Acfrogbe 8qvtusc L2v40k9blceiv1jkdeobytypvmzsrr0k9pfe Zagtyxckpuhntgurnkkkmrivpjnx6yrefzxedzzv

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

SEMESTER I

CS1C04PGD23– CYBER FORENSICS AND INVESTIGATION

Syllabus Content:
Module I
Cyber Forensics: Introduction, Importance, Role and Applications in IT and Government
Organizations – Forensic Analysis process, Pre-investigation considerations, understanding
case information and legal issues. Understanding data acquisition and analysis process,
Reporting - Acquisition of Evidence- Exploring evidence, Understanding the forensic
examination environment, Tool validation, Creating Sterile Media, Forensic Imaging -
Computer Systems- Understanding the boot process, Understanding the file systems,
Understanding the extended file systems, Hidden File System
Module II
Computer Investigation Process- Timeline Analysis, Media Analysis, String Search,
Recovering Deleted Data – RAM Memory Forensic Analysis- Fundamental of Memory,
Identifying Sources of Memory, Capturing RAM, Exploring RAM Analyzing Tools - Types
of Computer-Based Investigations-Differences in computer-based investigations, Criminal
Investigation-First Responders, Corporate Investigation- Employee Misconduct, Corporate
espionage, Insider Threat - Storage Media Forensic Analysis- Magnetic Storage Media, Non-
Volatile Media, Optical Storage Interface, Connectors, Tools
Module III
Understanding User Profiles, Understanding Windows Registry, determining account usage,
determining file knowledge - Identifying Physical locations, exploring programme execution,
Understanding USB/Attached devices, Memory Dumping - Linux and OOS Forensics,
Kernal and Storage Devices, Linux File system, Distribution and Shells - Document
Forensics: PDF structure, PDF Analysis, MS Office Document structure and Analysis,
Macros, Windows Thumbnails, File system acquisition and
recovery - Network Forensics - Ports, Protocols, Types of Networks, Cloude Computing
Forensics, VM Analysis

Module IV
Understanding Email protocol, decoding emails- message formats, IP tracing, web-based
emails, Spams – Understanding Client-Based Email analysis, Understanding webMail
Analysis - Internet Artifacts- Browser, File share, social media, P2P Share - Mobile
Forensics: SIM Card, Android and iOS Architecture, Android File System, Android
Application, Android SDK, Android Debug Bridge, Memory & SIM Acquisition - Cyber
Crime Investigation: Pre investigation, SOP for Investigation, Case scenarios: social media
crime, Online defacement crime, Email investigation, CDR Analysis
Module V
Report writing- Effective Notes Collection, Evidence Analysis, Details Acquisition - Witness
Ethics- Types of Proceedings, Preparation Phases, understanding testimony and evidences,
Importance of ethical behavior - Laws: Indian IT Act 2000(Amendment 2008), International
IT Act, Indian Penel Code for Digital Crimes - Auditing: Internal audit and IT audit function,
IT Governance, Frameworks, Standards
and Regulations, Identifying Information assets, Risk Assessment, Risk Management, Types
of auditing, ISO 27001, PCIDSS

You might also like