4th Sem, CF

4282: Cyber Forensics and Security Threats Syllabus for Cyber Forensics & Information Security 4th Sem 2021 Revision SITTTR

Cyber Forensics and Security Threats detailed syllabus for Cyber Forensics & Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber Forensics & Information Security students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Cyber Forensics & Information Security 4th Sem scheme and its subjects, do visit Cyber Forensics & Information Security (CF) 4th Sem 2021 revision scheme. The detailed syllabus of cyber forensics and security threats is as follows.

Course Objectives:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

On completion of the course, the student will be able to:

  1. Understand basic ideas of Computer Forensics and the forensic investigations
  2. Outline how to acquire data from devices and the theory behind various types of data acquisitions
  3. Describe how to perform analysis and validation of data, prepare reports and expert testimony
  4. Summarize various security threats

Module 1:

Introduction to Computer Forensics – history of computer forensics, understanding case law, preparing for computer investigations, understanding corporate investigations, maintaining professional conduct. Understanding Computer Investigations – Preparing a computer investigation, taking a systematic approach, procedures for corporate high tech investigations, understanding data recovery workstations and software, conducting an investigation, completing the case. Requirements for forensic lab certificationdetermining the physical requirements for a computer forensics lab, selecting a basic forensic workstation.

Module 2:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Module 3:

Analysis and validation-determining what data to collect and analyse, validating forensic data, addressing data-hiding techniques, performing remote acquisitions. Report writing for high tech investigations – importance of reports, guidelines for writing, generating report findings with forensics software tools.

Module 4:

Security threats: Introduction: Security threats – Sources of security threats- Motives -Target Assets and vulnerabilities – Consequences of threats- E-mail threats – Web-threats -Intruders and Hackers, Insider threats, Cyber crimes. Network Threats: Active/ Passive -Interference – Interception -Impersonation – Worms -Virus – Spam’s – Ad ware – Spy ware – Trojans and covert channels -Backdoors – Bots – IP Spoofing – ARP spoofing – Session Hijacking – Sabotage-Internal threats Environmental threats – Threats to Server security

Text Books:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Reference Books:

  1. David Benton and Frank Grindstaff ,Practical guide to Computer Forensics – Book Surge Publishing,2006, ISBN-10: 1419623877
  2. Christopher L.T Brown Charles ,Computer Evidence: Collection & Preservation – River Media publishing, Edition 1, 2005 ISBN-10: 1584504056
  3. Elizabeth Bauchner, Computer Investigation ( Forensics, the Science of crimesolving) – Mason Crest Publishers, 2005 ISBN-10: 1422200353
  4. Keith J. Jones, Richard Bejtlich and Curtis W. Rose, Real Digital Forensics – Addison-Wesley publishers, 2005 ISBN-10: 0321240693
  5. Swiderski, Frank and Syndex, “Threat Modeling”, Microsoft Press, 2004. 2.
  6. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, Prentice Hall

Online Resources

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

For detailed syllabus of all other subjects of Cyber Forensics & Information Security (CF), 2021 revision curriculum do visit Cyber Forensics & Information Security 4th Sem subject syllabuses for 2021 revision.

To see the syllabus of all other branches of diploma 2021 revision curriculum do visit SITTTR diploma all branches syllabus..

To see the results of Cyber Forensics & Information Security (CF) of diploma 2021 revision curriculum do visit SITTTR diploma Cyber Forensics & Information Security (CF) results..

For all Cyber Forensics & Information Security academic calendars, visit Cyber Forensics & Information Security all semesters academic calendar direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*