{"id":2047,"date":"2016-07-09T14:15:12","date_gmt":"2016-07-09T14:15:12","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=2047"},"modified":"2019-07-14T05:54:02","modified_gmt":"2019-07-14T05:54:02","slug":"jntuh-b-tech-4th-year-1-sem-information-technology-r13-4-1-computer-forensics-elective-ii-r13-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-4th-year-1-sem-information-technology-r13-4-1-computer-forensics-elective-ii-r13-syllabus\/","title":{"rendered":"JNTUH B.Tech 4th Year 1 sem Information Technology R13 (4-1) Computer Forensics (Elective \u2013 II) R13 syllabus."},"content":{"rendered":"<p>JNTUH B.Tech 4th year (4-1) Computer Forensics gives you detail information of Computer Forensics (Elective \u2013 II) R13 syllabus It will be help full to understand you complete curriculum of the year.<\/p>\n<p><strong>Objectives<\/strong><\/p>\n<ul>\n<li>A brief explanation of the objective is to provide digital evidences which are obtained from digital media.<\/li>\n<li>In order to understand the objectives of computer forensics, first of all, people have to recognize the different roles computer plays in a certain crime.<\/li>\n<li>According to a snippet from the United States Security Service, the functions computer has in different kinds of crimes.<\/li>\n<\/ul>\n<p><strong>UNIT\u2014I<\/strong><\/p>\n<p>Computer Forensics Fundamentals: What is Computer Forensics?, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources\/Employment Proceedings, Computer Forensics Services, Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics Specialists Types of Computer Forensics Technology: Types of Military Computer Forensic Technology, Types of Law Enforcement \u2014 Computer Forensic Technology \u2014 Types of Business Computer Forensic Technology Computer Forensics Evidence and Capture: Data Recovery Defined &#8211; Data Back-up and Recovery \u2014 The Role of Back-up in Data Recovery \u2014 The Data-Recovery Solution<\/p>\n<p><strong>UNIT\u2014II<\/strong><\/p>\n<p>Evidence Collection and Data Seizure: Why Collect Evidence? Collection Options \u2014 Obstacles \u2014 Types of Evidence \u2014 The Rules of Evidence \u2014 Volatilo Evidence \u2014 General Procedure \u2014 Collection and Archiving \u2014 Methods of<\/p>\n<p>Collection \u2014 Artifacts \u2014 Collection Steps \u2014 Controlling Contamination: The Chain of Custody Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene \u2014 Computer Evidence Processing Steps \u2014 Legal Aspects of Collecting and Preserving Computer Forensic Evidence Computer Image Verification and Authentication: Special Needs of Evidential Authentication \u2014 Practical Consideration \u2014 Practical Implementation<\/p>\n<p><strong>UNIT\u2014III<\/strong><\/p>\n<p>Computer Forensics analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions<\/p>\n<p>Network Forensics: Network forensics overview, performing live acquisitions, developing standard procedures for network forensics, using network tools, examining the honeynet project. Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in private\u2014sector incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p><strong>TEXT BOOKS<\/strong><\/p>\n<ul>\n<li>Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.<\/li>\n<li>Computer Forensics and Investigations by Nelson, Phillips Enfinger,Steuart, CENGAGE Learning<\/li>\n<\/ul>\n<p><strong>REFERENCE BOOKS<\/strong><\/p>\n<ul>\n<li>Real Digital Forensics by Keith J. Jones, Richard Bejtlich, Curtis W. Rose, Addison\u2014 VVesley Pearson Education<\/li>\n<li>Forensic Compiling, ATractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer International edition<\/li>\n<li>Computer Evidence Collection &amp; Presentation by Christopher L.T. Brown, Firewall Media.<\/li>\n<li>Homeland Security, Techniques &amp; Technologies by Jesus Mena, Firewall Media.<\/li>\n<li>Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robed M,Slade, TMH 2005<\/li>\n<li>Windows Forensics by Chad Steel, Wiley India Edition.<\/li>\n<\/ul>\n<p><strong>Outcomes<\/strong><\/p>\n<ul>\n<li>Students will be understanding the usage of computers in forensic, and how to use various forensic tools for a wide variety of investigations<\/li>\n<li>It gives an opportunity to students to continue their zeal in research in computer forensics.<\/li>\n<\/ul>\n<p>For more information about all JNTU updates please stay connected to us on FB and don\u2019t hesitate to ask any questions in the comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JNTUH B.Tech 4th year (4-1) Computer Forensics gives you detail information of Computer Forensics (Elective \u2013 II) R13 syllabus It will be help full to understand you complete curriculum of [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-2047","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=2047"}],"version-history":[{"count":3,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2047\/revisions"}],"predecessor-version":[{"id":17432,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2047\/revisions\/17432"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=2047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=2047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=2047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}