Cyber Forensics detailed syllabus for Information Technology (IT), R18 regulation has been taken from the JNTUHs official website and presented for the students of B.Tech Information Technology branch affiliated to JNTUH course structure. For Course Code, Course Titles, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The syllabus PDF files can also be downloaded from the universities official website.
For all the other IT 4th Year 2nd Sem Syllabus for B.Tech R18 Regulation JNTUH scheme, visit Information Technology 4th Year 2nd Sem R18 Scheme.
For all the (Professional Elective-6) subjects refer to Professional Elective-6 Scheme. The detail syllabus for cyber forensics is as follows.
Prerequisites:
Network Security
Course Objective:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Course Outcome:
- Students will understand the usage of computers in forensic, and how to use various forensic tools for a wide variety of investigations.
- It gives an opportunity to students to continue their zeal in research in computer forensics
Unit – I
Introduction of Cybercrime: Types, The Internet spawns crime, Worms versus viruses, Computers roles in crimes, Introduction to digital forensics, Introduction to Incident – Incident Response Methodology -Steps – Activities in Initial Response, Phase after detection of an incident
Unit – II
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Unit – III
Forensics analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions Network Forensics: Network forensics overview, performing live acquisitions, developing standard procedures for network forensics, using network tools, examining the honeynet project.
Unit – IV
Current Forensic tools: evaluating computer forensic tool needs, computer forensics software tools, computer forensics hardware tools, validating and testing forensics software E-Mail Investigations: Exploring the role of e-mail in investigation, exploring the roles of the client and server in e-mail, investigating e-mail crimes and violations, understanding e-mail servers, using specialized e-mail forensic tools. Cell phone and mobile device forensics: Understanding mobile device forensics, understanding acquisition procedures for cell phones and mobile devices.
Unit – V
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Text Books:
- Kevin Mandia, Chris Prosise, �Incident Response and computer forensics�, Tata McGraw Hill, 2006.
- Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.
- Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE Learning
Reference Books:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
For detail syllabus of all other subjects of B.Tech Information Technology 4th Year 2nd Sem , visit IT 4th Year 2nd Sem syllabus subjects.
For B.Tech Information Technology (IT) 4th Year results, visit JNTUH B.Tech Information Technology semester results direct link.