0% found this document useful (0 votes)
345 views1 page

Cyber Forensics Course Overview

The document outlines the objectives and units of a course on cyber forensics. The objectives include learning about network and transport layer security, application layer security, computer forensics tools and techniques, and validating forensics data. The five units cover topics like IPSec, SSL, firewalls, computer forensics introduction and methodology, evidence collection and analysis tools.

Uploaded by

Sindhuja Manohar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
345 views1 page

Cyber Forensics Course Overview

The document outlines the objectives and units of a course on cyber forensics. The objectives include learning about network and transport layer security, application layer security, computer forensics tools and techniques, and validating forensics data. The five units cover topics like IPSec, SSL, firewalls, computer forensics introduction and methodology, evidence collection and analysis tools.

Uploaded by

Sindhuja Manohar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

CS6004 CYBER FORENSICS LT PC

3 00 3
OBJECTIVES:
The student should be made to:
 Learn the security issues network layer and transport layer
 Be exposed to security issues of the application layer
 Learn computer forensics
 Be familiar with forensics tools
 Learn to analyze and validate forensics data

UNIT I NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY 9


IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec .Transport
layer Security: SSL protocol, Cryptographic Computations – TLS Protocol.

UNIT II E-MAIL SECURITY & FIREWALLS 9


PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related
terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.

UNIT III INTRODUCTION TO COMPUTER FORENSICS 9


Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime.
Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response
methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and
IR team. - Forensics Technology and Systems - Understanding Computer Investigation –Data
Acquisition.

UNIT IV EVIDENCE COLLECTION AND FORENSICS TOOLS 9


Processing Crime and Incident Scenes – Working with Windows and DOS Systems. Current Computer
Forensics Tools: Software/ Hardware Tools.

UNIT V ANALYSIS AND VALIDATION 9


Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network
Forensics – Email Investigations – Cell Phone and Mobile Devices Forensics
TOTAL: 45 PERIODS
TEXT BOOKS:
1. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, Wiley
Publications, 2003.
2. Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and Investigations”, Cengage Learning,
India Edition, 2008.

REFERENCES:
1. John [Link], “Computer Forensics”, Cengage Learning, 2005
2. Richard [Link], “Internet Cryptography”, 3rd Edition Pearson Education, 2008.
3. Marjie [Link], “Computer Forensics and Cyber Crime”: An Introduction”, 3rd Edition, Prentice Hall,
2013.

You might also like