Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Course code Course Name L-T-P - Credits Year of

Introduction
IT465 Cyber Forensics 3-0-0-3 2016
Pre-requisites: Nil
Course Objectives
 To understand cyber related crimes and various investigative strategies
 To understand Computer Forensics, Computing Investigations.
 To study forensically sound principles and practices related to digital evidence collection,
management, and handling.
 To study the concepts in ethical hacking
Syllabus
Introduction to Cyber Forensics, Methods in forensic investigation, Investigation of various data
breaches, Types of computer forensic technology, Law enforcement in cyber forensics, Types of
Computer Forensics Systems, Ethical Hacking, Types of evidence and methods of evidence
collection, Investigation of cyber crimes, Cyber forensics tools, Network Forensics, Investigating
network traffic.
Expected outcome .
 The students will get awareness about the cyber related crimes happening in modern
world and will help them to identify them.
Text Book:
1. John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition,
Charles River Media, 2005
2. Christof Paar, Jan Pelzl, Understanding Cryptography: A Textbook for Students and
Practitioners, 2 nd Edition, Springer, 2010

References:
1. Ali Jahangiri, Live Hacking: The Ultimate Guide to Hacking Techniques &
Countermeasures for Ethical Hackers & IT Security Experts, Ali Jahangiri, 2009
2. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press
Series: Computer Forensics), 2010

Course Plan
Sem.
Module Contents Hours Exam
Marks
Introduction to Cyber forensics: Information Security
Investigations, Corporate Cyber Forensics, Scientific method in
I 6 15%
forensic analysis, investigating large scale Data breach cases.
Analyzing Malicious software.
Types of Computer Forensics Technology, Types of Military
Computer Forensic Technology, Types of Law Enforcement,
Computer Forensic Technology, Types of Business Computer
Forensic Technology, Specialized Forensics Techniques, Hidden
II Data and How to Find It, Spyware and Adware, Encryption 7 15%
Methods and Vulnerabilities, Protecting Data from Being
Compromised Internet Tracing Methods, Security and Wireless
Technologies, Avoiding Pitfalls with Firewalls Biometric Security
Systems
FIRST INTERNAL EXAMINATION
Types of Computer Forensics Systems: Internet Security
Systems, Intrusion Detection Systems, Firewall Security
Systems, Storage Area Network Security Systems, Network
Disaster Recovery Systems, Public Key Infrastructure
III 6 15%
Systems, Wireless Network Security Systems, Satellite
Encryption Security Systems, Instant Messaging (IM) Security
Systems, Net Privacy Systems, Identity Management Security
Systems, Identity Theft, Biometric Security Systems
Ethical Hacking: Essential Terminology, Windows Hacking,
Malware, Scanning, Cracking. Digital Evidence in Criminal
IV Investigations: The Analog and Digital World, Training and 7 15%
Education in digital evidence, Evidence Collection and Data
Seizure: Why Collect Evidence, Collection Options Obstacles
SECOND INTERNAL EXAMINATION
Types of Evidence: The Rules of Evidence, Volatile Evidence,
General Procedure, Collection and Archiving, Methods of
Collection, Artifacts, Collection Steps, Controlling
V 9 20%
Contamination: The Chain of Custody, Reconstructing the
Attack, The digital crime scene, Investigating Cybercrime,
Duties Support Functions and Competencies.
Identification of Data: Timekeeping, Forensic Identification
and Analysis of Technical Surveillance Devices,
Reconstructing Past Events: How to Become a Digital
Detective, Useable File Formats, Unusable File Formats,
VI 7 20%
Converting Files, Investigating Network Intrusions and Cyber
Crime, Network Forensics and Investigating logs, Investigating
network Traffic, Investigating Web attacks, Router Forensics.
Cyber forensics tools and case studies.
END SEMESTER EXAM
QUESTION PAPER PATTERN

Maximum Marks: 100 Exam Duration: 3 hours


The question paper shall consist of Part A, Part B and Part C.

Part A shall consist of three questions of 15 marks each uniformly covering Modules I and
II. The student has to answer any two questions (15×2=30 marks).

Part B shall consist of three questions of 15 marks each uniformly covering Modules III and
IV. The student has to answer any two questions (15×2=30 marks).

Part C shall consist of three questions of 20 marks each uniformly covering Modules V and
VI. The student has to answer any two questions (20×2=40 marks).

Note : Each question can have a maximum of 4 subparts, if needed

You might also like