Professional Documents
Culture Documents
5th Sem Cyber 2023-24
5th Sem Cyber 2023-24
STUDENT
INFORMATION
HANDBOOK
DEPTMENT OF COMPUTERSCIENCE&ENGINEERING
SEMESTER 5
2023-24
P.O.LIMDA,TA.WAGHODIA,DISTVADODARA
PH.02668 -260338
ACADEMIC CALENDAR FOR ODD TERM - YEAR : 2023 - 24
Bachelor of Engineering/DiplomaEngineering/D2D/Master of Engineering/IEDP (Semester III, V, VII)
Teach.
Week No.
Week No.
Week Beginning Monday Tuesday Wednesday Thursday Friday Saturday
2 2 June 12 13 14 15 16 17
3 3 June 19 20 21 22 23 24
4 4 June/July 26 27 28 29 30 01 - Weekly 1
5 5 July 03 04 05 06 07 08 - Weekly 2
10 - Remedial
6 6 July MidTerm 11 12 13 14 15 - Weekly 3
7 7 July 17 18 19 20 21 22 - Weekly 4
8 8 July 24 25 26 27 28 29 - Weekly 5
9 9 July/Aug 31 01 02 03 04 05 - Weekly 6
10 Exam Aug 07 - Mid Sem Exam 08 - Mid Sem Exam 09 - Mid Sem Exam 10 - Mid Sem Exam 11 - Mid Sem Exam 12 - Mid Sem Exam
15 - Independence
11 10 Aug 14 Day 16 17 18 19
12 11 Aug 21 22 23 24 25 26
30 - Raksha Bandhan
13 12 Aug/Sept 28 29 31 01 02
14 13 Sept 04 05 06 07 - Janmashtmi 08 09
15 14 Sept 11 12 13 14 15 16
19 - Ganesh
16 15 Sept 18 Chaturthi 20 21 22 23
17 16 Sept 25 26 27 28 29 30
20 PL Oct 16 17 18 19 20 21
23 - End Sem Theory 25 - End Sem Theory 26 - End Sem Theory 27 - End Sem Theory 28 - End Sem Theory
21 Exam Oct 24 - Dusshera
30 - End Sem Theory 31 - Sardar Patel 01 - End Sem Theory 02 - - End Sem 03 - End Sem Theory 04 - End Sem Theory
22 Exam Oct/Nov Birthday Theory
06 - Diwali Vacation 07 - Diwali Vacation 08 - Diwali Vacation 09 - Diwali Vacation 10 - Diwali Vacation 11- Diwali Vacation
23 VL Nov
13 - Diwali Vacation 14 - Diwali Vacation 15 - Diwali Vacationk 16 - Diwali Vacation 17 - Diwali Vacation 18 - Diwali Vacation
24 VL Nov
20 - End Sem 21 - End Sem 22 - End Sem 23 - End Sem 24 - End Sem 25 - End Sem
25 Exam Nov Practical Practical Practical Practical Practical Practical
Subject Coordinators:
Faculty Representatives
Reference Books
1. Software Engineering
By R. Pressmen | 6th
2. Software Engineering
By Sommerville
3. Software Engineering
By Rajiv Mall | PHI
4. Software Engineering
By PankajJalote | Wiley India
Course Outcome
After Learning the Course the students shall be able to:
1. Analyze, design, verify, validate, implement and maintain software systems.
2. Define a Project Management Plan, tabulate Testing Plans and Reproduce effective procedures.
3. Manage the development of software systems.
List of Practical
1. Project Definition and objective of the specified module.
4. Documentation of Software project management planning (SPMP) for the specified module.
Designing SA/SD including Requirement specification, DFD with data dictionary and Structure chart for the specific
6.
module.
Designing the module using Object Oriented approach including Use case Diagram with scenarios, Class Diagram and State
7.
Diagram
Designing the module using Object Oriented approach including Collaboration Diagram, Sequence Diagram and Activity
8.
Diagram
Course Outcome
After Learning the Course the students shall be able to:
After learning the course the students shall be able to:
1. Prepare and do Software Requirement Specification and Software Project Management Plan.
2. To ensure the quality of software product, different quality standards and software review techniques
3. Apply the concept of Functional Oriented and Object Oriented Approach for Software Design.
4. Understand modern Agile Development and Service Oriented Architecture Concept of Industry
5. Analyze, design, verify, validate, implement and maintain software systems.
6. Execute a Project Management Plan, tabulate Testing Plans and Reproduce effective procedures.
List of Practical
1. Project Definition and objective of the specified module and Perform Requirement Engineering Process.
2. Identify Suitable Design and Implementation model from the different software engineering models.
4. Develop Software project management planning (SPMP) for the specified module.
5. Do Cost and Effort Estimation using different Software Cost Estimation models.
Prepare System Analysis and System Design of identified Requirement specification using structure design as DFD with
6.
data dictionary and Structure chart for the specific module.
Designing the module using Object Oriented approach including Use case Diagram with scenarios, Class Diagram and State
7.
Diagram, Collaboration Diagram, Sequence Diagram and Activity Diagram.
Reference Books
1. B. Nelson, A. Phillips, and C. Steuart, Guide to Computer Forensics and Investigations, 4th Edition, Course Technology,
2010
2. John Sammons, The Basics of Digital Forensics, 2nd Edition, Elsevier, 2014
3. John Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition, Laxmi Publications, 2005.
Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Perform the steps included in a digital investigation from the initial recognition of an incident through the steps of evidence
gathering, preservation and analysis, and the completion of legal proceedings;
2. Identify important file metadata and apply their use in a forensic investigation;
3. Perform a forensic investigation on a forensic image, using various tools to recover evidence, resulting in a report documenting
the investigation;
4. Write professional quality reports that include both analysis and investigation.
Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Perform the steps included in a digital investigation from the initial recognition of an incident through the steps of evidence
gathering, preservation and analysis, and the completion of legal proceedings.
2. Identify important file metadata and apply their use in a forensic investigation.
3. Perform a forensic investigation on a forensic image, using various tools to recover evidence, resulting in a report documenting
the investigation.
4. Write professional quality reports that include both analysis and investigation.
List of Practical
1.
Setting up a DFIR lab.
2.
Non-Volatile Disk imaging using FTK Imager
In a digital forensics investigation, a company suspects that an employee has leaked
confidential information to a competitor. As a digital forensic analyst, how would you use FTK
Imager to conduct a non-volatile disk imaging process on the employee's computer to search for
evidence of the leak?
3.
Analyzing the Physical image using Autopsy to extract evidence
A cybercrime investigation team has seized a suspect's hard drive, which is believed to contain
evidence related to a recent hacking incident. As a digital forensic analyst, you are tasked with
analyzing the physical image of the hard drive to extract evidence. How would you use Autopsy
to analyze the physical image and identify any relevant evidence?
4.
Analyzing the Live running OS using Autopsy to extract evidence without Imaging.
A company suspects that an employee has been using a company laptop to engage in illegal
activities during business hours. As a digital forensic analyst, you are tasked with analyzing the
Printed on : 02-06-2023 12:02 PM Page 1 of 3
Subject Syllabus
203105365 - Digital Forensics and Incident Response
Laboratory
live running OS of the laptop to extract evidence without imaging the device. How would you
use Autopsy to analyze the live running OS and identify any relevant evidence while ensuring
the employee's privacy is respected?
5.
Creating RAM dumps using Dump-IT and FTK
A company suspects that a cyber attack has occurred on their network and they suspect that the
attacker might still be active in their system's memory. As a digital forensic analyst, you are
tasked with creating a RAM dump to investigate the incident. How would you use Dump-IT and
FTK to create a RAM dump and analyze it for any evidence of the attack?
6.
Analyzing the RAM Dump using Volatility Framework to extract evidence
A company has experienced a security breach, and the attacker is believed to have used a
rootkit to hide their presence in the system's memory. As a digital forensic analyst, you are
tasked with analyzing a RAM dump to identify any evidence of the attack. How would you use
the Volatility Framework to analyze the RAM dump and identify any evidence of the rootkit and
the attacker's activity?
7.
Setup SIEM tool and upload the extracted logs from windows system.
8.
Installing wireshark and creating PCAP files for analysis. Application of wireshark search filters.
A network administrator needs to analyze network traffic to troubleshoot a network issue. As a
cybersecurity analyst, you are tasked with installing Wireshark on the administrator's computer
and showing them how to create PCAP files for analysis. You will also need to demonstrate the
use of Wireshark's search filters to help the administrator find the root cause of the network
issue. How would you install Wireshark, create and analyze PCAP files, and apply search filters
to identify the source of the network problem?
9.
Network malware logs analysis CTF (using Wireshark)
A company's network has been infected by a malware attack, resulting in the loss of sensitive
data. As a forensic analyst, you have been tasked with analyzing the network logs to identify the
source and type of malware. Using Wireshark, can you walk us through the steps you would
take to extract and analyze the relevant logs?
10.
Printed on : 02-06-2023 12:02 PM Page 2 of 3
Subject Syllabus
203105365 - Digital Forensics and Incident Response
Laboratory
10.
Windows security logs analysis (using SPLUNK)
A company has experienced a data breach and has requested a forensic investigation to
identify the cause of the breach. The company uses Windows servers and workstations, and the
security logs have been collected for analysis. The forensic team is tasked with analyzing the
security logs using SPLUNK to identify any suspicious activities that may have led to the data
breach.
Question:
What are the steps involved in setting up and configuring SPLUNK to analyze Windows security
logs? How can SPLUNK be used to identify potential security threats in the collected logs? Can
the forensic team identify the cause of the data breach by analyzing the security logs? If so,
what are the indicators of compromise that they have discovered?
11.
Digital Forensic Report Writing
You are a digital forensic analyst who has just completed an investigation of a cyber attack on a
company's network. Your client is a legal team representing the company and they require a
comprehensive report of your findings. What information should you include in your report, and
what should be the structure and format of the report? How will you ensure that the report is
accurate, clear, and concise while avoiding technical jargon? What are the best practices for
presenting complex technical information to non-technical stakeholders in a way that is easily
understandable?
Reference Books
1. Kali Linux Revealed: Mastering the Penetration Testing Distribution" by Raphael Hertzog, Jim O'Gorman, and Mati Aharoni
2. Open-Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Course Outcome
After Learning the Course the students shall be able to:
After studying this course, you should be able to:
1. Identify some of the factors driving the need for network security.
2. Identify and classify examples of attacks.
3. Define the terms vulnerability, threat and attack.
4. Identify physical points of vulnerability in simple networks
Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Identify some of the factors driving the need for network security.
2. Identify and classify examples of attacks.
3. Define the terms vulnerability, threat and attack.
4. Identify physical points of vulnerability in simple networks
List of Practical
1.
Setting Up KALI linux VM using vmware on windows host
A cybersecurity analyst needs to perform penetration testing on a client's network using Kali Linux. As
the IT support specialist, you are tasked with setting up a Kali Linux virtual machine (VM) using VMware
on a Windows host. You need to ensure that the Kali Linux VM is properly configured and connected to
the network so that the analyst can perform the necessary security testing. How would you set up the
Kali Linux VM, configure it, and ensure that it's connected to the network for penetration testing
purposes?
2.
Exercise: Basic Command Line Usage
Practice commands like navigating directories, creating and deleting files, and managing permissions.
3.
Exercise: Network Scanning
Use tools like Nmap or Netdiscover to scan a local network for live hosts and open ports.
4.
Identify the organization being targeted and gather publicly available information about its infrastructure,
employees, and online presence using OSINT techniques.
5.
Exercise: Social Media Profiling
Choose a target individual or organization and conduct a comprehensive search on their social media platforms.
Gather information such as personal details, connections, interests, or potential security risks.
6.
Exercise: Website and Domain Analysis
Select a website or domain of interest and analyze its structure, content, and metadata.
Identify the hosting provider, IP addresses, domain ownership details, and any potential vulnerabilities.
7.
Exercise: Email Header Analysis
Obtain an email header from a sample email and analyze it to extract valuable information.
Identify the source IP address, mail servers, and investigate any signs of email spoofing or malicious activity
8.
Exercise: People Search and Background Checks
Choose an individual and perform a thorough people search using online search engines, public records, and
directories.
Compile information about their employment history, education, associations, or any notable events.
9.
Exercise: Geolocation and Mapping
Utilize reverse image search engines and metadata analysis to identify the source, location, or context of the
media.
10.
Exercise: Online Forum and Discussion Monitoring
Monitor and analyze discussions on online forums, social media groups, or public platforms related to a specific
topic.
Identify trends, opinions, or potential security threats by monitoring user conversations and interactions.
11.
Exercise: Open Database Research
Explore publicly available databases and repositories to gather information on specific topics or industries.
12.
Exercise: Deep Web Exploration
Familiarize yourself with tools like Tor and explore hidden services and websites on the dark web.
Practice navigating through Tor networks and understanding the unique challenges of gathering OSINT in this
environment.
13.
Exercise: OSINT Automation
Learn to leverage OSINT automation tools like Maltego, Recon-ng, or SpiderFoot for efficient data gathering and
analysis.
Explore the capabilities of these tools and customize them for specific OSINT tasks.
Dive into public records databases and government websites to collect information on individuals or organizations.
Practice searching for property records, court cases, business registrations, or other publicly accessible data
sources.
Reference Books
1. ISO/IEC 27001:2013 - A Pocket Guide" by Alan Calder
2. Information Security Management Principles" by David Alexander, Amanda Finch, and David Sutton
3. Implementing ISO 27001:2013: A Practical Guide" by Alan Calder and Steve Watkins
5. IT Governance: An International Guide to Data Security and ISO27001/ISO27002" by Alan Calder and Steve Watkins
Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Plan, Design, and Implementing Auditing procedures.
2. Handle Audit Interviews.
3. Manage Audit Program and Draft Audit Reports.
4. Draft Non-Conformity reports. Perform an On-Site Audit.
5. Lead a team of Auditors
6. Real-time scenarios of challenges faced in Audit.
Reference Books
1. Quantitative Aptitude for CAT by Arun Sharma
Course Outcome
After Learning the Course the students shall be able to:
After learning the course the students shall be able to:
1.Apply Logic & critical thinking skills to analyze information and draw logical conclusions. 2.Solve complex problems by breaking
them down into manageable parts & develop effective solutions.
3. Demonstrate the ability to approach problem-solving from various perspectives
Reference Books
1. Microsoft Azure Fundamentals: Understanding Azure" by Michael Collier and Robin Shahan - 3rd Edition
2. Azure for Architects: Implementing cloud design, DevOps, containers, IoT, and serverless solutions on your public cloud"
by Ritesh Modi - 2nd Edition
3. Exam Ref AZ-900 Microsoft Azure Fundamentals" by Jim Cheshire - 2nd Edition
Course Outcome
After Learning the Course the students shall be able to:
After learning the course the students shall be able to:
1. Understand the principles Cloud computing. 2 Familiarity with the various Azure services
3. Understanding the Azure security features,
4. Understanding Azure Service Level Agreements (SLAs) and the Azure service lifecycle
SATUR
TIME MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY
DAY
DFI
09:45 - 10:45 5B191:SE:P N-609 (Anmol Sir) N-
OE(CS/IOT)
A:(A-227) 610
DFI -N-611 (Dharmesh Sir) N-609
5B192:SE:S
(Anmol Sir)
PM:(A-227) OE(CS/IOT) MKLO
10:45 - 11:45 (Dharmesh Sir) N- (Tina ma'am) N-
OE(CS/IOT)
609 610
(Dharmesh Sir) N-609
11:45 - 12:45 LUNCH BREAK
VQR VQR DFI
ISMS
12:45 - 01:35 (Akhand sir) (Akhand sir) (Anmol Sir) N- Library
(A2) N-609
N-609 N-610 609
DFI MKLO MKLO
01:35 - 02:25 (Anmol Sir) (Tina ma'am) N- (Tina ma'am) N- 5B19:PCE:N-609 AN
N-609 R (Akhand sir) N-610 609 610
02:25 - 02:45 RECESS
MKLO -
02:45 - 03:45 Library
LAB
Library Library Library
(Tina ma'am)
5B19:SE:KD: N-
03:45 - 04:45 N-509
609
SUBJECT_NA FACULTY FACULTY SHORT
SUBJECT_CODE SHORT_NAME EMAIL ID MIS ID
ME FULL_NAME NAME
THURSD SATURDA
TIME MONDAY TUESDAY WEDNESDAY FRIDAY
AY Y
NANDYALA VENKATA
DEVI VARA PRASAD PIET-1 - BTech - Cyber
147 210303126154 REDDY Security 5B19_CYB_202324 2
NARAGANI SIVA PIET-1 - BTech - Cyber
148 210303126155 NAGA SAI Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
149 210303126156 NARAM SRI SAI Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
150 210303126157 NARRA JEEVITHA Security 5B19_CYB_202324 2
NARRA PIET-1 - BTech - Cyber
151 210303126158 VENUBHASKAR Security 5B19_CYB_202324 2
NAVUNDLA PREM PIET-1 - BTech - Cyber
152 210303126159 CHARAN Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
153 210303126160 NIDIMAMIDI BHAVYA Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
154 210303126161 NISANKARA TEJ NADH Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
155 210303126162 ORSU GANESH Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
156 210303126164 PALLAPU SAI GEETHA Security 5B20_CYB_202324 1
PAMIDI NITHISH PIET-1 - BTech - Cyber
157 210303126165 KUMAR Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
158 210303126166 ADITYA PANDEY Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
159 210303126167 PANIGRAHI RAJESH Security 5B20_CYB_202324 1
PAPANABOINA SAI PIET-1 - BTech - Cyber
160 210303126168 GOPI Security 5B20_CYB_202324 1
PEDDINTI LALITH PIET-1 - BTech - Cyber
161 210303126169 NAIDU Security 5B20_CYB_202324 1
PEETHA
VENKATESWARA PIET-1 - BTech - Cyber
162 210303126170 RAJU Security 5B20_CYB_202324 1
PILLALA SUDHEER PIET-1 - BTech - Cyber
163 210303126171 KUMAR Security 5B20_CYB_202324 1
PINJARI SAMEER PIET-1 - BTech - Cyber
164 210303126172 BASHA Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
165 210303126174 POLOJU MANISH Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
166 210303126175 PORLA KIRAN KUMAR Security 5B20_CYB_202324 1
POTTHURI CHARAN PIET-1 - BTech - Cyber
167 210303126176 PADMA SRIKHAR Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
168 210303126177 DEVASENAN R Security 5B20_CYB_202324 1
RACHARLA VARUN PIET-1 - BTech - Cyber
169 210303126178 VARMA Security 5B20_CYB_202324 1