{"id":336,"date":"2016-11-04T07:59:39","date_gmt":"2016-11-04T07:59:39","guid":{"rendered":"http:\/\/www.inspirenignite.com\/anna-university\/?p=336"},"modified":"2019-07-17T07:07:26","modified_gmt":"2019-07-17T07:07:26","slug":"anna-university-b-tech-it-r13-8th-cyber-forensics-detailed-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-b-tech-it-r13-8th-cyber-forensics-detailed-syllabus\/","title":{"rendered":"Anna University B.Tech IT (R13) 8th Cyber Forensics Detailed Syllabus"},"content":{"rendered":"<p>Cyber Forensics Syllabus for B.Tech 8th sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Cyber Forensics B.Tech (R13) eightsem is as follows<\/p>\n<p><strong>OBJECTIVES<\/strong>: The student should be made to:<\/p>\n<ul>\n<li>Learn the security issues network layer and transport layer.<\/li>\n<li>Be exposed to security issues of the application layer.<\/li>\n<li>Learn computer forensics.<\/li>\n<li>Be familiar with forensics tools.<\/li>\n<li>Learn to analyze and validate forensics data.<\/li>\n<\/ul>\n<p><strong>UNIT I : NETWORK LAYER SECURITY &amp;TRANSPORT LAYER SECURITY<\/strong> \u00a0 \u00a0 \u00a0[9 hours]<\/p>\n<p>IPSec Protocol &#8211; IP Authentication Header &#8211; IP ESP &#8211; Key Management Protocol for IPSec.Transport layer Security: SSL protocol, Cryptographic Computations \u2013 TLS Protocol.<\/p>\n<p><strong>UNIT II : E-MAIL SECURITY &amp; FIREWALLS<\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0[9 hours]<\/p>\n<p>PGP &#8211; S\/MIME &#8211; Internet Firewalls for Trusted System: Roles of Firewalls \u2013 Firewall related terminology- Types of Firewalls &#8211; Firewall designs &#8211; SET for E-Commerce Transactions.<\/p>\n<p><strong> UNIT III : INTRODUCTION TO COMPUTER FORENSICS<\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0[9 hours]<\/p>\n<p>Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft &amp; Identity Fraud. Types of CF techniques &#8211; Incident and incident response methodology &#8211; Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. &#8211; Forensics Technology and Systems &#8211; Understanding Computer Investigation \u2013 Data Acquisition.<\/p>\n<p style=\"text-align: center\"><strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">Download iStudy<\/a> <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">Android<\/a><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"> App for complete Anna University syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.<\/a><\/strong><\/p>\n<p><strong>TOTAL: 45 PERIODS <\/strong><\/p>\n<p><strong>OUTCOMES:<\/strong> Upon completion of the course, the student should be able to:<\/p>\n<ul>\n<li>Discuss the security issues network layer and transport layer.<\/li>\n<li>Apply security principles in the application layer.<\/li>\n<li>Explain computer forensics.<\/li>\n<li>Use forensics tools.<\/li>\n<li>Analyze and validate forensics data.<\/li>\n<\/ul>\n<p><strong>TEXT BOOKS:<\/strong><\/p>\n<ul>\n<li>Man Young Rhee, \u201cInternet Security: Cryptographic Principles\u201d, \u201cAlgorithms and Protocols\u201d, Wiley Publications, 2003.<\/li>\n<li>Nelson, Phillips, Enfinger, Steuart, \u201cComputer Forensics and Investigations\u201d, Cengage Learning, India Edition, 2008.<\/li>\n<\/ul>\n<p>REFERENCES:<\/p>\n<ul>\n<li>John R.Vacca, \u201cComputer Forensics\u201d, Cengage Learning, 2005<\/li>\n<li>Richard E.Smith, \u201cInternet Cryptography\u201d, 3rd Edition Pearson Education, 2008.<\/li>\n<li>Marjie T.Britz, \u201cComputer Forensics and Cyber Crime\u201d: An Introduction\u201d, 3rd Edition, Prentice Hall, 2013.<\/li>\n<\/ul>\n<p>For all other B.Tech IT 8th sem syllabus go to <a href=\"http:\/\/www.inspirenignite.com\/anna-university\/anna-university-b-tech-information-technology-8th-sem-course-structure-for-r13-batch\/\">Anna University B.Tech Information Technology (IT) 8th Sem Course Structure for (R13) Batch.\u00a0<\/a>All details and yearly new syllabus will be updated here time to time.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Forensics Syllabus for B.Tech 8th sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course. The [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-336","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":2,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/336\/revisions"}],"predecessor-version":[{"id":10616,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/336\/revisions\/10616"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}