CS&F Sylabus
CS&F Sylabus
CS&F Sylabus
2020 – 21
L T P C
IV Year – I Semester
3 0 0 3
CYBER SECURITY & FORENSICS
(Professional Elective-III)
Course Objectives:
The aim of the course is to
x identify security risks and take preventive steps
x understand the forensics fundamentals
x understand the evidence capturing process
x understand the preservation of digital evidence
UNIT I:
Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word, Cybercrime
and Information Security, Cybercriminals, Classifications of Cybercrime, Cyberstalking, Cybercafe
and Cybercrimes, Botnets. Attack Vector, Proliferation of Mobile and Wireless Devices, Security
Challenges Posed by Mobile Devices, Attacks on Mobile/Cell Phones, Network and Computer Attacks.
UNIT II:
Tools and Methods : Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and
Spywares, Virus and Worms, Trojan Horses and Backdoors, Steganography, Sniffers, Spoofing, Session
Hijacking Buffer over flow, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless
Networks, Identity Theft (ID Theft), Foot Printing and Social Engineering, Port Scanning, Enumeration.
UNIT III:
Cyber Crime Investigation: Introduction, Investigation Tools, eDiscovery, Digital Evidence Collection,
Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Hands on
Case Studies. Encryption and Decryption Methods, Search and Seizure of Computers, Recovering Deleted
Evidences, Password Cracking.
UNIT IV:
Computer Forensics and Investigations: Understanding Computer Forensics, Preparing for Computer
Investigations. Current Computer Forensics Tools: Evaluating Computer Forensics Tools, Computer
Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software,
Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics, Linux System
Forensics, Graphics and Network Forensics, E-mail Investigations, Cell Phone and Mobile Device
Forensics.
UNIT V:
Cyber Crime Legal Perspectives: Introduction, Cybercrime and the Legal Landscape around the World,
The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India, Consequences of Not
Addressing the Weakness in Information Technology Act, Digital Signatures and the Indian IT Act,
Amendments to the Indian IT Act, Cybercrime and Punishment, Cyberlaw, Technology and Students:
Indian Scenario.
R-20 Syllabus for IT, JNTUK w. e. f. 2020 – 21
Text Books:
1. Sunit Belapure Nina Godbole “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, WILEY, 2011.
2. Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage
Learning, New Delhi, 2009.
Reference Books:
1. Michael T. Simpson, Kent Backman and James E. Corley, “Hands on Ethical Hacking and
Network Defence”, Cengage, 2019.
2. Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New
Delhi.
3. Alfred Basta, Nadine Basta,Mary Brown and Ravinder Kumar “Cyber Security and Cyber
Laws” , Cengage,2018.
E-Resources:
1. CERT-In Guidelines- http://www.cert-in.org.in/
2. https://www.coursera.org/learn/introduction-cybersecurity-cyber-attacks [ Online Course]
3. https://computersecurity.stanford.edu/free-online-videos [ Free Online Videos]
4. Nickolai Zeldovich. 6.858 Computer Systems Security. Fall 2014. Massachusetts Institute of
Technology: MIT OpenCourseWare, https://ocw.mit.edu License: Creative Commons BY-NC-
SA.