Cyber Forensics Syllabus
Cyber Forensics Syllabus
(Autonomous)
Syllabus
Computer Science and
Department Programme Code 1161
Engineering
B.Tech Artificial Intelligence & DataScience
Professional Elective
Periods/week Credit
Maximum
Course code Course Name marks
P
19AI15803 CYBER FORENSICS 100
3 0 0 3
The student should be made to:
Tolearn computer forensics
To become familiar with forensics tools
Objectives) To learn to analyze and validate forensics data
To understand ethical hacking and malware threats in systems.
Toanalyze the real world hacking techniques
The students willbe able to:
" Understand the basics of computer forensics
Apply a number of different computer forensic toolsto a given scenario
Outcome(s) Analyze and validate forenisics data
Identify the vulnerabilities in a given network infrastructure
Implement real-world hacking techniques to test system security
UNIT-I INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime.
Introduction to ldentity Theft & ldentity Fraud. Types of CF techniques- Incident and incident
response methodology - Forensic duplication and investigation. Preparation for IR: Creating response
tool kit and IR team. Forensics Technology and Systems - Understanding Computer Investigation
Data Acquisition.
UNIT-II EVIDENCE COLLECTION AND FORENSICSTO0LS
Processing Crime and Incident Scenes Working with Windows and DOS Systems. Current
Computer Forensics Tools: Software/ Hardware Tools.
UNIT-III ANALYSIS AND VALIDATION
Validating Forensics Data- Data HidingTechniques - Performing Remote Ácquisition - Network
Forensics - Email Investigations Cell Phone and Mobile Devices Forensics.
UNIT-IV ETHICAL HACKING 9
Introduction to Ethical Hacking - Foot printing and Reconnaissance - Scanning Networks
Enumeration - System Hacking - Malware Threats - Sniffing
UNIT-V ETHICAL HACKING IN WEB 9
Social Engineering - Denial of Service - Session Hijacking - Hacking Web servers -Hacking Web
Applications - SQL Injection - Hacking Wireless Networks -Hacking Mobile Platforms.
TOTAL HOURS 45
TEXT BOOK:
BillNelson, Amelia Phillips, Frank Enfinger., Christopher Steuart, Computer Forensics and
Investigations, Cengage Learrning, India Edition, 2016.
2 CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition, 2015.
REFERENCES:
John R.Vacca, -Computer Forensics, Cengage Learning, 2005
2 MarjieT.Britz, -Computer Forensics and Cyber Crime: An Introduction, 3rd Edition,
Prentice Hall. 2013.
3 AnkitFadia Ethical Hacking Second Edition, Macmillan India Lid, 2006
4
Kenneth C.Brancik-Insider Computer Fraud Auerbach Publications Taylor &: Francis
Group-2008.