Electives in Cyber Security
Course Name | Cyber Forensics and Malware |
Course Code | 23CSE334 |
Program | B. Tech. in Computer Science and Engineering (CSE) |
Credits | 3 |
Campus | Amritapuri ,Coimbatore,Bengaluru, Amaravati, Chennai |
Electives in Cyber Security
Introduction to Cyber Forensics – Basics of Cyber Forensics – Digital evidence and its types – Legal and ethical considerations.
Cyber Forensic Process – Identification – Preservation – Collection – amination – Analysis – Reporting.
Digital Forensics Techniques – Disk Forensics – File System Forensics – Network Forensics – Memory Forensics – Mobile Forensics – Cloud Forensics. Incident Response and Investigation – Incident response process – Incident response team – Chain of custody – Incident documentation.
Introduction to Malware – Malware types (viruses, worms, Trojans, ransomware, etc.) – Malware attack vectors c. Malware behavior and functionality. Malware Analysis Techniques – Static Analysis – File signatures, Hash analysis, Strings analysis, Disassembly – Dynamic Analysis – Sandboxing, Debugging, Network analysis, System and registry monitoring.
Reverse Engineering – Assembly language basics – Disassemblers and debuggers – Control flow analysis – De-obfuscation techniques.
Anti-Malware Techniques – Antivirus software – Host-based Intrusion Detection and Prevention Systems (HIDS/HIPS) – Firewalls – Application control and whitelisting – Security patches and updates.
Cybersecurity Best Practices – Security awareness and training – Defense in depth – Network segmentation – Data encryption – Strong authentication mechanisms – Regular security assessments and audits.
Course Objectives
Course Outcomes
CO1: Understand the fundamentals of cyber forensics, including digital evidence, cyber forensic process, legal and
ethical considerations.
CO2: Develop proficiency in various digital forensics techniques to effectively analyze and investigate cyber
incidents.
CO3: Gain knowledge of malware types, behavior, and functionality, and learn how to identify, analyze, and reverse-engineer malicious software using static and dynamic analysis techniques.
CO4: Acquire the skills to properly respond to and investigate and mitigate cybersecurity threats and incidents.
CO-PO Mapping
PO/PSO | PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PO12 | PSO1 | PSO2 |
CO | ||||||||||||||
CO1 | 3 | 2 | 2 | 3 | 1 | 1 | 2 | 2 | ||||||
CO2 | 3 | 3 | 2 | 3 | 3 | 2 | 3 | 3 | ||||||
CO 3 | 3 | 3 | 2 | 2 | 3 | 3 | 3 | 3 | ||||||
CO4 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 |
Evaluation Pattern: 70:30
Assessment | Internal | End Semester |
Midterm | 20 | |
*Continuous Assessment Theory (CAT) | 10 | |
*Continuous Assessment Lab (CAL) | 40 | |
**End Semester | 30 (50 Marks; 2 hours exam) |
* CAT – Can be Quizzes, Assignment, and Reports
* CAL – Can be Lab Assessments, Projects, and Reports
**End Semester can be theory examination/ lab-based examination/ project presentation
Textbook(s)
Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response Essentials,” Addison-Wesley Professional, 1st edition, 2010.
Brian Carrier, “File System Forensic Analysis,” Addison-Wesley Professional, 1st edition, 2005.
Sherri Davidoff and Jonathan Ham, “Network Forensics: Tracking Hackers through Cyberspace,” Prentice Hall, 1st edition, 2012.
Reference(s)
Michael Sikorski and Andrew Honig, “Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software,” No Starch Press, 1st edition, 2012.
Michael Hale Ligh, Andrew Case, Jamie Levy, and Aaron Walters, “The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory,” Wiley, 1st edition, 2014.
Eldad Eilam, “Reversing: Secrets of Reverse Engineering,” Wiley, 1st edition, 2005.
DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.