CS8074 - CYBER FORENSICS (Syllabus) 2017-regulation Anna University

CS8074

CYBER FORENSICS

 LPTC

3003

OBJECTIVES:
• To learn computer forensics
• To become familiar with forensics tools
• To learn to analyze and validate forensics data

We're excited to announce the launch of our new website! Visit NameWheelSpinner.com to explore its features and benefits.

UNIT I

INTRODUCTION TO COMPUTER FORENSICS

9

Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation – Data Acquisition.

UNIT II

EVIDENCE COLLECTION AND FORENSICS TOOLS

9

Processing Crime and Incident Scenes – Working with Windows and DOS Systems. Current Computer Forensics Tools: Software/ Hardware Tools.


UNIT III

ANALYSIS AND VALIDATION     

9

Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics – Email Investigations – Cell Phone and Mobile Devices Forensics

UNIT IV

ETHICAL HACKING      

9

Introduction to Ethical Hacking - Footprinting and Reconnaissance - Scanning Networks - Enumeration - System Hacking - Malware Threats - Sniffing

UNIT V

ETHICAL HACKING IN WEB   

9

Social Engineering - Denial of Service - Session Hijacking - Hacking Web servers - Hacking Web Applications – SQL Injection - Hacking Wireless Networks - Hacking Mobile Platforms.

TOTAL : 45 PERIODS

OUTCOMES:At the end of the course, the student should be able to:
• Understand the basics of computer forensics
• Apply a number of different computer forensic tools to a given scenario
• Analyze and validate forensics data
• Identify the vulnerabilities in a given network infrastructure
• Implement real-world hacking techniques to test system security

TEXT BOOKS:
1. Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, ―Computer Forensics and Investigations‖, Cengage Learning, India Edition, 2016.
2. CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition, 2015.

REFERENCES
1. John R.Vacca, ―Computer Forensics‖, Cengage Learning, 2005
2. MarjieT.Britz, ―Computer Forensics and Cyber Crime‖: An Introduction‖, 3rd Edition, Prentice Hall, 2013.
3. AnkitFadia ― Ethical Hacking‖ Second Edition, Macmillan India Ltd, 2006
4. Kenneth C.Brancik ―Insider Computer Fraud‖ Auerbach Publications Taylor & Francis Group–2008.

Comments

Popular posts from this blog

CS3491 Syllabus - Artificial Intelligence And Machine Learning - 2021 Regulation Anna University

CS3401 Syllabus - Algorithms - 2021 Regulation Anna University

CS3492 Syllabus - Database Management Systems - 2021 Regulation Anna University