Back close

Course Detail

Course Name Cyber Forensics
Course Code 24CY611
Program M. Tech. in Cyber Security
Semester 2
Credits 3
Campus Coimbatore

Syllabus

Syllabus

Locard’s exchange principle, code of ethics, digital forensic process models- Framework for digital forensic evidence collection with Chain of Custody (CoC), standard evidence collection procedures (SOP), Autopsy, Device/SSD forensics, File carving with fundamentals of host forensics for windows artifacts, registry and system log monitoring with auditing mechanisms. File system handling – reconstruction of files and directory structures on the FAT and NTFS timestamps, Password Cracking. Fundamentals of host forensics for UNIX derivatives – Linux operating system forensics, epoch formats and audit mechanisms, Mac forensics, Forensic analysis of database systems, and identifying database tampering. Slack and swap space forensics, Android and iOS forensics, memory, volatility and network forensics, wireless forensics, anti-forensics, steganography, email investigation, social media forensics, Cloud Forensics, Overwriting/Forging/Wiping/Destruction, IVR, DVR, NIST tools (CFReDS, CFTT, and NSLR). 

Self-study: OSINT, Online Anonymity and Rootkits, Financial Frauds, Espionage and Investigations, investigating copiers, AI-assisted trends in cyber forensics 

Objectives and Outcomes

Prerequisites:

24CY602 Network Security 

 

Course Outcome
 

Course Outcome  

 

CO 1  

Exploring the fundamentals of host forensics for windows and Unix Systems 

L3  

CO 2  

Exploring the ideas of digital forensics framework 

L3  

CO 3  

Familiarizing the ideas of device and network system Forensics 

L4  

CO 4  

Exploring the ideas to Email and social Media forensics 

L4  

CO 5  

Familiarizing the fundamentals of anti-forensics and mobile forensics 

L4  

 

CO-PO Mapping

CO-PO Mapping  

CO/PO  

PO 1 

PO 2 

PO 3 

PO 4 

PO 5 

PO 6 

PO 7 

PO 8 

PO 9 

PO 10 

PSO1 

PSO2 

PSO3 

CO 1 

– 

– 

– 

– 

CO 2 

– 

– 

– 

– 

CO 3 

– 

– 

– 

– 

CO 4 

– 

– 

– 

– 

CO 5 

– 

– 

– 

– 

Text Books / References

  1. an Carrier, File System Forensic Analysis , Pearson, 2006. 
  2. Nina Godbole, Sunit Belapure, Cyber security: understanding cybercrimes, computer forensics and legal perspectives, Wiley, 2011 
  3. E. Casey, Handbook of Digital Forensics and Investigation , Academic Press, 2010. 
  4. Marjie T. Britz, Computer Forensics and Cyber Crime , Pearson, 2012. 
  5. David Cowen, Computer Forensics: A Beginners Guide , Mc Graw Hill Education, 2013. 
  6. Bill Nelson, Amelia Phillips, Christopher Steuart, Guide to Computer Forensics and Investigations , 4th Edition, 2014. 

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now