- 1.1 Introduction to Cyber Crimes
- 1.2 Traditional Crime vs Cyber Crime
- 1.3 Classification of Cybercrimes
- 1.4 Worms and Virus and its Difference
- 1.5 Digital Forensics
- 1.6 Evidence with its Characteristics and Ethical issues
- 1.7 Incident and Incident Response Goals
- 1.8 Incident Response Methodology
- 1.9 Importance of Digital Forensic
Initial Response, Forensic Duplication
Digital Forensics is the semester 6 subject of IT engineering offered by Mumbai Universities. Prerequisite for studying this subject is Cryptography and Security, Computer Networks.
Course Objectives for the subject Digital Forensics are as follows Students will try To understand underlying principles and many of the techniques associated with the digital forensic practices and cyber crime. To explore practical knowledge about ethical hacking Methodology. To learn the importance of evidence handling and storage for various devices To develop an excellent understanding of current cyber security issues (Computer Security Incident) and analyzed the ways that exploits in securities. To investigate attacks, IDS .technical exploits and router attacks and “Trap and Trace” computer networks. To apply digital forensic knowledge to use computer forensic tools and investigation report writing. Course Outcomes for the subject Digital Forensics are as follows Student will able to Define the concept of ethical hacking and its associated applications in Information Communication Technology (ICT) world. Underline the need of digital forensic and role of digital evidences . Explain the methodology of incident response and various security issues in ICT world, and identify digital forensic tools for data collection . Recognize the importance of digital forensic duplication and various tools for analysis to achieve adequate perspectives of digital forensic investigation in various applications /devices like Windows/Unix system. Apply the knowledge of IDS to secure network and performing router and network analysis. List the method to generate legal evidence and supporting investigation reports and will also be able to use various digital forensic tools .
Module Introduction to Cyber Crime and Ethical Hacking consists of the following subtopics such as Types of cybercrime ,categories of cybercrime , Computers’ roles in crimes, Prevention from Cyber crime, Hackers, Crackers, Phreakers Ethical Hacking :Difference between Hacking and Ethical hacking : Steps of Ethical Hacking, Exploring some tools for ethical hacking: reconnaisance tools, scanning tools.
Module Introduction to Digital Forensics and Digital Evidences consists of the following subtopics such as Digital Forensic ,Rules for Digital Forensic The Need for Digital Forensics, Types of Digital Forensics, Ethics in Digital Forensics, Digital Evidences : Types and characteristics and challenges for Evidence Handling.
Module Computer Security Incident Response Methodology consists of the following subtopics such as Introduction to Computer Security Incident Goals of Incident response, Incident Response Methodology, Formulating Response Strategy, IR Process – Initial Response, Investigation, Remediation, Tracking of Significant ,Investigative Information, Reporting Pre Incident Preparation, Incident Detection and Characterization. Live Data Collection : Live Data Collection on Microsoft Windows Systems: Live Data Collection on Unix-Based Systems.
Module Forensic Duplication and Disk Analysis, and Investigation consists of the following subtopics such as Forensic Duplication Forensic Image Formats, Traditional Duplication, Live System Duplication, Forensic Duplication tools Disk and File System Analysis: Media Analysis Concepts, File System Abstraction Model The Sleuth Kit : Installing the Sleuth Kit , Sleuth Kit Tools Partitioning and Disk Layouts : Partition Identification and Recovery, Redundant Array of Inexpensive Disks Special Containers : Virtual Machine Disk Images , Forensic Containers Hashing, Carving : Foremost , Forensic Imaging : Deleted Data , File Slack , dd , dcfldd , dc3dd Data Analysis Analysis Methodology Investigating Windows systems , Investigating UNIX systems , Investigating Applications, Web Browsers, Email, Malware Handling: Static and Dynamic Analysis.
Module Network Forensics consists of the following subtopics such as Technical Exploits and Password Cracking , Introduction to Intrusion Detection systems, Types of IDS Understanding Network intrusion and attacks , Analyzing Network Traffic, Collecting Network based evidence, Evidence Handling. Investigating Routers, Handling Router Table Manipulation Incidents, Using Routers as Response Tools.
Module Forensic Investigation Report and Forensic Tools consists of the following subtopics such as Report :Goals of Report, Layout of an Investigative Report, Guidelines for Writing a Report, sample for writing a forensic report . Computer Forensic Tools : need and types of computer forensic tools, task performed by computer forensic tools . Study of open source Tools like SFIT, Autopsy etc. to acquire, search, analyze and store digital evidence.
Suggested Text Books for these subject Digital Forensics by Mumbai University are as follows Jason Luttgens, Matthew Pepe, Kevin Mandia, “Incident Response and computer forensics”,3 rd Edition Tata McGraw Hill, 2014. Nilakshi Jain, Dhananjay Kalbande, ”Digital Forensic : The fascinating world of Digital Evidences ” Wiley India Pvt Ltd 2017. Cory Altheide, Harlan Carvey ”Digital forensics with open source tools “Syngress Publishing, Inc. 2011. Chris McNab, Network Security Assessment, By O’Reily. Suggested Refrence Books for these subject Digital Forensics by Mumbai University are as follows Clint P Garrison “Digital Forensics for Network, Internet, and Cloud Computing A forensic evidence guide for moving targets and data , Syngress Publishing, Inc. 2010. Bill Nelson,Amelia Phillips,Christopher Steuart, “Guide to Computer Forensics and Investigations” . Cengage Learning, 2014. Debra Littlejohn Shinder Michael Cross “Scene of the Cybercrime: Computer Forensics Handbook”, 2 nd Edition Syngress Publishing, Inc.2008. Marjie T. Britz, Computer Forensics and Cyber Crime, Pearson, Third Edition.
Prepare For Your Placements: https://lastmomenttuitions.com/courses/placement-preparation/
/ Youtube Channel: https://www.youtube.com/channel/UCGFNZxMqKLsqWERX_N2f08Q
Follow For Latest Updates, Study Tips & More Content!
- Lectures 31
- Quizzes 0
- Duration 50 hours
- Skill level All levels
- Language English
- Students 20
- Certificate No
- Assessments Yes