Back close

Course Detail

Course Name Cyber Forensics and Incident Response
Course Code 21SN611
Program M. Tech. in Cyber Security Systems & Networks
Semester 2
Credits 4

Overview

Introduction to Cyber Forensic Investigation, Investigation Tools, Digital Evidence Collection, Evidence Preservation, Data Recovery, Encryption and Decryption methods, Search and Seizure of Computers and devices, Recovering deleted evidences, Password Cracking, Security Standards, Cyber Laws and Legal Frameworks, Cyber laws in India, Case studies and tools.

Hardware/Device/SSD Forensics, File System Forensics, OS Forensics (Windows, Linux, Android and iOS), Memory Forensics, Browser Forensics, E-Mail Forensics, Mobile/Wireless Forensics, Network and Communication Forensics, Anti-forensics, Steganography and Image File Forensics, Social media Forensics, Cloud Forensics, Overwriting/Forging/Wiping/Destruction, Obfuscation, Online Anonymity and Rootkits, Assessing Threat Levels, Operating System Attacks, Malware Analysis, Financial Frauds, Espionage and Investigations, Investigating copiers, IVR, Video surveillance, RFID and Sim cards.

TEXTBOOKS/ REFERENCES

  1. File System Forensic Analysis by Brain Carrier ISBN: 978-0-32-126817-2
  2. Incident Response and Computer Forensics, Third Edition by Jason T Luttgens,Mathew Pepe ISBN: 978-0-07-179869-3
  3. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski, Andrew Honig ISBN: 978-1-59327-290-6
  4. Android Forensics: Investigation, Analysis and Mobile Security for Google Android by Andrew Hoog, ISBN: 978-1-59749-651-3
  5. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS Devices by Andrew Hoog, Katie Strzempka ISBN: 978-1-59749-659- 9

Course Outcomes

  • CO1. Exploring Cyber Forensic Investigation, Investigation Tools, Digital Evidence Collection, Evidence Preservation, Data Recovery, Encryption and Decryption methods
  • CO2.  Familiarizing with Hardware Forensics – Disk, SSD, Memory and Mobile Forensics
  • CO3.  Exploring the Host/OS (MS Windows, Linux, Android and iOS) Forensics and related File System Forensics
  • CO4. Understanding Database Forensics, E-Mail Forensics, Browser Forensics, Social Media Forensics and Anti-forensics
  • CO5.  Exploring Network, Wireless and Cloud Forensics
  • CO6.  Familiarizing with Cyber Laws, Regulations – Compliance & Standards

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now