{"id":6890,"date":"2024-04-04T10:37:25","date_gmt":"2024-04-04T10:37:25","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/4282-cyber-forensics-and-security-threats-syllabus-for-cyber-forensics-information-security-4th-sem-2021-revision-sitttr\/"},"modified":"2024-04-04T10:37:25","modified_gmt":"2024-04-04T10:37:25","slug":"4282-cyber-forensics-and-security-threats-syllabus-for-cyber-forensics-information-security-4th-sem-2021-revision-sitttr","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/4282-cyber-forensics-and-security-threats-syllabus-for-cyber-forensics-information-security-4th-sem-2021-revision-sitttr\/","title":{"rendered":"4282: Cyber Forensics and Security Threats Syllabus for Cyber Forensics &amp; Information Security 4th Sem 2021 Revision SITTTR"},"content":{"rendered":"<p align=\"justify\">Cyber Forensics and Security Threats detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Cyber Forensics &amp; Information Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Forensics &amp; Information Security 4th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/sitttr-diploma-cyber-forensics-information-security-cf-syllabus-for-4th-sem-2021-revision\">Cyber Forensics &amp; Information Security (CF) 4th Sem 2021 revision scheme<\/a>. The detailed syllabus of cyber forensics and security threats is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<p><h4>Course Outcomes:<\/h4>\n<p>On completion of the course, the student will be able to:<\/p>\n<ol>\n<li>Understand basic ideas of Computer Forensics and the forensic investigations<\/li>\n<li>Outline how to acquire data from devices and the theory behind various types of data acquisitions<\/li>\n<li>Describe how to perform analysis and validation of data, prepare reports and expert testimony<\/li>\n<li>Summarize various security threats<\/li>\n<\/ol>\n<p><h4>Module 1:<\/h4>\n<p>Introduction to Computer Forensics &#8211; history of computer forensics, understanding case law, preparing for computer investigations, understanding corporate investigations, maintaining professional conduct. Understanding Computer Investigations &#8211; Preparing a computer investigation, taking a systematic approach, procedures for corporate high tech investigations, understanding data recovery workstations and software, conducting an investigation, completing the case. Requirements for forensic lab certificationdetermining the physical requirements for a computer forensics lab, selecting a basic forensic workstation.\n<\/p>\n<p><h4>Module 2:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<p><h4>Module 3:<\/h4>\n<p>Analysis and validation-determining what data to collect and analyse, validating forensic data, addressing data-hiding techniques, performing remote acquisitions. Report writing for high tech investigations &#8211; importance of reports, guidelines for writing, generating report findings with forensics software tools.\n<\/p>\n<p><h4>Module 4:<\/h4>\n<p>Security threats: Introduction: Security threats &#8211; Sources of security threats- Motives -Target Assets and vulnerabilities &#8211; Consequences of threats- E-mail threats &#8211; Web-threats -Intruders and Hackers, Insider threats, Cyber crimes. Network Threats: Active\/ Passive -Interference &#8211; Interception -Impersonation &#8211;\tWorms -Virus &#8211; Spam&#8217;s &#8211; Ad ware &#8211; Spy ware &#8211; Trojans and covert channels -Backdoors &#8211;\tBots &#8211; IP Spoofing &#8211; ARP spoofing &#8211; Session Hijacking &#8211; Sabotage-Internal threats Environmental threats &#8211; Threats to Server security\n<\/p>\n<p><h4>Text Books:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>David Benton and Frank Grindstaff ,Practical guide to Computer Forensics &#8211; Book Surge Publishing,2006, ISBN-10: 1419623877<\/li>\n<li>Christopher L.T Brown Charles ,Computer Evidence: Collection &amp; Preservation &#8211; River Media publishing, Edition 1, 2005 ISBN-10: 1584504056<\/li>\n<li>Elizabeth Bauchner, Computer Investigation ( Forensics, the Science of crimesolving) &#8211; Mason Crest Publishers, 2005 ISBN-10: 1422200353<\/li>\n<li>Keith J. Jones, Richard Bejtlich and Curtis W. Rose, Real Digital Forensics &#8211; Addison-Wesley publishers, 2005 ISBN-10: 0321240693<\/li>\n<li>Swiderski, Frank and Syndex, &#8220;Threat Modeling&#8221;, Microsoft Press, 2004. 2.<\/li>\n<li>William Stallings and Lawrie Brown, &#8220;Computer Security: Principles and Practice&#8221;, Prentice Hall<\/li>\n<\/ol>\n<p><h4>Online Resources<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Forensics &amp; Information Security (CF), 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/sitttr\/cf\">Cyber Forensics &amp; Information Security 4th Sem subject syllabuses for 2021 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-syllabus\/\"> SITTTR diploma all branches syllabus.<\/a>. <\/p>\n<p align=\"justify\">To see the results of Cyber Forensics &amp; Information Security (CF) of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-results\/\"> SITTTR diploma Cyber Forensics &amp; Information Security (CF) results.<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Forensics &amp; Information Security academic calendars, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-academic-calendar\/\"> Cyber Forensics &amp; Information Security all semesters academic calendar<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Forensics and Security Threats detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[35,79],"tags":[],"class_list":["post-6890","post","type-post","status-publish","format-standard","hentry","category-4th-sem","category-cf"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/6890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=6890"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/6890\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=6890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=6890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=6890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}