Cyber Security and Digital Forensics

 Cyber Security and Digital Forensics 


Module 1

What is Cybercrime

Classifications of cybercrime

Information Technology Act, 2000


Module 2

E-Mail Spoofing

Spamming

data diddling 

salami attack

Cyber defamation

Internet Time Theft

SocialEngg 

Cyber stalking

Botnets 

Attack vector 

Cloud computing

Proliferation of Mobile and Wireless Devices

Trends in Mobility

Credit Card Frauds in Mobile and Wireless Computing Era


Module 3

Phishing 

Password Cracking

Keyloggers and Spywares

Virus ,worms and trojans

Steganography

DoS and DDoS Attacks

SQL Injection

Buffer OverFlow

Attacks on Wireless Networks

Identity Theft (ID Theft) 



Module 4

Digital Forensics in Information Security

Need of digital forensics

Digital forensic life cycle

Relevance of the OSI 7 Layer Model to Computer Forensics

Challenges in Computer Forensics

Special Tools and Techniques Digital Forensics


Module 5

Explain role and responsibilities of people involved in data collection 

techniques

What is digital evidence

Network Forensic

Steganography


Module 6
Network security tools and attacks

Email Investigations – E-Mail protocol, E-Mail as Evidence, Working of EMail, Steps in the E- Mail communication, IP Tracking, E-Mail Recovery


Android Data Extraction Techniques: Manual data extraction, Logical data 
extraction, Physical data extraction





0 Comments