JNTU-K B.TECH R19 4-1 Syllabus For Cyber security & forensics PDF 2022
February 1, 2022 2022-02-01 17:17JNTU-K B.TECH R19 4-1 Syllabus For Cyber security & forensics PDF 2022
JNTU-K B.TECH R19 4-1 Syllabus For Cyber security & forensics PDF 2022
Get Complete Lecture Notes for Cyber security & forensics on Cynohub APP

Download the APP Now! ( Click Here )
You will be able to find information about Cyber security & forensics along with its Course Objectives and Course outcomes and also a list of textbook and reference books in this blog.You will get to learn a lot of new stuff and resolve a lot of questions you may have regarding Cyber security & forensics after reading this blog. Cyber security & forensics has 5 units altogether and you will be able to find notes for every unit on the CynoHub app. Cyber security & forensics can be learnt easily as long as you have a well planned study schedule and practice all the previous question papers, which are also available on the CynoHub app.
All of the Topic and subtopics related to Cyber security & forensics are mentioned below in detail. If you are having a hard time understanding Cyber security & forensics or any other Engineering Subject of any semester or year then please watch the video lectures on the official CynoHub app as it has detailed explanations of each and every topic making your engineering experience easy and fun.
Cyber security & forensics Unit One
Introduction to Cybercrime
Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word,
Cybercrime and Information Security, Cybercriminals, Classifications of
Cybercrime, Cyberstalking, Cybercafe and Cybercrimes, Botnets. Attack Vector, Proliferation of Mobile and Wireless Devices, Security Challenges Posed by Mobile Devices, Attacks on Mobile/Cell Phones, Network and Computer Attacks.
Cyber security & forensics Unit Two
Tools and Methods
Tools and Methods : Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares,Virus and Worms, Trojan Horses and Backdoors, Steganography, Sniffers, Spoofing, Session Hijacking Buffer over flow, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Identity Theft (ID Theft), Foot Printing and Social Engineering, Port Scanning, Enumeration.
Get Complete Lecture Notes for Cyber security & forensics on Cynohub APP

Download the APP Now! ( Click Here )
Cyber security & forensics Unit Three
Cyber Crime Investigation
Cyber Crime Investigation: Introduction, Investigation Tools, eDiscovery, Digital Evidence
Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Hands on Case Studies. Encryption and Decryption Methods, Search and Seizure of Computers, Recovering Deleted Evidences, Password Cracking.
Cyber security & forensics Unit Four
Computer Forensics and Investigations
Computer Forensics and Investigations: Understanding Computer Forensics, Preparing for Computer Investigations. Current Computer Forensics Tools: Evaluating Computer Forensics
Tools, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics, Linux System Forensics, Graphics and Network Forensics, E-mail Investigations, Cell Phone and Mobile Device Forensics.
Cyber security & forensics Unit Five
Cyber Crime Legal Perspectives
Cyber Crime Legal Perspectives: Introduction, Cybercrime and the Legal Landscape around the World, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India,
Consequences of Not Addressing the Weakness in Information Technology Act, Digital Signatures and the Indian IT Act, Amendments to the Indian IT Act, Cybercrime and Punishment, Cyberlaw, Technology and Students: Indian Scenario.
Cyber security & forensics Course Objectives
Able to identify security risks and take preventive steps
To understand the forensics fundamentals
To understand the evidence capturing process
To understand the preservation of digital evidence
Cyber security & forensics Course Outcomes
At the end of the course, student will be able to
Enumerate the computer forensics fundamentals
Describe the types of computer forensics technology
Analyze various computer forensics systems
Illustrate the methods for data recovery, evidence collection and data seizure Identify the Role of CERT-In Security
Cyber security & forensics Text Books
1) Sunit Belapure Nina Godbole “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, WILEY, 2011.
2) Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage Learning, New Delhi, 2009
Cyber security & forensics Reference Books
1) Michael T. Simpson, Kent Backman and James E. Corley, “Hands on Ethical Hacking and Network Defence”, Cengage, 2019.
2) Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.
3) Alfred Basta, Nadine Basta,Mary Brown and Ravinder Kumar “Cyber Security and Cyber Laws” , Cengage,2018.
Scoring Marks in Cyber security & forensics
Scoring a really good grade in Cyber security & forensics is a difficult task indeed and CynoHub is here to help!. Please watch the video below and find out how to get 1st rank in your B.tech examinations . This video will also inform students on how to score high grades in Cyber security & forensics. There are a lot of reasons for getting a bad score in your Cyber security & forensics exam and this video will help you rectify your mistakes and help you improve your grades.
Information about JNTU-K B.Tech R19 Cyber security & forensics was provided in detail in this article. To know more about the syllabus of other Engineering Subjects of JNTUH check out the official CynoHub application. Click below to download the CynoHub application.
Get Complete Lecture Notes for Cyber security & forensics on Cynohub APP
