
Become a Certified Cyber Crisis Management Professional (CCMP)
CCMP is a practical certification by FCRF and CERT-In, focused on cyber crisis preparedness, response, and recovery. It trains professionals through real-world simulations to lead effectively during digital emergencies.

5th July, 2025
Starting Date
4 Weeks
Total Duration of Training
Live Sessions
Recordings will be Provided
16 Modules
Curriculum
✅ Incident Detection & System Enumeration
✅ Digital Forensics & Cyber Crisis Response
✅ SOC Coordination & Breach Management
✅ Fundamentals of Threat Intelligence
✅ Open Source Data & Attribution Techniques
✅ Mobile & Endpoint Forensic Readiness
✅ Deepfake Analysis & Response Planning
✅ GenAI Threats & Cloud Crisis Preparedness

- 20+ essential crisis-handling concepts in real-world simulated cyber breach environments.
- Learn advanced crisis domains like forensics, threat intel, SOC ops—guided by top incident experts.
- Crisis Response Foundations to help you take your first step as a certified cyber crisis responder!
- Prepare to tackle both offensive and defensive scenarios during cyber emergency simulations.
- 100+ practical demonstrations of high-risk threats, exploit analysis, and response strategies.
- Now is the best time to be a Certified Cyber Crisis Management Professional.
Concept of Crisis Management Plan
- Introduction and Scope of Cyber Crisis Planning
- Importance of formal incident management planning
Nature of Cyber Crisis and Contingencies
- Cyber security event,
- Incident and crisis
- Event Cyber Security
- Incident Cyber Security Crisis
- Types of Cyber Security Incidents
- Nature of contingencies & cascading effects
Understanding Crisis Impact & Targets
- Cyber crisis types, possible targets, economic &
- Organizational security implications
- Case studies from India & international breaches
Organisational Cyber Crisis Scenarios
- What constitutes an organisational crisis
- CISO, Board, CERT-In, NCIIPC crisis escalation framework
- National coordination protocols
Advanced Persistent Threats & Targeted Attacks
- Covert threats, APT life cycle
- Attack Modalities: Phishing, Water-holing, Zero-Day
- Client-Side Attacks: Exploits, Drive-by downloads
- Protection strategies against APTs
Botnets and Emerging Threats
- Scope of Botnet Threat
- Fighting botnets:
- DNS sinkholing, takedown measures
- Hacktivism, Exploit Kits, Fake Anti-virus
Social Engineering & ICS Attacks
Social Engineering through Social Media Platforms
ICS Vulnerabilities, Attacks & SCADA System Disruptions
Malware Targeting ICS Networks & Its Real-World Consequences
Real-Life Ransomware Incidents in Government and Private Sectors
Endpoint Threats & Website Intrusions
Mobile Botnets and Web Shells
Endpoint Security and Protection of Critical Information Infrastructure (CII)
Website Exploitation Techniques and Mitigation Strategies
Multi-Platform & Cloud-Based Threats
- Multi-platform Attacks (Windows, Linux, Android)
- Cloud Computing Threats & Infrastructure Hijack
Building Cyber Resilience through Advanced GRC Platform
Cyber Resilience Concepts
Business Continuity Planning and Disaster Recovery (BCP & DR)
Core Resilience Principles: Redundancy, Recovery, and Response
Key Resilience Elements: People, Processes, and Technology
Preventive Strategies and Tabletop Cyber Crisis Exercises
Incident Prevention & Security Frameworks
Threat Prediction and Vulnerability Assessments
SOC/SOAR, Threat Intelligence Platforms, and Dark Web Monitoring
DFIR Expert Deployment in Incident Management
ISMS Framework and ISO 27001
Best Practices & Compliance
Security Audits and Compliance (IT Act 2001, DPDP Act 2023, GDPR, NIST)
Cyber Crime Legal Provisions in Various Indian Laws
Sector-Specific Regulations by RBI, SEBI, IRDA, NCIIPC, CERT-In
Internal Controls and Vendor Risk Management
Key Learnings from Real Cyber Crisis Incidents in India
Institutional Crisis Response Roles
Organisational DFIR Team
Ministry-Specific Responsibilities (MHA, MeitY, NDMA, DoT, MOD, etc.)
Roles of NCIIPC, CERT-In, NCSC, and Law Enforcement Agencies (LEAs)
Sectoral CERTs, NCCC, and Fin-CERT
Crisis Management Lifecycle & Tabletop Exercises
Lifecycle Stages: Prevention, Detection, Response, Recovery
SOC, SOAR, Red Teaming & Blue Teaming Concepts
Roles of Crisis Management Group (CIO, CISO & CERT)
Tabletop Exercise Walkthrough
Post-Incident Management
Communication and Media Management
DFIR Team Responsibilities
Control Room Protocols and Standard Operating Procedures (SOPs)
Reporting Procedures and After-Action Reviews
Toolkit, Mock Drill & Evaluation
CERT-In Reporting Formats
Cyber Crisis Response Toolkits Overview
Mock Drill on Critical Infrastructure Scenario
Certification Test and Feedback








Should I use my laptop, tablet, or phone to access this course?
While the course is accessible on all devices, we recommend using a laptop for the best learning experience—especially for live sessions, practical labs, and assignments. However, the FCRF Academy app will also be available on the App Store and Google Play Store by mid-June, allowing you to learn on the go with your phone or tablet.
What is the total duration of the course?
The course runs for 4 weeks, with live sessions every Saturday and Sunday from 11:00 AM to 1:00 PM IST.
Will this be live or pre-recorded?
The course is conducted live by expert instructors, with recordings made available after each session for revision and convenience.
Will I get all the softwares and tools?
Yes, all the tools and notes will be given to you during the training itself.
I made the payment but didn’t receive any email
If you’ve made the payment but haven’t received confirmation, please check your spam folder. If not found, email us at research@futurecrime.org with your payment details.
Are the sessions interactive? Can I ask questions?
Absolutely. All sessions are live and interactive, and learners are encouraged to ask questions during and after class.
Is a refund available after payment and registration?
Kindly go through the syllabus and curriculum of the course carefully. No refund is possible once the payment is made. Though, we highly recommend all to enrol in this program.
Will there be guest lecturers and speakers?
YES! Experts from different domains will be sharing their experience and insights from real world and will help you to make your first step in cybersecurity.
Will I get lifetime access to course content?
You’ll receive lifetime access to session recordings, downloadable resources, and reading materials provided during the course.