Cyber Forensics detailed syllabus for Computer Science Engineering (CSE), R18 regulation has been taken from the JNTUHs official website and presented for the students of B.Tech Computer Science Engineering branch affiliated to JNTUH course structure. For Course Code, Course Titles, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The syllabus PDF files can also be downloaded from the universities official website.
For all the other CSE 4th Year 2nd Sem Syllabus for B.Tech R18 Regulation JNTUH scheme, visit Computer Science Engineering 4th Year 2nd Sem R18 Scheme.
For all the (Professional Elective-6) subjects refer to Professional Elective-6 Scheme. The detail syllabus for cyber forensics is as follows.
Course Objective:
- A brief explanation of the objective is to provide digital evidences which are obtained from digital media.
- In order to understand the objectives of computer forensics, first of all, people have to recognize
- According to a snippet from the United States Security Service, the functions computer has in different kinds of crimes.
the different roles computer plays in a certain crime.
Course Outcome:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Unit – I
Introduction of Cybercrime: Types, The Internet spawns crime, Worms versus viruses, Computers roles in crimes, Introduction to digital forensics, Introduction to Incident – Incident Response Methodology -Steps – Activities in Initial Response, Phase after detection of an incident
Unit – II
Initial Response and forensic duplication, Initial Response and Volatile Data Collection from Windows system -Initial Response and Volatile Data Collection from Unix system – Forensic Duplication: Forensic duplication: Forensic Duplicates as Admissible Evidence, Forensic Duplication Tool Requirements, Creating a Forensic. Duplicate/Qualified Forensic Duplicate of a Hard Drive
Unit – III
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Unit – IV
Current Forensic tools: evaluating computer forensic tool needs, computer forensics software tools, computer forensics hardware tools, validating and testing forensics software E-Mail Investigations: Exploring the role of e-mail in investigation, exploring the roles of the client and server in e-mail, investigating e-mail crimes and violations, understanding e-mail servers, using specialized e-mail forensic tools. Cell phone and mobile device forensics: Understanding mobile device forensics, understanding acquisition procedures for cell phones and mobile devices.
Unit – V
Working with Windows and DOS Systems: understanding file systems, exploring Microsoft File Structures, Examining NTFS disks, Understanding whole disk encryption, windows registry, Microsoft startup tasks, MS-DOS startup tasks, virtual machines.
Text Books:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Reference Books:
- Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley Pearson Education
- Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer International edition.
For detail syllabus of all other subjects of B.Tech Computer Science Engineering 4th Year 2nd Sem , visit CSE 4th Year 2nd Sem syllabus subjects.
For B.Tech Computer Science Engineering (CSE) 4th Year results, visit JNTUH B.Tech Computer Science Engineering semester results direct link.