{"id":5223,"date":"2018-01-20T08:37:47","date_gmt":"2018-01-20T08:37:47","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=5223"},"modified":"2019-07-15T08:58:46","modified_gmt":"2019-07-15T08:58:46","slug":"jntuh-b-tech-2016-2017-r16-detailed-syllabus-computer-forensics","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-2016-2017-r16-detailed-syllabus-computer-forensics\/","title":{"rendered":"JNTUH B.Tech 2016-2017 (R16) Detailed Syllabus Computer Forensics"},"content":{"rendered":"<p>Computer Forensics Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Computer Forensics B.Tech 2016-2017 (R16) third year second sem is as follows.<\/p>\n<p>B.Tech. III Year II Sem. \u00a0 \u00a0 \u00a0L\/T\/P\/C<br \/>\nCourse Code:IT613PE \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 3\/0\/0\/3<\/p>\n<p><strong>UNIT &#8211; I: \u00a0Computer Forensics Fundamentals:<\/strong> What is Computer Forensics?, Use of Computer\u00a0Forensics in Law Enforcement, Computer Forensics Assistance to Human\u00a0Resources\/Employment Proceedings, Computer Forensics Services, Benefits of Professional\u00a0Forensics Methodology, Steps taken by Computer Forensics Specialists Types of Computer\u00a0Forensics Technology: Types of Military Computer Forensic Technology, Types of Law\u00a0Enforcement \u2014 Computer Forensic Technology \u2014 Types of Business Computer Forensic\u00a0Technology Computer Forensics Evidence and Capture: Data Recovery Defined \u2014 Data\u00a0Back-up and Recovery \u2014 The Role of Back-up in Data Recovery \u2014 The Data-Recovery\u00a0Solution.<\/p>\n<p><strong>UNIT-II: \u00a0Evidence Collection and Data Seizure:<\/strong> Why Collect Evidence? Collection Options \u2014\u00a0Obstacles \u2014 Types of Evidence \u2014 The Rules of Evidence \u2014 Volatile Evidence \u2014 General\u00a0Procedure \u2014 Collection and Archiving \u2014 Methods of Collection \u2014 Artifacts \u2014 Collection\u00a0Steps \u2014 Controlling Contamination: The Chain of Custody Duplication and Preservation of\u00a0Digital Evidence: Preserving the Digital Crime Scene \u2014 Computer Evidence Processing\u00a0Steps \u2014 Legal Aspects of Collecting and Preserving Computer Forensic Evidence Computer\u00a0Image Verification and Authentication: Special Needs of Evidential Authentication \u2014\u00a0Practical Consideration \u2014Practical Implementation.<\/p>\n<p><strong>UNIT &#8211; III:\u00a0Computer Forensics analysis and validation:<\/strong> Determining what data to collect and analyze,\u00a0validating forensic data, addressing data-hiding techniques, performing remote acquisitions\u00a0Network Forensics: Network forensics overview, performing live acquisitions, developing\u00a0standard procedures for network forensics, using network tools, examining the honeynet\u00a0project.\u00a0Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in\u00a0private-sector incident scenes, processing law enforcement crime scenes, preparing for a\u00a0search, securing a computer incident or crime scene, seizing digital evidence at the scene,\u00a0storing digital evidence, obtaining a digital hash, reviewing a case<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p><strong>TEXT BOOKS<\/strong><\/p>\n<ul>\n<li>Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall\u00a0Media, New Delhi.<\/li>\n<li>Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,\u00a0CENGAGE Learning<\/li>\n<\/ul>\n<p><strong>REFERENCE BOOKS<\/strong><\/p>\n<ul>\n<li>Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison Wesley\u00a0Pearson Education<\/li>\n<li>Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson,\u00a0Springer International edition.<\/li>\n<li>Computer Evidence Collection &amp; Presentation by Christopher L.T. Brown, Firewall\u00a0Media.<\/li>\n<li>Homeland Security, Techniques &amp; Technologies by Jesus Mena, Firewall Media.<\/li>\n<li>Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robert\u00a0M. Slade, TMH 2005<\/li>\n<li>Windows Forensics by Chad Steel, Wiley India Edition<\/li>\n<\/ul>\n<p>For all other B.Tech 3rd Year 2nd Sem syllabus go to <a href=\"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-third-year-second-sem-information-technology-course-structure-2016-2017-r16-batch\/\">JNTUH B.Tech Information Technology 3rd\u00a0Year 2nd Sem Course Structure for (R16) Batch.<\/a><\/p>\n<p>All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer Forensics Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-5223","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=5223"}],"version-history":[{"count":3,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5223\/revisions"}],"predecessor-version":[{"id":18469,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5223\/revisions\/18469"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=5223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=5223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=5223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}