adjudication → Tribunal/Court).
Thematic jurisprudence on cyber-terrorism and aggravated harms.
Lawful Interception, Blocking, Decryption, Data Retention and Investigation under IT Act 2000
Sec. 69 (interception/monitoring/decryption): procedure & safeguards; oversight.
Sec. 69A and Website Blocking Rules, 2009 – standard vs emergency blocking; review committee.
Sec. 69B – monitoring & collection of traffic data; lawful network monitoring.
Sec. 67C – preservation by intermediaries; log-retention expectations (incl. CERT-In directions overview).
Encryption & decryption assistance; data retention versus privacy; proportionality tests.
Investigation workflows & requisitions; coordination with service providers.
Constitutional scrutiny and leading cases on surveillance & blocking.
Governance Powers, Intermediary Guidelines and Compliance Obligations under IT Act 2000
Government powers & recent amendments; roles of CERT-In and NCIIPC.
Intermediary Guidelines & Digital Media Ethics Code, 2021:
Safe-harbour (Sec. 79); due-diligence; first-originator traceability (SSMIs).
Compliance officers (Chief Compliance Officer, Nodal Contact, Resident Grievance Officer).
Grievance redressal timelines; transparency reports.
Publishers/OTT 3-tier ethics mechanism.
IS Audit; Reasonable Security Practices & Procedures (mapping to ISO/IS standards) and Sensitive Personal Data (SPD).
Practical: compliance checklist & takedown/grievance SOP; notable intermediary liability cases (incl. Shreya Singhal).
Digital Personal Data Protection Act 2023 and Proposed DPDP Rules – Comparative Global Context
Notice, consent & lawful uses; children’s data; data breach notification; cross-border transfers.
Data Fiduciary obligations; Significant Data Fiduciary triggers (DPO/governance obligations).
Role & powers of DPBI; penalties & enforcement mechanics.
Interplay with sectoral laws and legacy SPDPI Rules.
Comparative notes: GDPR/CCPA (rights, DPIAs, assessments) for context.
Cyber Provisions in Bharatiya Nyaya Sanhita (BNS) – New Offences and Digital Crimes
Mapping of erstwhile IPC cyber offences to BNS; expansion to online identity theft/cheating & organized cybercrime.
Mens rea & sentencing trends; aggravations; corporate criminal liability under BNS.
Coordination with IT Act offences to avoid double jeopardy.
Cyber Crime Investigation in BNSS – Procedures, e-FIRs, Search, Seizure and International Cooperation
e-FIR, electronic summons, e-trial; authenticated electronic processes.
Search & seizure: on-site triage, mirror imaging, sealing, hash-capture; presence of independent witnesses; documentation.
Mandatory forensic examination (where applicable) & timelines for filing.
International cooperation: MLAT requests & Letters Rogatory (practical pitfalls, timelines).
Preservation requests to platforms; mutual assistance routing via MHA & MEA.
Digital Evidence under BSA and Section 63(4)(C) BSA Certification – Examiner of Electronic Evidence
Electronic record as primary evidence; standards for authenticity & integrity (hashes, logs, metadata).
Section 65B/ Section 63(4)(C) BSA certification (template & dos/don’ts); when certificate is/ isn’t necessary.
Examiner of Electronic Evidence: appointment, role & reliance by courts; expert testimony.
Best-practice capture (bit-stream, screenshots with metadata, hashing) and preservation orders.
Leading cases: Anvar P.V. v. P.K. Basheer; allied rulings on Section 63(4)(C) BSA compliance.
Fundamentals of Digital Forensics – Acquisition, Analysis, Reports and Electronic Document Examination
Live demos: disk imaging (RAW/E01/AFF4), mobile imaging (logical/physical), RAM capture.
Electronic Document Examination: authorship, alteration detection, font/metadata, PDF & doc artefacts.
Write-blockers, chain of custody, imaging reports (hash values, tool versions).
Search, Seizure & Triage under BNSS; on-scene checklist and forms.
Tooling showcase (FTK/EnCase/Autopsy; Cellebrite/ ProDiscover/ Magnet AXIOM) and reporting for courts.
Court admissibility & jurisprudence on forensic methods.
Advanced Digital Forensics – Cloud, CSAM, Deepfakes, Synthetic Media and Darknet Investigations
Cloud forensics (provider logs: AWS CloudTrail, Azure, Google Cloud); VM snapshots; tenancy issues.
CSAM detection & lawful handling; obligations under Sec. 67B; coordination with designated reporting portals.
Deepfake & synthetic media authentication; audio-video forensics; damaged media recovery.
Live display of forensic tools; Live demo of search, seizure and triage flows; preservation of volatile data.
Electronic Evidence from Social Media & Dark Web – Threat Intelligence and OSINT
Threat Intelligence lifecycles; dark-web artefacts; crypto-tracing basics.
OSINT techniques (archival, WHOIS, passive DNS, Wayback captures) with 65B-compliant capture SOPs.
Legal sanctity & admissibility of OSINT/SM outputs; preservation requests; notice & production.
Cross-border platform cooperation; when to escalate via MLAT; per-platform policy nuances.
Case studies of collection of evidence using SM/dark-web.
t
Technology-Empowered Investigations – CDR, IPDR, PCAP Analysis and Big-Data Applications
CDR/IPDR requisitions; tower dumps; cell-site mapping; correlation with app/server logs.
Network capture (PCAP/NetFlow) & lawful acquisition.
Lawful use of analytics in evidence collection & court presentation; demonstratives & expert affidavits.
Case law on lawful surveillance & proportionality in bulk analysis.
Sectoral Regulatory Directions and Cyber Compliance Frameworks – BFSI, Telecom, Health and Emerging Technologies
CERT-In Directions (2022): 6-hour incident reporting, 180-day log retention, clock sync (NTP), KYC for certain services, data localisation for logs.
RBI Cyber Security Framework for Banks; NBFC/UCB circulars; payment ecosystem (PSOs/UPI) security.
SEBI Cyber Security & Resilience circulars for MIIs and intermediaries.
IRDAI information/cybersecurity guidelines for insurers; PFRDA expectations; NABARD guidance for RRBs/co-ops.
NFTs/crypto, fintech & RegTech compliance; cross-border jurisdiction & conflict-of-laws issues.
Landmark Cyber Case Laws, Global Conventions and Emerging Challenges
Landmark cases: Shreya Singhal; Anvar P.V.; Arjun Panditrao Khotkar (65B); intermediary & blocking jurisprudence; privacy (Puttaswamy).
Cyber Appellate Tribunal – processes & powers; appeals from Adjudication.
Budapest Convention (and India’s position), 24×7 network, UN initiatives.
Interpol cooperation & India’s National Central Bureau (NCB); MLAT mechanics and practical timelines.
Capstone: mock hearing/trial—end-to-end file (investigation → Section 63(4)(C) BSA certification → expert evidence → arguments).



FCRF's Pioneering Role In Ensuring A Cyber-Safe India
Future Crime Research Foundation (FCRF) is an IIT Kanpur’s AIIIDE–CoE incubated start-up (Non-Profit NGO) specializing in research in Cyber Security, Digital Crime, Fraud Risk Management, Cyber Laws, and Cyber Forensics. FCRF is also the host of India’s largest conference on tech-enabled crime and cyber threats, the FutureCrime Summit. It is registered under Section 8 of the Companies Act, 2013, and Sections 12A and 80G of the Income Tax Act, 1961. FCRF strives to make India future-ready by increasing digital awareness and building an ecosystem for a cyber-safe India.
Train with experts . Master the Laws . Lead in Digital Justice .
Learn From the Leading Instructors & Mentors Behind FCRF Academy










FCRF’s Esteemed Speakers at the FutureCrime Summit





What Our Learners Say About Us
From senior officers to first-time professionals, our participants consistently praise the real-world relevance, expert-led delivery, and practical focus of our programs.
Well-organised sessions, very good speakers, and nicely structured content.
Well-structured and not too heavy, perfect for working professionals.
Content planning, pace of course. From scratch, so that all are on the same platform.
Informative sessions delivered with clarity and precision.
What I liked most about the CCMP Cyber Crisis course was how it explained tough topics in a simple way using real-life examples.
Case studies and introduction to professionals who could articulate towards today's situation.
All the speakers in the course are from very well reputed organisation having deep understanding in cybersecurity, really learnt a lot.
The course was well organised, and lecture by the industry experts was superb, Covered advanced topics like XDR, SIEM, and threat intelligence in depth.
From LinkedIn Feed












Inside the FCRF Academy LMS
Every live session’s recording is made available on the LMS within 3 hours, along with the session’s PDF handouts, so you never miss a moment of learning.
Group Enrollments & Institutional Payments
We offer exclusive group discounts for departments, organisations, and corporate teams. Participants can also be manually enrolled on behalf of their organisation, with a consolidated invoice issued for institutional payment.
To avail group access or inquire further, Contact Us:
FCRF x GT BHARAT
FCRF and Grant Thornton Jointly Published Landmark Report on Cybercrime Investigations, Unveiled at FutureCrime Summit 2025.
Have any questions? Find answers here!
Find answers to common questions below. For more queries, contact: research@futurecrime.org
Should I use my laptop, tablet, or phone to access this course?
While the course is accessible on all devices, we recommend using a laptop for the best learning experience—especially for live sessions, practical labs, and assignments.
However, you can also download the FCRF Academy app from the Google Play Store and log in with your credentials to access sessions on your phone or tablet. The FCRF Academy app for iOS (App Store) will be live by mid-October.
What is the total duration of the course?
The course runs for 4 weeks, with live sessions every Saturday and Sunday from 11:00 AM to 1:00 PM IST.
Will this be live or pre-recorded?
The course is conducted live by expert instructors, with recordings made available after each session for revision and convenience.
I made the payment but didn’t receive any email
If you’ve made the payment but haven’t received confirmation, please check your spam folder. If not found, email us at research@futurecrime.org with your payment details.
Are the sessions interactive? Can I ask questions?
Absolutely. All sessions are live and interactive, and learners are encouraged to ask questions during and after class.
Is a refund available after payment and registration?
Kindly go through the syllabus and curriculum of the course carefully. No refund is possible once the payment is made. Though, we highly recommend all to enroll in this program.
Will I get lifetime access to course content?
You’ll receive lifetime access to session recordings, downloadable resources, and reading materials provided during the course.
Will I be added to a WhatsApp or Telegram group?
Yes, you’ll be added to the official CCLP WhatsApp group for updates, resources, and peer discussions. We’ll send the invite link via email and WhatsApp after registration. The link will also be available on the LMS for easy access.
If you don’t receive it, feel free to reach out at research@futurecrime.org at the earliest.


























