{"id":33237,"date":"2021-05-21T08:12:22","date_gmt":"2021-05-21T08:12:22","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/it5045-computer-forensics-syllabus-for-it-7th-sem-2019-regulation-anna-university-professional-elective-iv\/"},"modified":"2021-05-21T08:12:22","modified_gmt":"2021-05-21T08:12:22","slug":"it5045-computer-forensics-syllabus-for-it-7th-sem-2019-regulation-anna-university-professional-elective-iv","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/it5045-computer-forensics-syllabus-for-it-7th-sem-2019-regulation-anna-university-professional-elective-iv\/","title":{"rendered":"IT5045: Computer Forensics Syllabus for IT 7th Sem 2019 Regulation Anna University (Professional Elective-IV)"},"content":{"rendered":"<p align=\"justify\">Computer Forensics detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Information Technology 7th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/information-technology-it-syllabus-for-7th-sem-2019-regulation-anna-university\">IT 7th Sem 2019 regulation scheme<\/a>. For Professional Elective-IV scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/professional-elective-iv-syllabus-for-it-7th-sem-2019-regulation-anna-university\">IT Professional Elective-IV syllabus scheme<\/a>. The detailed syllabus of computer forensics is as follows. <\/p>\n<p>  <title>Computer Forensics<\/title><\/p>\n<h4>Course Objective:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit I<\/h4>\n<p align=\"justify\">\n  <strong>Incident and Incident Response<\/strong><br \/>\n  Introduction to Security Threats: Introduction &#8211; Computer Crimes &#8211; Computer Threats and Intrusions &#8211; Phishing &#8211; Identity Theft &#8211; Cyber Terrorism and Cyber War &#8211; Need for Security: Information Security &#8211; OS Security &#8211; Database Security &#8211; Software Development Security -Introduction to Incident &#8211; Incident Response Methodology &#8211; Steps &#8211; Activities in Initial Response Phase After Detection of an Incident.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>Survey of forensics tools such as WinHex, EnCase, FTK, or ProDiscover.<\/li>\n<li>External learning &#8211; Demonstrate some of the mechanisms used by malicious attackers as well as forensic experts to disrupt computer networks and manipulate information access.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Demonstration on forensic tools<\/li>\n<li>Assignments on problem solving with sample cyber crime reports.<\/li>\n<\/ul>\n<h4>Unit II<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit III<\/h4>\n<p align=\"justify\">\n  <strong>Network and Email Forensics<\/strong><br \/>\n  Network Evidence &#8211; Types of Network Monitoring &#8211; Setting Up a Network Monitoring System &#8211; Network Data Analysis &#8211; Email Clients &#8211; Email Tracing &#8211; Internet Fraud &#8211; Spam Investigations &#8211; Mobile Forensics &#8211; Subscriber Identity Module (SIM) Investigations -Wireless Device Investigations &#8211; PDA Investigations.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>External learning &#8211; Familiarizing with port redirection tools: Quick n Easy FTP Server, FPIPE and FPORT.<\/li>\n<li>Practical &#8211; Study of the forensics tools.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Demonstration on port redirection tools.<\/li>\n<li>Real-time problems like email analysis for tracing.<\/li>\n<\/ul>\n<h4>Unit IV<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit V<\/h4>\n<p align=\"justify\">\n  <strong>Image and Video Forensics<\/strong><br \/>\n  Recognizing a Graphics File &#8211; Data Compression &#8211; Locating and Recovering Graphics Files &#8211; Identifying Unknown File Formats &#8211; Copyright Issues with Graphics &#8211; Fraud using image and video &#8211; Detection of Fraud in images and video.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>External learning &#8211; Survey on image file formats steganography tools.<\/li>\n<li>Practical &#8211; JPHS tool for steganography<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Assignment problems on forgery detection in images.<\/li>\n<li>Quiz on locating and recovering graphics files.<\/li>\n<\/ul>\n<h4>Course Outcome:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Text Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Kevin Mandia, Jason T. Luttgens, Matthew Pepe, &#8220;Incident Response and Computer Forensics&#8221;, Tata McGraw-Hill, 2014.<\/li>\n<\/ol>\n<h4>References:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Bill Nelson, Amelia Philips, Christopher Steuart, &#8220;Guide to Computer Forensics and Investigations&#8221;, Cengage Learning, 2018.<\/li>\n<li>John R. Vacca, &#8220;Computer Forensics&#8221;, Firewall Media, 2009.<\/li>\n<li>Rafay Baloch, &#8220;Ethical Hacking and Penetration Testing Guide&#8221;, Auerbach Publications, First Edition, 2014.<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Information Technology 7th Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/it+7th-sem\">IT 7th Sem subject syllabuses for 2019 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Information Technology results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University IT all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer Forensics detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For course code, [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[72],"tags":[],"class_list":["post-33237","post","type-post","status-publish","format-standard","hentry","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=33237"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33237\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=33237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=33237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=33237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}