0% found this document useful (0 votes)
33 views

CS & DF Syllabus

Uploaded by

TORNADO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

CS & DF Syllabus

Uploaded by

TORNADO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Faculty of Engineering Savitribai Phule Pune University

Home
Savitribai Phule Pune University
Fourth Year of Computer Engineering (2019 Course)
Elective III
410244(C): Cyber Security and Digital Forensics
Teaching Scheme: Examination Scheme:
Credit
TH: 03 Hours/Week In-Sem (Paper): 30 Marks
03
End-Sem (Paper): 70 Marks
Prerequisite Courses: Computer Networks and Security(310244), Information Security(310254(A))
Companion Course: 410246: Laboratory Practice IV
Course Objectives:
• To enhance awareness cyber forensics.
• To understand issues in cyber crime and different attacks
• To understand underlying principles and many of the techniques associated with the digital forensic
practices
• To know the process and methods of evidence collection
• To analyze and validate forensic data collected.
• To apply digital forensic knowledge to use computer forensic tools and investigation report writing.
Course Outcomes: At the end of the course, the student should be able to:
CO1: Analyze threats in order to protect or defend it in cyberspace from cyber-attacks.
CO2: Build appropriate security solutions against cyber-attacks.
CO3:Underline the need of digital forensic and role of digital evidences.
CO4: Explain rules and types of evidence collection
CO5: Analyze, validate and process crime scenes
CO6: Identify the methods to generate legal evidence and supporting investigation reports.
Course Contents
Unit 1 Introduction to Cyber Security 06 Hours
Introduction and Overview of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber Crime: crime
against an individual, Crime against property, Cyber extortion, Drug trafficking, cyber terrorism. Need for
Information security, Threats to Information Systems, Information Assurance, Cyber Security, and Security Risk
Analysis.
#Exemplar/Case Studies Data Breach Digest – Perspective & Reality :
http://verizonenterprise.com/databreachdigest
*Mapping of Course Outcome CO1
for Unit I
Unit 2 Cyber Crime Issues and Cyber attacks 06 Hours
Unauthorized Access to Computers, Computer Intrusions, Viruses, and Malicious Code, Internet Hacking and
Cracking, Virus and worms, Software Piracy, Intellectual Property, Mail Bombs, Exploitation, Stalking and
Obscenity in Internet, Cybercrime prevention methods, Application security (Database, E-mail, and Internet), Data
Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and
VPNs, Hardware protection mechanisms, OS Security
#Exemplar/Case Studies Cyber Stalking types & their cases respectively
*Mapping of Course Outcome CO2
for Unit II
Unit 3 Introduction to Digital Forensics 06 Hours
What is Computer Forensics?, Use of Computer Forensics in Law Enforcement, Computer Forensics
Assistance to Human Resources/Employment Proceedings, Computer Forensics Services, Benefits of
Syllabus for Fourth Year of Computer Engineering ` #26/128
Faculty of Engineering Savitribai Phule Pune University
Professional Forensics Methodology, Steps taken by Computer Forensics Specialists Types of Computer
Forensics Technology: Types of Military Computer Forensic Technology, Types of Law Enforcement —
Computer Forensic Technology, Types of Business Computer Forensic Technology Computer Forensics
Evidence and Capture: Data Recovery Defined, Data Back-up and Recovery, The Role of Back-up in Data
Recovery, The Data-Recovery Solution.
#Exemplar/Case Studies Demonstrate practice Linux networking security recovery commands.&
Study Tools viz; FTK & The Sleuth Kit
*Mapping of Course Outcome CO3
for Unit III
Unit 4 Evidence Collection and Data Seizure 06 Hours
Why Collect Evidence? Collection Options ,Obstacles, Types of Evidence — The Rules of Evidence, Volatile
Evidence, General Procedure, Collection and Archiving, Methods of Collection, Artifacts, Collection Steps,
Controlling Contamination: The Chain of Custody Duplication and Preservation of Digital Evidence:
Preserving the Digital Crime Scene — Computer Evidence Processing Steps, Legal Aspects of Collecting and
Preserving Computer Forensic Evidence Computer Image Verification and Authentication: Special Needs of
Evidential Authentication, Practical Consideration, Practical Implementation.
#Exemplar/Case Studies Understand how computer forensics works by visiting:
http://computer.howstuffworks.com/computer-forensic.htm/printable(23
December 2010)
*Mapping of Course Outcome CO4
for Unit IV
Unit 5 Computer Forensics analysis and validation 06 Hours
Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, and
performing remote acquisitions Network Forensics: Network forensics overview, performing live acquisitions,
developing standard procedures for network forensics, using network tools, examining the honeynet project.
Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in private-sector
incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer
incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash,
reviewing a case
#Exemplar/Case Studies Discuss cases under Financial Frauds, Matrimonial Frauds, Job Frauds,
Spoofing, and Social media. Then write down safety tips, precautionary
measures for the discussed fraud cases.
*Mapping of Course Outcomes CO5
for Unit V
Unit 6 Current Computer Forensic tools 06 Hours
Evaluating computer forensic tool needs, computer forensics software tools, computer forensics hardware
tools, validating and testing forensics software E-Mail Investigations: Exploring the role of e-mail in
investigation, exploring the roles of the client and server in e-mail, investigating e-mail crimes and violations,
understanding e-mail servers, using specialized e-mail forensic tools.
#Exemplar/Case Studies Install Kali Linux & practice following examples:
1. https://www.youtube.com/watch?time_continue=6&v=MZXZctqIU-
w&feature=emb_logo

*Mapping of Course Outcome for CO6


Unit VI
Learning Resources
Text Books:
1. John R. Vacca, “Computer Forensics”, Computer Crime Investigation Firewall Media, New Delhi.
2. Nelson, Phillips Enfinger, Steuart, “Computer Forensics and Investigations”, CENGAGE Learning
Reference Books:
Syllabus for Fourth Year of Computer Engineering ` #27/128

You might also like