0% found this document useful (0 votes)
23 views

Cyber Forensics Syllabus

The document outlines the syllabus for a Professional Elective course on Cyber Forensics offered by Mahendra Engineering College for B.Tech in Artificial Intelligence & Data Science. It includes course objectives, outcomes, and detailed unit topics covering computer forensics, evidence collection, analysis, validation, and ethical hacking techniques. The syllabus also lists recommended textbooks and references for further study.

Uploaded by

krishnavaithi36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Cyber Forensics Syllabus

The document outlines the syllabus for a Professional Elective course on Cyber Forensics offered by Mahendra Engineering College for B.Tech in Artificial Intelligence & Data Science. It includes course objectives, outcomes, and detailed unit topics covering computer forensics, evidence collection, analysis, validation, and ethical hacking techniques. The syllabus also lists recommended textbooks and references for further study.

Uploaded by

krishnavaithi36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

MAHENDRA ENGINEERING COLLEGE

(Autonomous)
Syllabus
Computer Science and
Department Programme Code 1161
Engineering
B.Tech Artificial Intelligence & DataScience
Professional Elective
Periods/week Credit
Maximum
Course code Course Name marks
P
19AI15803 CYBER FORENSICS 100
3 0 0 3
The student should be made to:
Tolearn computer forensics
To become familiar with forensics tools
Objectives) To learn to analyze and validate forensics data
To understand ethical hacking and malware threats in systems.
Toanalyze the real world hacking techniques
The students willbe able to:
" Understand the basics of computer forensics
Apply a number of different computer forensic toolsto a given scenario
Outcome(s) Analyze and validate forenisics data
Identify the vulnerabilities in a given network infrastructure
Implement real-world hacking techniques to test system security
UNIT-I INTRODUCTION TO COMPUTER FORENSICS

Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime.
Introduction to ldentity Theft & ldentity Fraud. Types of CF techniques- Incident and incident
response methodology - Forensic duplication and investigation. Preparation for IR: Creating response
tool kit and IR team. Forensics Technology and Systems - Understanding Computer Investigation
Data Acquisition.
UNIT-II EVIDENCE COLLECTION AND FORENSICSTO0LS
Processing Crime and Incident Scenes Working with Windows and DOS Systems. Current
Computer Forensics Tools: Software/ Hardware Tools.
UNIT-III ANALYSIS AND VALIDATION
Validating Forensics Data- Data HidingTechniques - Performing Remote Ácquisition - Network
Forensics - Email Investigations Cell Phone and Mobile Devices Forensics.
UNIT-IV ETHICAL HACKING 9
Introduction to Ethical Hacking - Foot printing and Reconnaissance - Scanning Networks
Enumeration - System Hacking - Malware Threats - Sniffing
UNIT-V ETHICAL HACKING IN WEB 9
Social Engineering - Denial of Service - Session Hijacking - Hacking Web servers -Hacking Web
Applications - SQL Injection - Hacking Wireless Networks -Hacking Mobile Platforms.
TOTAL HOURS 45
TEXT BOOK:
BillNelson, Amelia Phillips, Frank Enfinger., Christopher Steuart, Computer Forensics and
Investigations, Cengage Learrning, India Edition, 2016.
2 CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition, 2015.

REFERENCES:
John R.Vacca, -Computer Forensics, Cengage Learning, 2005
2 MarjieT.Britz, -Computer Forensics and Cyber Crime: An Introduction, 3rd Edition,
Prentice Hall. 2013.
3 AnkitFadia Ethical Hacking Second Edition, Macmillan India Lid, 2006

4
Kenneth C.Brancik-Insider Computer Fraud Auerbach Publications Taylor &amp: Francis
Group-2008.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy