Syllabus

JNTUK B.Tech High Digital Forensics (Elective – II) for R13 Batch.

JNTUK B.Tech Digital Forensics (Elective – II) gives you detail information of Digital Forensics (Elective – II) R13 syllabus It will be help full to understand you complete curriculum of the year.

Course Objectives

  • This course is intended to provide students with greater depth of study in a number of key topics in the area of computer security in society: cybercrime, computer and forensics, analysis

Course Outcomes

  • Understand financial and accounting forensics, and explain their role in preventing various forms of fraud.
  • Distinguish various types of computer crime, and use computer forensic techniques to identify the digital fingerprints associated with criminal activities

Syllabus

Unit-I: Computer Forensics and Investigations: Understanding Computer Forensics, Preparing for Computer Investigations, Taking A Systematic Approach, Procedure for Corporate High-Tech Investigations, Understanding Data Recovery Workstations and Software,
Investor’s Office and Laboratory: Understanding Forensics Lab Certification Requirements, Determining the Physical Requirements for a Computer Forensics Lab, Selecting a Basic Forensic Workstation.

Unit-II: Data Acquisition: Understanding Storage Formats for Digital Evidence, Determining the Best Acquisition Method, Contingency Planning for Image Acquisitions, Using Acquisition Tools, Validating Data Acquisition, Performing RAID Data Acquisition, Using Remote Network Acquisition Tools, Using Other Forensics Acquisition Tools.

Unit-III: Processing Crime and Incident Scenes: Identifying Digital Evidence, Collecting the Evidence in Private-Sector Incident Scenes, Processing law Enforcement Crime Scenes, Preparing for a Search, Securing a Computer Incident or Crime Scene, Sizing Digital evidence at the Scene, Storing Digital evidence, obtaining a Digital Hash.

Unit-IV: Current Computer Forensics Tools: Evaluating Computer Forensics Toll Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software Computer Forensics Analysis and Validation: Determining What Data to Collect and Anlyze, Validating Forensic Data, Addressing Data-Hiding Techniques, Performing Remote Acquisition

Unit-V: Recovering Graphics and Network Forensics: Recognizing a Graphics File, Understanding Data Compression, Locating and Recovering Graphics Files, Understanding Copyright Issues with Graphics, Network Forensic, Developing Standard Procedure for Network Forensics, Using Network Tools, Examining Hiney Project.

Unit-VI: E-mail Investigations Cell Phone and Mobile Device Forensics: Exploring the Role of E-mail in Investigations, Exploring the Role of Client and Server in E-mail, Investigating E-mail Crimes and Violations, Understanding E-mail Servers, Using Specialized E-mail Forensics Tools, Understanding Mobile Device Forensics, Understanding Acquisition Procedure for Cell Phones and Mobile Devoices.

TEXT BOOK

  • Nelson, Phillips Enfinger,Steuart, “ Computer Forensics and Investigations, Cengage Learning

For more information about all JNTU updates please stay connected to us on FB and don’t hesitate to ask any questions in the comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.