sc JNTU-K B.TECH R19 4-1 Syllabus For Cyber security & forensics PDF 2022 – Cynohub


JNTU-K B.TECH R19 4-1 Syllabus For Cyber security & forensics PDF 2022


JNTU-K B.TECH R19 4-1 Syllabus For Cyber security & forensics PDF 2022

Get Complete Lecture Notes for Cyber security & forensics on Cynohub APP

Download the APP Now! ( Click Here )

You will be able to find information about Cyber security & forensics along with its Course Objectives and Course outcomes and also a list of textbook and reference books in this blog.You will get to learn a lot of new stuff and resolve a lot of questions you may have regarding Cyber security & forensics after reading this blog. Cyber security & forensics has 5 units altogether and you will be able to find notes for every unit on the CynoHub app. Cyber security & forensics can be learnt easily as long as you have a well planned study schedule and practice all the previous question papers, which are also available on the CynoHub app.

All of the Topic and subtopics related to Cyber security & forensics are mentioned below in detail. If you are having a hard time understanding Cyber security & forensics or any other Engineering Subject of any semester or year then please watch the video lectures on the official CynoHub app as it has detailed explanations of each and every topic making your engineering experience easy and fun.

Cyber security & forensics Unit One

Introduction to Cybercrime

Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word,

Cybercrime and Information Security, Cybercriminals, Classifications of

Cybercrime, Cyberstalking, Cybercafe and Cybercrimes, Botnets. Attack Vector, Proliferation of Mobile and Wireless Devices, Security Challenges Posed by Mobile Devices, Attacks on Mobile/Cell Phones, Network and Computer Attacks.

Cyber security & forensics Unit Two

Tools and Methods

Tools and Methods : Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares,Virus and Worms, Trojan Horses and Backdoors, Steganography, Sniffers, Spoofing, Session Hijacking Buffer over flow, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Identity Theft (ID Theft), Foot Printing and Social Engineering, Port Scanning, Enumeration.

Get Complete Lecture Notes for Cyber security & forensics on Cynohub APP

Download the APP Now! ( Click Here )

Cyber security & forensics Unit Three

Cyber Crime Investigation

Cyber Crime Investigation: Introduction, Investigation Tools, eDiscovery, Digital Evidence

Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Hands on Case Studies. Encryption and Decryption Methods, Search and Seizure of Computers, Recovering Deleted Evidences, Password Cracking.

Cyber security & forensics Unit Four

Computer Forensics and Investigations

Computer Forensics and Investigations: Understanding Computer Forensics, Preparing for Computer Investigations. Current Computer Forensics Tools: Evaluating Computer Forensics

Tools, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics, Linux System Forensics, Graphics and Network Forensics, E-mail Investigations, Cell Phone and Mobile Device Forensics.

Cyber security & forensics Unit Five

Cyber Crime Legal Perspectives

Cyber Crime Legal Perspectives: Introduction, Cybercrime and the Legal Landscape around the World, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India,

Consequences of Not Addressing the Weakness in Information Technology Act, Digital Signatures and the Indian IT Act, Amendments to the Indian IT Act, Cybercrime and Punishment, Cyberlaw, Technology and Students: Indian Scenario.

Cyber security & forensics Course Objectives

 Able to identify security risks and take preventive steps

 To understand the forensics fundamentals

 To understand the evidence capturing process

 To understand the preservation of digital evidence

Cyber security & forensics Course Outcomes

At the end of the course, student will be able to

 Enumerate the computer forensics fundamentals

 Describe the types of computer forensics technology

 Analyze various computer forensics systems

 Illustrate the methods for data recovery, evidence collection and data seizure  Identify the Role of CERT-In Security

Cyber security & forensics Text Books

1) Sunit Belapure Nina Godbole “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, WILEY, 2011.

2) Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage Learning, New Delhi, 2009

Cyber security & forensics Reference Books

1) Michael T. Simpson, Kent Backman and James E. Corley, “Hands on Ethical Hacking and Network Defence”, Cengage, 2019.

2) Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.

3) Alfred Basta, Nadine Basta,Mary Brown and Ravinder Kumar “Cyber Security and Cyber Laws” , Cengage,2018.

Scoring Marks in Cyber security & forensics

Scoring a really good grade in Cyber security & forensics is a difficult task indeed and CynoHub is here to help!. Please watch the video below and find out how to get 1st rank in your examinations . This video will also inform students on how to score high grades in Cyber security & forensics. There are a lot of reasons for getting a bad score in your Cyber security & forensics exam and this video will help you rectify your mistakes and help you improve your grades.

Information about JNTU-K B.Tech R19 Cyber security & forensics was provided in detail in this article. To know more about the syllabus of other Engineering Subjects of JNTUH check out the official CynoHub application. Click below to download the CynoHub application.

Get Complete Lecture Notes for Cyber security & forensics on Cynohub APP

Download the APP Now! ( Click Here )

Leave your thought here

Your email address will not be published. Required fields are marked *