Cyber Security and Digital Forensics
Module 1
Information Technology Act, 2000
Module 2
Proliferation of Mobile and Wireless Devices
Credit Card Frauds in Mobile and Wireless Computing Era
Module 3
Password Cracking
Keyloggers and Spywares
Module 4
Digital Forensics in Information Security
Relevance of the OSI 7 Layer Model to Computer Forensics
Challenges in Computer Forensics
Special Tools and Techniques Digital Forensics
Module 5
Explain role and responsibilities of people involved in data collection
Module 6
Network security tools and attacks
Email Investigations – E-Mail protocol, E-Mail as Evidence, Working of EMail, Steps in the E- Mail communication, IP Tracking, E-Mail Recovery
Android Data Extraction Techniques: Manual data extraction, Logical data
extraction, Physical data extraction
0 Comments