{"id":1905,"date":"2016-07-02T15:48:42","date_gmt":"2016-07-02T15:48:42","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=1905"},"modified":"2021-10-27T20:39:19","modified_gmt":"2021-10-27T20:39:19","slug":"jntuh-b-tech-4th-year-1-sem-computer-science-and-engineering-r13-4-1-computer-forensics-elective-ii-r13-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-4th-year-1-sem-computer-science-and-engineering-r13-4-1-computer-forensics-elective-ii-r13-syllabus\/","title":{"rendered":"JNTUH B.Tech 4th Year 1 sem Computer Science and Engineering R13 (4-1) Computer Forensics (Elective \u2013 II) R13 syllabus."},"content":{"rendered":"<p style=\"text-align: justify\">JNTUH B.Tech 4th year (4-1) Computer Forensics gives you detail information of Computer Forensics (Elective \u2013 II) R13 syllabus It will be help full to understand you complete curriculum of the year.<\/p>\n<p><strong>Objectives<\/strong><\/p>\n<ul>\n<li style=\"text-align: justify\">A brief explanation of the objective is to provide digital evidences which are obtained from digital media.<\/li>\n<li style=\"text-align: justify\">In order to understand the objectives of computer forensics, first of all, people have to recognize the different roles computer plays in a certain crime.<\/li>\n<li style=\"text-align: justify\">According to a snippet from the United States Security Service, the functions computer has in different kinds of crimes.<\/li>\n<\/ul>\n<p><strong>UNIT\u2014I<\/strong><\/p>\n<p style=\"text-align: justify\">Computer Forensics Fundamentals<strong>:<\/strong> What is Computer Forensics?, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources\/Employment Proceedings, Computer Forensics Services, Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics Specialists Types of Computer Forensics Technology: Types of Military Computer Forensic Technology, Types of Law Enforcement \u2014 Computer Forensic Technology \u2014 Types of Business Computer Forensic Technology Computer Forensics Evidence and Capture: Data Recovery Defined \u2014 Data Back-up and Recovery \u2014 The Role of Back-up in Data Recovery \u2014 The Data-Recovery Solution.<\/p>\n<p style=\"text-align: justify\"><strong>UNIT-II<\/strong><\/p>\n<p style=\"text-align: justify\">Evidence Collection and Data Seizure: Why Collect Evidence? Collection Options \u2014 Obstacles \u2014 Types of Evidence \u2014 The Rules of Evidence \u2014 Volatile Evidence \u2014 General Procedure \u2014 Collection and Archiving \u2014 Methods of Collection \u2014 Artifacts \u2014 Collection Steps \u2014 Controlling Contamination: The Chain of Custody Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene \u2014 Computer Evidence Processing Steps \u2014 Legal Aspects of Collecting and Preserving Computer Forensic Evidence Computer Image Verification and Authentication: Special Needs of Evidential Authentication \u2014 Practical Consideration \u2014Practical Implementation.<\/p>\n<p style=\"text-align: justify\"><strong>UNIT \u2014 III<\/strong><\/p>\n<p style=\"text-align: justify\">Computer Forensics analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions<\/p>\n<p style=\"text-align: justify\">Network Forensics: Network forensics overview, performing live acquisitions, developing standard procedures for network forensics, using network tools, examining the honeynet project.<\/p>\n<p>Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in private-sector incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case.<\/p>\n<p style=\"text-align: center\"><strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/a><\/strong><\/p>\n<p><strong>TEXT BOOKS<\/strong><\/p>\n<ul>\n<li>Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.<\/li>\n<li>Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE Learning<\/li>\n<\/ul>\n<p><strong>REFERENCE BOOKS<\/strong><\/p>\n<ul>\n<li style=\"text-align: justify\">Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley Pearson Education<\/li>\n<li style=\"text-align: justify\">Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer International edition.<\/li>\n<li style=\"text-align: justify\">Computer Evidence Collection &amp; Presentation by Christopher L.T. Brown, Firewall Media.<\/li>\n<li style=\"text-align: justify\">Homeland Security, Techniques &amp; Technologies by Jesus Mena, Firewall Media.<\/li>\n<li style=\"text-align: justify\">Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robert M.Slade, TMH 2005<\/li>\n<li style=\"text-align: justify\">Windows Forensics by Chad Steel, Wiley India Edition.<\/li>\n<\/ul>\n<p><strong>Outcomes<\/strong><\/p>\n<ul>\n<li>Students will understand the usage of computers in forensic, and how to use various forensic tools for a wide variety of investigations.<\/li>\n<li>It gives an opportunity to students to continue their zeal in research in computer forensics.<\/li>\n<\/ul>\n<p>For more information about all JNTU updates please stay connected to us on FB and don\u2019t hesitate to ask any questions in the comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JNTUH B.Tech 4th year (4-1) Computer Forensics gives you detail information of Computer Forensics (Elective \u2013 II) R13 syllabus It will be help full to understand you complete curriculum of [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[2,152,123,62],"tags":[],"class_list":["post-1905","post","type-post","status-publish","format-standard","hentry","category-cse","category-1st-sem-2","category-4th-year","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/1905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=1905"}],"version-history":[{"count":4,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/1905\/revisions"}],"predecessor-version":[{"id":17390,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/1905\/revisions\/17390"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=1905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=1905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=1905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}