M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Computer Forensics Tools and Ethical Hacking Lab

Computer Forensics Tools and Ethical Hacking Lab Detailed Syllabus for Cyber Forensics & Information Security / Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Computer Forensics Tools and Ethical Hacking Lab M.Tech 2017-2018 (R17) first year second sem is as follows.

M.Tech. I Year II Sem.

PART-I

ETHICAL HACKING LAB (Indicative list of experiments)

  • Using Active and Passive Techniques for scanning Networks, Enumeration, sniffing to Enumerate Network Hosts.
  • Conducting Active and Passive Footprinting and Reconnaissance against Target.
  • Using Armitage to Attack the Network.
  • Using Metasploit to Attack a Remote System – Scanning Networks, Enumeration, Sniffers, Evading IDS, Firewalls, and Honeypots.
  • Using Malware – Dark Comet for System Hacking, Trojans and Backdoors, Viruses and Worms.
  • Using the SHARK Remote Administration Tool for System Hacking, Trojans and Backdoors, Viruses and Worms.
  • Attacking a System- Using the SYSTEM account – System Hacking, Intrusion Detection – Evading IDS, Firewalls, and Honeypots.
  • Web-Based Hacking Servers and Applications for exploitation with IPv6 – System Hacking, Denial of Service, SQL Injection – Hacking Webservers, Hacking Web Applications, SQL Injection, LaunchingaBuffer Overflow – System Hacking, Buffer Overflow.
  • Cryptography – Breaking Windows Passwords –System Hacking, Using John the Ripper to Crack Linux Passwords – System Hacking, Using Certificates to Encrypt Email–Cryptography.

COMPUTER FORENSICS TOOLS LAB

PART-I
To perform the following tasks for the lab, Internet facility and open source tools should be provided.

  • Use a Web search engine, such as Google or Yahoo!, and search for companies specializing in computer forensics. Select three and write a two-to three-page paper comparing what each company does.(Project 1-1)
  • Search the Internet for articles on computer crime prosecutions. Find at least two. Write one to two pages summarizing the two articles and identify key features of the decisions you find in your search. (Project 1-5)
  • Use a Web search engine, search for various computer forensics tools.
  • Preparing and processing of investigations. Try to examine and identify the evidences from the drives. (Project 2-1)
  • Extracting of files that have been deleted.( (Project 2-4)
  • Illustrate any Data acquisition method and validate. Use an open source data acquisition tool.
  • You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report needs to be filed. What should you do? Write a two-page paper specifying who in your company you need to talk to first and what evidence must be turned over to the police.(Project 5-2)
  • Create a file on a USB drive and calculate its hash value like FTK Imager. Change the file and calculate the hash value again to compare the files.(Project 5-4)
  • Compare two files created in Microsoft Office to determine whether the files are different at the hexadecimal level. Keep a log of what you find. (Project 6-1)
  • Illustrate the analysis of forensic data.
  • Illustrate the validating of forensic data.
  • Locate and extract Image (JPEG) files with altered extensions.(Project 10-1)
  • Examine or Investigate an E-mail message.

TEXT BOOK:

  • “Computer Forensics and Investigations”, Nelson, Phillips Enfinger, Steuart, Cengage Learning.

REFERENCES:

  • Brian Carrier , “File System Forensic Analysis” , Addison Wesley, 2005
  • Dan Farmer & Wietse Venema ,”Forensic Discovery”, Addison Wesley, 2005
  • Eoghan Casey , ―Digital Evidence and Computer Crime ―, Edition 3, Academic Press, 2011
  • Chris Pogue, Cory Altheide, Todd Haverkos ,Unix and Linux Forensic Analysis DVD ToolKit, Syngress Inc. , 2008
  • Harlan Carvey ,Windows Forensic Analysis DVD Toolkit, Edition 2, Syngress Inc. , 2009
  • Harlan Carvey ,Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry , Syngress Inc, Feb 2011
  • Eoghan Casey, Handbook of Digital Forensics and Investigation, Academic Press, 2009
  • Gonzales/ Woods/ Eddins, Digital Image Processing using MATLAB, 2nd edition, Gatesmark Publishing, ISBN 9780982085400
  • N.Efford, Digital Image Processing, Addison Wesley 2000, ISBN 0-201-59623-7
  •  M Sonka, V Hlavac and R Boyle, Image Processing, Analysis and Machine Vision, PWS
  • 1999, ISBN 0-534-95393-
  •  Pratt.W.K., Digital Image Processing, John Wiley and Sons, New York, 1978

For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Cyber Forensics & Information Security / Cyber Security  1st Year 2nd Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.