Cyber Security & forensic (IT-7004)
rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme
RGPV notes CBGS Bachelor of engineering
Syllabus
UNIT 1:
- Cybercrimes and Attacks
Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation,
Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password Sniffing, Credit Card
Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-the-Middle attack, Password
Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, DoS and
DDoS Attacks, SQL Injection, Buffer Overflow, Malware, Ransomware, Types of Identity Theft,
Techniques of ID Theft, Cyber terrorism, Browser Attacks, Reverse Engineering, Cross site
scripting
UNIT 2:
Cyber Security Concepts
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of Cyber
Security Policy, Elements, Cyber Security Evolution, Implementing Hardware Based Security,
Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident
Response Team, Reporting Cybercrime, Difference between cyber forensics and cyber security
UNIT 3:
Cyber Forensics Fundamentals
Introduction to cyber forensics, needs of cyber forensic, cyber forensic and digital evidences,
Internet Fraud, Storage Fundamentals, File System Concepts, challenges in cyber forensic, Data
and Evidence Recovery- Deleted File Recovery, Data Recovery Tools, Data Recovery Procedures
and Ethics, Preserve and safely handle original media, Document a "Chain of Custody", Complete
time line analysis of computer files based on file creation, file modification and file access,
Recover Internet Usage Data, Recover Swap Files/Temporary Files/Cache Files, Introduction to
Encase Forensic Edition, Forensic Tool Kit (FTK) etc,
UNIT 4:
Cyber Forensics Investigation Introduction to Cyber Forensic Investigation, Investigation
Tools, e-Discovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail
Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of
Computers, Recovering deleted evidences, Password Cracking.
UNIT 5:
Cyber Laws
Introduction to IT laws & Cyber Crimes, Cyber Laws, IPR, Legal System of Information
Technology, Social Engineering,
NOTES
- Unit 1
- Unit 2
- Unit 3
- Unit 4
- Unit 5
Books Recommended
1. Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiley
2. Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss
Cyber Security Policy Guidebook, John Wiley & Sons 2012.
3. Vivek sood, Cyber law simplified, Tata Mc GrawHill, Education (India).
4. Eoghan Casey, Handbook of digital forensic and investigation.
5. Clint P Garrison, Digital forensic for network, internet and cloud computing.
6. Panagiotis Kandlis, Digital crime and forensic science in cyberspace, information society
S.A Greece IDEA Group Publishing.
You May Also Like
- IT-7001 - Cloud Computing
- IT-7002 - Object Oriented Analysis and Design
- IT-7003 - Wireless & Mobile Computing
- IT-7004 - E-Commerce & Governance [Elective-III]
- IT-7004 - Simulation & Modeling [Elective-III]
- IT-7005 - Ad-hoc Network [Elective-IV]
- IT-7005 - Artificial Intelligence (AI) [Elective-IV]
- IT-7005 - Embedded System [Elective-IV]
- IT-7006 - Project -I
- IT-7007 - Industrial Training (Two weeks)