{"id":55256,"date":"2023-08-28T07:12:39","date_gmt":"2023-08-28T07:12:39","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cb3601-cyber-forensics-syllabus-for-cyber-security-2021-regulation\/"},"modified":"2023-08-28T07:12:39","modified_gmt":"2023-08-28T07:12:39","slug":"cb3601-cyber-forensics-syllabus-for-cyber-security-2021-regulation","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cb3601-cyber-forensics-syllabus-for-cyber-security-2021-regulation\/","title":{"rendered":"CB3601: Cyber Forensics syllabus for Cyber Security 2021 regulation"},"content":{"rendered":"<p align=\"justify\">Cyber Forensics detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna University<\/a> official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Security 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cyber-security-6th-sem-syllabus-2021-regulation\">Cyber Security 6th Sem 2021 regulation scheme<\/a>. The detailed syllabus of cyber forensics is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit I<\/h4>\n<p>INTRODUCTION TO CYBER CRIME AND FORENSICS<br \/>\nIntroduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Role of ECD and ICT in Cybercrime &#8211; Classification of Cyber Crime. The Present and future of Cybercrime &#8211; Cyber Forensics -Steps in Forensic Investigation &#8211; Forensic Examination Process -Types of CF techniques &#8211; Forensic duplication and investigation &#8211; Forensics Technology and Systems &#8211; Understanding Computer Investigation &#8211; Data Acquisition.\n<\/p>\n<p><h4>Unit II<\/h4>\n<p>EVIDENCE COLLECTION AND FORENSICS TOOLS<br \/>\nProcessing Crime and Incident Scenes &#8211; Digital Evidence &#8211; Sources of Evidence -Working with File Systems. &#8211; Registry &#8211; Artifacts &#8211; Current Computer Forensics Tools: Software\/ Hardware Tools &#8211; Forensic Suite &#8211; Acquisition and Seizure of Evidence from Computers and Mobile Devices -Chain of Custody- Forensic Tools\n<\/p>\n<p><h4>Unit III<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit IV<\/h4>\n<p>ETHICAL HACKING<br \/>\nIntroduction to Ethical Hacking &#8211; Footprinting and Reconnaissance &#8211; Scanning Networks -Enumeration &#8211; System Hacking &#8211; Malware Threats &#8211; Sniffing &#8211; Email Tracking\n<\/p>\n<p><h4>Unit V<\/h4>\n<p>^ETHICAL HACKING IN WEB<br \/>\nSocial Engineering &#8211; Denial of Service &#8211; Session Hijacking &#8211; Hacking Web servers &#8211; Hacking Web Applications &#8211; SQL Injection &#8211; Hacking Wireless Networks &#8211; Hacking Mobile Platforms.\n<\/p>\n<p><h4>Practical Exercises<\/h4>\n<ol>\n<li>Study and Explore the following forensic tools:<\/li>\n<ul>\n<li>FTK Imager<\/li>\n<li>Autopsy<\/li>\n<li>EnCase Forensic Imager<\/li>\n<li>LastActivityView<\/li>\n<li>USBDeview<\/li>\n<\/ul>\n<li>Recover deleted files using FTKImager<\/li>\n<li>Acquire forensic image of hard disk using EnCase Forensics Imager and also perform integrity checking\/validation<\/li>\n<li>Restore the Evidence Image using EnCase Forensics Imager.<\/li>\n<li>Study the following:<\/li>\n<ul>\n<li>Collect Email Evidence in Victim PC.<\/li>\n<li>Extract Browser Artifacts (ChromeHistory view for Google Chrome)<\/li>\n<\/ul>\n<li>Use USBDeview to find the last connected USB to the system<\/li>\n<li>Perform Live Forensics Case Investigation using Autopsy<\/li>\n<li>Study Email Tracking and EmailTracing and write a report on them.<\/li>\n<\/ol>\n<p><h4>Course Outcomes:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Bill Nelson, Amelia Phillips, Christopher Steuart, \u2014 Guide to Computer Forensics and Investigations!, Cengage Learning, India Sixth Edition, 2019.<\/li>\n<li>CEH official Certified Ethical Hacking Review Guide, Wiley India Edition, Version 11, 2021.<\/li>\n<li>Dejey, S. Murugan &#8211; Cyber Forensics, Oxford University Press, India, 2018<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>John R.Vacca, \u201cComputer Forensics \u201c, Cengage Learning, 2005<\/li>\n<li>MarjieT.Britz, \u201cComputer Forensics and Cyber Crime: An Introduction 3rd Edition, Prentice Hall, 2013.<\/li>\n<li>AnkitFadia \u201c Ethical Hacking, Second Edition, Macmillan India Ltd, 2006<\/li>\n<li>Kenneth C.Brancik \u201cInsider Computer Fraudll Auerbach Publications Taylor &amp;Francis Group-2008.<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Security, 2021 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/cyber-security+6th-sem\">Cyber Security 6th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Security results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University Cyber Security all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Forensics detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna University official website and presented for the Cyber Security students. For [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[49,158],"tags":[],"class_list":["post-55256","post","type-post","status-publish","format-standard","hentry","category-6th-sem","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=55256"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55256\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=55256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=55256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=55256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}