SlideShare a Scribd company logo
1 of 2
UG Programme – Regulations 2018
Department of Computer Science and Engineering
Course Code Course Title
Hours / Weeks C-+redits Maximum Marks
L T P C CA EA Total
818CIE09 DIGITAL FORENSICS 3 0 0 3 50 50 100
OBJECTIVE(S):
 To provide an understanding of computer forensics fundamentals.
 To analyze various computer forensics technologies.
 To identify methods for data recovery.
 To apply the methods for preservation of digital evidence.
 To learn about the types of attacks and remedial actions in the context of systems,
networks, images and videos.
UNIT I INCIDENT AND INCIDENT RESPONSE 9
Introduction to Security Threats: Introduction – Computer Crimes – Computer Threats and Intrusions
– Phishing – Identity Theft – Cyber Terrorism and Cyber War – Need for Security: Information Security
– OS Security – Database Security – Software Development Security – Introduction to Incident –
Incident Response Methodology – Steps – Activities in Initial Response Phase after Detection of an
Incident.
UNIT II FILE STORAGE AND DATA RECOVERY 9
File Systems – FAT, NTFS, NTFS Encrypting File System – Forensic Analysis of File Systems –
Storage Fundamentals – Initial Response & Volatile Data Collection from Windows System – Initial
Response & Volatile Data Collection from UNIX system – Forensic Duplication – Tools – Discover
of Electronic Evidence – Identification of Data – Reconstructing Past Events – Networks.
UNIT III NETWORK AND EMAIL FORENSICS 9
Network Evidence – Types of Network Monitoring – Setting Up a Network Monitoring System –
Network Data Analysis – Email Clients – Email Tracing – Internet Fraud – Spam Investigations –
Mobile Forensics – Subscriber Identity Module (SIM) Investigations – Wireless Device Investigations
– PDA Investigations.
UNIT IV SYSTEM FORENSICS 9
Data Analysis: Analysis Methodology – Investigating Live Systems (Windows & Mac OS) – Hacking:
Investigating Hacker Tools – Ethical Issues – Cybercrime. Forensic and Investigative tools – Forensic
Equipment’s for evidence collection – Post exploitation.
.
UNIT V IMAGE AND VIDEO FORENSICS 9
Recognizing a Graphics File – Data Compression – Locating and Recovering Graphics Files –
Identifying Unknown File Formats – Copyright Issues with Graphics – Fraud using image and video –
Detection of Fraud in images and video. (refbook1)
TOTAL: 45
COURSE OUTCOMES:
At the end of the course student should be able to
CO1: Recognize attacks on systems.
CO2: Design a counter attack incident response and incident response methodology.
CO3: Illustrate the methods for data recovery, evidence collection and data seizure.
CO4: Understand network and email attacks and forensic investigation with tools.
CO5: Analyze various image encryption/decryption, steganography and fraud in image
TEXT BOOKS:
1. Kevin Mandia, Jason T. Luttgens, Matthew Pepe, “Incident Response and Computer Forensics”,
Tata McGraw-Hill, 2014
2. Bill Nelson, Amelia Philips, Christopher Steuart, “Guide to Computer Forensics and
Investigations”, Cengage Learning, 2018.
REFERENCE BOOKS:
1. John R. Vacca, “Computer Forensics”, Firewall Media, 2009.
2. .Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, Auerbach
Publications, First Edition, 2014.

More Related Content

Similar to digital forensic.docx

Computer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).pptComputer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
BudiHsnDaulay
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
Jinalkakadiya
 

Similar to digital forensic.docx (20)

cyber forensic courses in kerala | Enroll now
cyber forensic courses in kerala | Enroll nowcyber forensic courses in kerala | Enroll now
cyber forensic courses in kerala | Enroll now
 
P.D.F System Forensics, Investigation, and Response ^Full.Pages By Chuck Easttom
P.D.F System Forensics, Investigation, and Response ^Full.Pages By Chuck EasttomP.D.F System Forensics, Investigation, and Response ^Full.Pages By Chuck Easttom
P.D.F System Forensics, Investigation, and Response ^Full.Pages By Chuck Easttom
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
sakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.pptsakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.ppt
 
L11 - Intro to Computer Forensics.ppt
L11 - Intro to Computer Forensics.pptL11 - Intro to Computer Forensics.ppt
L11 - Intro to Computer Forensics.ppt
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
 
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).pptComputer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Computer_forensics_ppt.ppt
Computer_forensics_ppt.pptComputer_forensics_ppt.ppt
Computer_forensics_ppt.ppt
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Forensics
ForensicsForensics
Forensics
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Fsp 201-ethical-hacking-it-security-courses
Fsp 201-ethical-hacking-it-security-coursesFsp 201-ethical-hacking-it-security-courses
Fsp 201-ethical-hacking-it-security-courses
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Forensics
ForensicsForensics
Forensics
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

digital forensic.docx

  • 1. UG Programme – Regulations 2018 Department of Computer Science and Engineering Course Code Course Title Hours / Weeks C-+redits Maximum Marks L T P C CA EA Total 818CIE09 DIGITAL FORENSICS 3 0 0 3 50 50 100 OBJECTIVE(S):  To provide an understanding of computer forensics fundamentals.  To analyze various computer forensics technologies.  To identify methods for data recovery.  To apply the methods for preservation of digital evidence.  To learn about the types of attacks and remedial actions in the context of systems, networks, images and videos. UNIT I INCIDENT AND INCIDENT RESPONSE 9 Introduction to Security Threats: Introduction – Computer Crimes – Computer Threats and Intrusions – Phishing – Identity Theft – Cyber Terrorism and Cyber War – Need for Security: Information Security – OS Security – Database Security – Software Development Security – Introduction to Incident – Incident Response Methodology – Steps – Activities in Initial Response Phase after Detection of an Incident. UNIT II FILE STORAGE AND DATA RECOVERY 9 File Systems – FAT, NTFS, NTFS Encrypting File System – Forensic Analysis of File Systems – Storage Fundamentals – Initial Response & Volatile Data Collection from Windows System – Initial Response & Volatile Data Collection from UNIX system – Forensic Duplication – Tools – Discover of Electronic Evidence – Identification of Data – Reconstructing Past Events – Networks. UNIT III NETWORK AND EMAIL FORENSICS 9 Network Evidence – Types of Network Monitoring – Setting Up a Network Monitoring System – Network Data Analysis – Email Clients – Email Tracing – Internet Fraud – Spam Investigations – Mobile Forensics – Subscriber Identity Module (SIM) Investigations – Wireless Device Investigations – PDA Investigations. UNIT IV SYSTEM FORENSICS 9 Data Analysis: Analysis Methodology – Investigating Live Systems (Windows & Mac OS) – Hacking: Investigating Hacker Tools – Ethical Issues – Cybercrime. Forensic and Investigative tools – Forensic Equipment’s for evidence collection – Post exploitation. . UNIT V IMAGE AND VIDEO FORENSICS 9 Recognizing a Graphics File – Data Compression – Locating and Recovering Graphics Files – Identifying Unknown File Formats – Copyright Issues with Graphics – Fraud using image and video – Detection of Fraud in images and video. (refbook1) TOTAL: 45
  • 2. COURSE OUTCOMES: At the end of the course student should be able to CO1: Recognize attacks on systems. CO2: Design a counter attack incident response and incident response methodology. CO3: Illustrate the methods for data recovery, evidence collection and data seizure. CO4: Understand network and email attacks and forensic investigation with tools. CO5: Analyze various image encryption/decryption, steganography and fraud in image TEXT BOOKS: 1. Kevin Mandia, Jason T. Luttgens, Matthew Pepe, “Incident Response and Computer Forensics”, Tata McGraw-Hill, 2014 2. Bill Nelson, Amelia Philips, Christopher Steuart, “Guide to Computer Forensics and Investigations”, Cengage Learning, 2018. REFERENCE BOOKS: 1. John R. Vacca, “Computer Forensics”, Firewall Media, 2009. 2. .Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, Auerbach Publications, First Edition, 2014.