Back close

Course Detail

Course Name Cyber Forensics and Malware
Course Code 23CSE334
Program B. Tech. in Computer Science and Engineering (CSE)
Credits 3
Campus Amritapuri ,Coimbatore,Bengaluru, Amaravati, Chennai

Syllabus

Electives in Cyber Security

Unit I

Introduction to Cyber Forensics – Basics of Cyber Forensics – Digital evidence and its types – Legal and ethical considerations.

Cyber Forensic Process – Identification – Preservation – Collection – amination – Analysis – Reporting.

Digital Forensics Techniques – Disk Forensics – File System Forensics – Network Forensics – Memory Forensics – Mobile Forensics – Cloud Forensics. Incident Response and Investigation – Incident response process – Incident response team – Chain of custody – Incident documentation.

Unit II

Introduction to Malware – Malware types (viruses, worms, Trojans, ransomware, etc.) – Malware attack vectors c. Malware behavior and functionality. Malware Analysis Techniques – Static Analysis – File signatures, Hash analysis, Strings analysis, Disassembly – Dynamic Analysis – Sandboxing, Debugging, Network analysis, System and registry monitoring.

Reverse Engineering – Assembly language basics – Disassemblers and debuggers – Control flow analysis – De-obfuscation techniques.

Unit III

Anti-Malware Techniques – Antivirus software – Host-based Intrusion Detection and Prevention Systems (HIDS/HIPS) – Firewalls – Application control and whitelisting – Security patches and updates.

Cybersecurity Best Practices – Security awareness and training – Defense in depth – Network segmentation – Data encryption – Strong authentication mechanisms – Regular security assessments and audits.

Objectives and Outcomes

Course Objectives

  • Provide learners with a comprehensive understanding of cyber forensics principles and techniques, enabling them to effectively identify, preserve, analyze, and report on digital evidence in various cybercrime investigations.
  • Equip learners with the knowledge and skills to analyze and reverse-engineer malware using various analysis techniques, fostering an understanding of malware types, attack vectors, and behavior.
  • Develop learners’ proficiency in incident response and investigation, emphasizing the importance of following a structured process, maintaining a clear chain of custody for digital evidence, and applying cybersecurity best practices.

Course Outcomes

CO1: Understand the fundamentals of cyber forensics, including digital evidence, cyber forensic process, legal and

ethical considerations.

CO2: Develop proficiency in various digital forensics techniques to effectively analyze and investigate cyber

incidents.

CO3: Gain knowledge of malware types, behavior, and functionality, and learn how to identify, analyze, and reverse-engineer malicious software using static and dynamic analysis techniques.

CO4: Acquire the skills to properly respond to and investigate and mitigate cybersecurity threats and incidents.

CO-PO Mapping

PO/PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO
CO1 3 2 2 3 1 1 2 2
CO2 3 3 2 3 3 2 3 3
CO 3 3 3 2 2 3 3 3 3
CO4 3 3 3 3 3 3 3 3

Evaluation Pattern

Evaluation Pattern: 70:30

Assessment Internal End Semester
Midterm 20
*Continuous Assessment Theory (CAT) 10
*Continuous Assessment Lab (CAL) 40
**End Semester 30 (50 Marks; 2 hours exam)

* CAT – Can be Quizzes, Assignment, and Reports

* CAL – Can be Lab Assessments, Projects, and Reports

**End Semester can be theory examination/ lab-based examination/ project presentation

Text Books / References

Textbook(s)

Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response Essentials,” Addison-Wesley Professional, 1st edition, 2010.

Brian Carrier, “File System Forensic Analysis,” Addison-Wesley Professional, 1st edition, 2005.

Sherri Davidoff and Jonathan Ham, “Network Forensics: Tracking Hackers through Cyberspace,” Prentice Hall, 1st edition, 2012.

Reference(s)

Michael Sikorski and Andrew Honig, “Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software,” No Starch Press, 1st edition, 2012.

Michael Hale Ligh, Andrew Case, Jamie Levy, and Aaron Walters, “The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory,” Wiley, 1st edition, 2014.

Eldad Eilam, “Reversing: Secrets of Reverse Engineering,” Wiley, 1st edition, 2005.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now