Lesson Plan

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

VELAMMAL INSTITUTE OF TECHNOLOGY, CHENNAI- 601204

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Date: 16.12.2019
COURSE PLAN

Academic Year 2019-2020


Batch 2016-2020
Year/Semester IV/VIII
Course Component Professional core
Subject Code-Title CS6004 – Cyber Forensics
No. of Students 55
Schedule L 3 T 0 P 0 C 3
Name of the Instructor Ms. M.Abinaya Dept IT

Prerequisite
Basic Knowledge in Network Security
Courses
Course Objectives The student should be made to:
 Learn the security issues network layer and transport layer.
 Be exposed to security issues of the application layer.
 Learn computer forensics.
 Be familiar with forensics tools.
 Learn to analyze and validate forensics data.

Course Outcomes CO1 Make Use of the Security issues in Network Layer and Transport Layer
(Min 4 Max 6. Out
of which one for CO2 Apply Security principles in application layer
content beyond
CO3 Make use of Computer Forensics
syllabus)
CO4 Apply the Forensics Tool

CO5 Analyze and Validate Forensics Data.

CO6 Develop the program for HMAC Problems


Assessment pattern  Internal Assessment1, Internal Assessment2 & Internal Assessment3
for 60 marks
 Model examination for 100 marks
 Assignment for 20 marks
Portions Covered:
 Internal Test1- Unit 1 & First Half of 2nd Unit.
 Internal Test2- Second Half of 2nd Unit & 3rd Unit.
 Internal Test3- 4th Unit and First Half of 5thUnit.
 Model examination- All 5 units.
UNIT I NETWORK LAYER SECURITY &TRANSPORT LAYER SECUR
1. IPSec Protocol T1, 243 L+D BB 1
2. IP Authentication Header T1, 250 L+D BB 1
3. IP ESP T1, 253 L+ D LCD 1
4. L+D BB 1
Key Management Protocol for IPSec T1, 260
PS(Tx)
5. L+D LCD 1
Transport layer Security T1, 277
PS(Tx)
6. L+D BB 2
SSL Prototcol T1, 277
7. Cryptographic Computations T1, 284 L+D BB 1
8. TLS Protocol. T1, 293 L+D BB 1
UNIT II E-MAIL SECURITY & FIREWALLS
9. L+ D LCD 2
PGP – S/MIME T1, 305
10. Internet Firewalls for Trusted System T1, 324 L+D LCD 1
11. Roles of Firewalls T1, 339 L+D BB 1
12. Firewall related terminology T1, 340 L+D LCD 1
PS(Tx)
13. L+D BB 1
Types of Firewalls T1, 344

14. Firewall designs T1, 350 L+D BB 1


15. L+I BB 2
SET for E-Commerce Transactions T1, 355
UNIT III INTRODUCTION TO COMPUTER FORENSICS
16. Introduction to Traditional Computer Crime R3, 4 L+D BB 1
17. Traditional problems associated with Computer L+D BB 1
R3, 5
Crime.
18. L+D BB 1
Introduction to Identity Theft & Identity Fraud R3, 117
PS(Tx)
19. Types of CF techniques T2.71 L+D BB 1
20. Incident and incident response methodology T2, 27 L+D BB 1
21. Forensic duplication and investigation T2, 37 L+D BB 1
22. Preparation for IR, Creating response tool kit L+D BB 1
R2,128 PS(Tx)
and IR team
23. L+D BB 1
Forensics Technology and Systems R2,139-150
PS(Tx)
24. Understanding Computer Investigation, Data L+D
BB 1
T2, 99
Acquisition
UNIT IV EVIDENCE COLLECTION AND FORENSICS TOOLS
25. L+D BB 1
T2, 149
Processing Crime and Incident Scenes
26. L+I BB 1
T2, 149
Processing Crime and Incident Scenes
27. L+D BB 1
T2, 149
Processing Crime and Incident Scenes
28. L+D BB 1
Working with Windows and DOS Systems T2, 197
PS(Tx)
29. File system T2, 197 L+D BB 1
30. L+D LCD 1
Data Recovery T2, 228
31. Log File T2, 208 L+D LCD 1
32. L+D LCD 1
Registry T2, 230
33. Current L+D LCD 1
T2, 259
Computer Forensics Tools
34. L+D LCD 1
Software/ Hardware Tools. T2, 273, 278
UNIT V ANALYSIS AND VALIDATION
35. Validating Forensics Data T2, 345 L+I BB 1
36. Data Hiding Techniques T2, 356 L+I BB 1
37. Performing Remote Acquisition T2, 365 L+I BB 1
38. Steganography W2 L+D BB 1
39. Network Forensics T2, 423 L+D BB 1
40. L+D LCD 1
Open Source Tools:wireshark T2, 440
PS(Tx)
41. snort R1,10.23 L+D BB 1
42. L+D BB 1
Email Investigations T2, 451
43. Cell Phone and Mobile Devices Forensics. L+D BB 1
T2, 495 CL(s)
44. Validating Forensics Data R2,313 L+D BB 1
CONTENT BEYOND SYLLABUS
45. Cyber security W2 L+AV LCD 1
TPS

TEXT BOOK:

T1: Internet Security: Cryptographic Principles, Algorithms and Protocols, Man Young Rhee
T2 : Computer Forensics and Investigations, Enfinger, Steuart

REFERENCES:
R1: Computer Forensics, John R.Vacca
R2: Internet Cryptography, Richard E.Smith
R3: Computer Forensics and Cyber Crime, Marjie T.Britz
WEB MATERIALS:
W1: http://nptel.ac.in
W2: www.studytonight.com/ Cyber security/overview-of-NS.phpW3:
www.tutorialspoint.com/Network security

Course In charge Course Coordinator Module Coordinator


HOD/IT Vice-Principal Principal

You might also like