{"id":6894,"date":"2024-04-04T10:37:34","date_gmt":"2024-04-04T10:37:34","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/4289-cyber-forensics-lab-syllabus-for-cyber-forensics-information-security-4th-sem-2021-revision-sitttr\/"},"modified":"2024-04-04T10:37:34","modified_gmt":"2024-04-04T10:37:34","slug":"4289-cyber-forensics-lab-syllabus-for-cyber-forensics-information-security-4th-sem-2021-revision-sitttr","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/4289-cyber-forensics-lab-syllabus-for-cyber-forensics-information-security-4th-sem-2021-revision-sitttr\/","title":{"rendered":"4289: Cyber Forensics Lab Syllabus for Cyber Forensics &amp; Information Security 4th Sem 2021 Revision SITTTR"},"content":{"rendered":"<p align=\"justify\">Cyber Forensics Lab detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Cyber Forensics &amp; Information Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Forensics &amp; Information Security 4th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/sitttr-diploma-cyber-forensics-information-security-cf-syllabus-for-4th-sem-2021-revision\">Cyber Forensics &amp; Information Security (CF) 4th Sem 2021 revision scheme<\/a>. The detailed syllabus of cyber forensics lab is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<ul>\n<li>To study various forensics tools for forensic investigation.<\/li>\n<li>Recover deleted files.<\/li>\n<li>Use of Autopsy for live forensic investigation.<\/li>\n<\/ul>\n<p><h4>Course Outcomes:<\/h4>\n<p>On completion of the course student will be able to:<\/p>\n<ol>\n<li>Create a Forensic image using FTK Imager<\/li>\n<li>Implement Data Acquisition, acquisition of cell phones and mobile phones<\/li>\n<li>Recovering and inspecting deleted files using forensic tools<\/li>\n<li>Generate report using ProDiscover and FTK<\/li>\n<\/ol>\n<p><h4>Module 1:<\/h4>\n<ol>\n<li>Study of Computer Forensics and different tools used for forensic investigation\t5\tUnderstanding<\/li>\n<li>Create a Forensic image using FTK Imager, create forensic image, check integrity of data, analyze forensic image.<\/li>\n<\/ol>\n<p><h4>Module 2:<\/h4>\n<ol>\n<li>Perform data Acquisition using USB write Blocker+ FTK imager<\/li>\n<li>Acquisition of cell phones and mobile phones<\/li>\n<\/ol>\n<p><h4>Module 3:<\/h4>\n<ol>\n<li>Create a malicious document<\/li>\n<li>Delete the file<\/li>\n<li>Create an image<\/li>\n<li>Recover deleted file<\/li>\n<\/ol>\n<p><h4>Module 4:<\/h4>\n<ol>\n<li>Create report using ProDiscover<\/li>\n<li>Create report using FTK<\/li>\n<li>Open ended projects<\/li>\n<\/ol>\n<p><h4>Sample Open Ended Projects<\/h4>\n<p>(Not for End Semester Examination but compulsory to be included in Continuous Internal Evaluation.<br \/>\nStudents can do open-ended experiments as a group of 2-3. There is no duplication in experiments between groups.)<\/p>\n<ol>\n<li>Study the steps for hiding and extract any text file behind an image file\/audio file using command prompt<\/li>\n<li>Live forensic case investigation using Autopsy<\/li>\n<\/ol>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>David Benton and Frank Grindstaff ,Practical guide to Computer Forensics -Book Surge Publishing,2006, ISBN-10: 1419623877<\/li>\n<\/ol>\n<p><h4>Online Resources<\/h4>\n<ol>\n<li>https:\/\/www.geeksforgeeks.org\/how-to-create-a-forensic-image-with-ftk-imager\/<\/li>\n<li>https:\/\/medium.eom\/@tusharcool118\/autopsy-tutorial-for-digital-forensics-707ea5d5994d<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Forensics &amp; Information Security (CF), 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/sitttr\/cf\">Cyber Forensics &amp; Information Security 4th Sem subject syllabuses for 2021 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-syllabus\/\"> SITTTR diploma all branches syllabus.<\/a>. <\/p>\n<p align=\"justify\">To see the results of Cyber Forensics &amp; Information Security (CF) of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-results\/\"> SITTTR diploma Cyber Forensics &amp; Information Security (CF) results.<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Forensics &amp; Information Security academic calendars, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-academic-calendar\/\"> Cyber Forensics &amp; Information Security all semesters academic calendar<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Forensics Lab detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber Forensics [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[35,79],"tags":[],"class_list":["post-6894","post","type-post","status-publish","format-standard","hentry","category-4th-sem","category-cf"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/6894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=6894"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/6894\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=6894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=6894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=6894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}