Uncategorized

Anna University B.Tech IT (R13) 8th Cyber Forensics Detailed Syllabus

Cyber Forensics Syllabus for B.Tech 8th sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Cyber Forensics B.Tech (R13) eightsem is as follows

OBJECTIVES: The student should be made to:

  • Learn the security issues network layer and transport layer.
  • Be exposed to security issues of the application layer.
  • Learn computer forensics.
  • Be familiar with forensics tools.
  • Learn to analyze and validate forensics data.

UNIT I : NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY      [9 hours]

IPSec Protocol – IP Authentication Header – IP ESP – Key Management Protocol for IPSec.Transport layer Security: SSL protocol, Cryptographic Computations – TLS Protocol.

UNIT II : E-MAIL SECURITY & FIREWALLS                                          [9 hours]

PGP – S/MIME – Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related terminology- Types of Firewalls – Firewall designs – SET for E-Commerce Transactions.

UNIT III : INTRODUCTION TO COMPUTER FORENSICS                         [9 hours]

Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.

Download iStudy Android App for complete Anna University syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.

TOTAL: 45 PERIODS

OUTCOMES: Upon completion of the course, the student should be able to:

  • Discuss the security issues network layer and transport layer.
  • Apply security principles in the application layer.
  • Explain computer forensics.
  • Use forensics tools.
  • Analyze and validate forensics data.

TEXT BOOKS:

  • Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, Wiley Publications, 2003.
  • Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and Investigations”, Cengage Learning, India Edition, 2008.

REFERENCES:

  • John R.Vacca, “Computer Forensics”, Cengage Learning, 2005
  • Richard E.Smith, “Internet Cryptography”, 3rd Edition Pearson Education, 2008.
  • Marjie T.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3rd Edition, Prentice Hall, 2013.

For all other B.Tech IT 8th sem syllabus go to Anna University B.Tech Information Technology (IT) 8th Sem Course Structure for (R13) Batch. All details and yearly new syllabus will be updated here time to time.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.