M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Computer Forensics

Computer Forensics Detailed Syllabus for Cyber Forensics & Information Security / Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Computer Forensics M.Tech 2017-2018 (R17) first year second sem is as follows.

M.Tech. I Year II Sem.

Course Objectives:

  • To understand the cyberspace.
  • To understand the forensics fundamentals.
  • To understand the evidence capturing process.
  • To understand the preservation of digital evidence.

UNIT – I : Computer Forensics Fundamentals: Introduction to Computer Forensics, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources/Employment Proceedings, Computer Forensics Services, Benefits of Professional Forensics Methodology, Steps Taken by Computer Forensics Specialists, Who Can Use Computer Forensic Evidence?.Types of Computer Forensics Technology : Types of Military Computer Forensic Technology, Types of Law Enforcement Computer Forensic Technology, Types of Business Computer Forensics Technology.

UNIT- II : Computer Forensics Evidence and Capture: Data Recovery: Data Recovery Defined, Data Backup and Recovery, The Role of Backup in Data Recovery, The Data-Recovery Solution, Case Histories. Evidence Collection and Data Seizure: Why Collect Evidence?, Collection Options, Obstacles, Types of Evidence, The Rules of Evidence, Volatile Evidence, General Procedure,
Collecting and Archiving, Methods of Collection, Artifacts, Collection Steps, Controlling Contamination: The Chain of Custody.

UNIT III: Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene, Computer Evidence Processing Steps, Legal Aspects of Collecting And Preserving Computer Forensic Evidence. Computer Image Verification and Authentication : Special Needs of Evidential Authentication, Practical Considerations, Practical Implementation.

UNIT IV: Computer Forensics Analysis: Discovery of Electronic Evidence: Electronic Document Discovery: A Powerful New Litigation Tool, Identification of Data: Timekeeping, Time Matters,Forensic Identification and Analysis of Technical Surveillance Devices. Reconstructing Past Events: How to Become a Digital Detective, Useable File Formats, Unusable File Formats, Converting Files. Networks: Network Forensics Scenario, A Technical Approach, Destruction of Email, Damaging Computer Evidence, International Principles Against Damaging of Computer Evidence, Tools Needed for Intrusion Response to the Destruction of Data, Incident Reporting and Contact Forms.

UNIT V: Current Computer Forensics Tools: Evaluating Computer Forensics Tool Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software.

TEXT BOOKS:

  • “Computer Forensics : Computer Crime Scene Investigation”, JOHN R. VACCA, Firewall Media.
  • “Guide to Computer Forensics and Investigations” 4e, Nelson, Phillips Enfinger, Steuart, Cengage Learning.

REFERENCES:

  • “Computer Forensics and Cyber Crime”, Marjie T Britz, Pearson Education.
  • “Computer Forensics”, David Cowen, Mc Graw Hill.
  • Brian Carrier , “File System Forensic Analysis” , Addison Wesley, 2005
  • Dan Farmer & Wietse Venema ,”Forensic Discovery”, Addison Wesley, 2005
  • Eoghan Casey , ―Digital Evidence and Computer Crime ―, Edition 3, Academic Press, 2011
  • Chris Pogue, Cory Altheide, Todd Haverkos ,Unix and Linux Forensic Analysis DVD ToolKit, Syngress Inc. , 2008
  • Harlan Carvey ,Windows Forensic Analysis DVD Toolkit, Edition 2, Syngress Inc. , 2009
  • Harlan Carvey ,Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry , Syngress Inc, Feb 2011
  • Eoghan Casey, Handbook of Digital Forensics and Investigation, Academic Press, 2009
  • Gonzales/ Woods/ Eddins, Digital Image Processing using MATLAB, 2nd edition, Gatesmark Publishing, ISBN 9780982085400
  • N.Efford, Digital Image Processing, Addison Wesley 2000, ISBN 0-201-59623-7
  • M Sonka, V Hlavac and R Boyle, Image Processing, Analysis and Machine Vision, PWS
  • 1999, ISBN 0-534-95393-
  • Pratt. W.K., Digital Image Processing, John Wiley and Sons, New York, 1978

For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Cyber Forensics & Information Security / Cyber Security 1st Year 2nd Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.