Syllabus

JNTUH B.Tech 2016-2017 (R16) Detailed Syllabus Computer Forensics

Computer Forensics Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Computer Forensics B.Tech 2016-2017 (R16) third year second sem is as follows.

B.Tech. III Year II Sem.      L/T/P/C
Course Code:IT613PE           3/0/0/3

UNIT – I:  Computer Forensics Fundamentals: What is Computer Forensics?, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources/Employment Proceedings, Computer Forensics Services, Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics Specialists Types of Computer Forensics Technology: Types of Military Computer Forensic Technology, Types of Law Enforcement — Computer Forensic Technology — Types of Business Computer Forensic Technology Computer Forensics Evidence and Capture: Data Recovery Defined — Data Back-up and Recovery — The Role of Back-up in Data Recovery — The Data-Recovery Solution.

UNIT-II:  Evidence Collection and Data Seizure: Why Collect Evidence? Collection Options — Obstacles — Types of Evidence — The Rules of Evidence — Volatile Evidence — General Procedure — Collection and Archiving — Methods of Collection — Artifacts — Collection Steps — Controlling Contamination: The Chain of Custody Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene — Computer Evidence Processing Steps — Legal Aspects of Collecting and Preserving Computer Forensic Evidence Computer Image Verification and Authentication: Special Needs of Evidential Authentication — Practical Consideration —Practical Implementation.

UNIT – III: Computer Forensics analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions Network Forensics: Network forensics overview, performing live acquisitions, developing standard procedures for network forensics, using network tools, examining the honeynet project. Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in private-sector incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case

Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.

TEXT BOOKS

  • Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.
  • Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE Learning

REFERENCE BOOKS

  • Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison Wesley Pearson Education
  • Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer International edition.
  • Computer Evidence Collection & Presentation by Christopher L.T. Brown, Firewall Media.
  • Homeland Security, Techniques & Technologies by Jesus Mena, Firewall Media.
  • Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robert M. Slade, TMH 2005
  • Windows Forensics by Chad Steel, Wiley India Edition

For all other B.Tech 3rd Year 2nd Sem syllabus go to JNTUH B.Tech Information Technology 3rd Year 2nd Sem Course Structure for (R16) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.