Anna University 2013 Regulation - CS6004 Cyber Forensics - Syllabus - Download
UNIT I NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY 9
IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec. Transport layer Security: SSL
protocol, Cryptographic Computations – TLS Protocol.
UNIT II E-MAIL SECURITY & FIREWALLS 9
PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related terminology- Types of
Firewalls - Firewall designs - SET for E-Commerce Transactions.
UNIT III INTRODUCTION TO COMPUTER FORENSICS 9
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to
Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic
duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and
Systems - Understanding Computer Investigation – Data Acquisition.
UNIT IV EVIDENCE COLLECTION AND FORENSICS TOOLS 9
Processing Crime and Incident Scenes – Working with Windows and DOS Systems. Current Computer Forensics Tools:
Software/ Hardware Tools.
UNIT V ANALYSIS AND VALIDATION 9
Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics – Email
Investigations – Cell Phone and Mobile Devices Forensics
Anna University 2013 Regulation - CS6004 Cyber Forensics - Syllabus - Download
UNIT I NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY 9
IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec. Transport layer Security: SSL
protocol, Cryptographic Computations – TLS Protocol.
UNIT II E-MAIL SECURITY & FIREWALLS 9
PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related terminology- Types of
Firewalls - Firewall designs - SET for E-Commerce Transactions.
UNIT III INTRODUCTION TO COMPUTER FORENSICS 9
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to
Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic
duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and
Systems - Understanding Computer Investigation – Data Acquisition.
UNIT IV EVIDENCE COLLECTION AND FORENSICS TOOLS 9
Processing Crime and Incident Scenes – Working with Windows and DOS Systems. Current Computer Forensics Tools:
Software/ Hardware Tools.
UNIT V ANALYSIS AND VALIDATION 9
Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics – Email
Investigations – Cell Phone and Mobile Devices Forensics
Anna University 2013 Regulation - CS6004 Cyber Forensics - Syllabus - Download
0 Comments