CS8074 CYBER FORENSICS (CF)

CS8074 CYBER FORENSICS (CF)

          Stuff Sector

      Prepared by  
      Santhosh (Admin) 
Important questions 
share it a link alone
Don't share as screenshot kind request
Don't waste my hardwork and valuable time

UNIT -1
1. Forensic duplication and 
{investigation (systematic approach, Conducting)**(employee termination,Internet abuse)} full topic **
Rare
2. RNA IN CF
3. Acquiring dta with Linux  boot CD
UNIT -2
1. NTFS**, NTFA,FAT,FAT32 
2. RAID architecture

Don't share as screenshot

UNIT -3
1. Procedure to analyse UNIX, E-mail investigation Microsoft email server logs
2. Acquisition procedure for cell phones and Mobile devices 
UNIT -4
1.Footprinting and Reconnaissance,Scanning Networks
2.Malware Threats ,Sniffing**
3. Enumeration,System Hacking**
UNIT -5
1.Session hijacking
2.Hacking wireless networks,mobile platforms**
3.Sql injection**
PART-C

1.Compulsory Questions {a case study where the student will have to read and analyse the subject }
mostly asked from unit 3 (OR) a situation given and you have to answer on your own

don't waste my hardwork and valuable time

As Engineer i think you know how to respect another
Share it as link alone . don't share it as screenshot or any text material if u found this anywhere kindly report me . #Admin   WhatsApp

Contact uS *These questions are expected for the exams This may or may not be asked for exams
    All the best.... from admin Santhosh

          Thanks for your love and support guys keep supporting and share let the Engineers know about Us and leave a comment below for better improvements 
If there is any doubt feel free to ask me I will clear if I can or-else I will say some solutions ..get me through WhatsApp for instant updates                                                      ~$tuff$£ctor
Syllabus

UNIT I

INTRODUCTION TO COMPUTER FORENSICS

9

Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation – Data Acquisition.
UNIT IIEVIDENCE COLLECTION AND FORENSICS TOOLS9
Processing Crime and Incident Scenes – Working with Windows and DOS Systems. Current Computer Forensics Tools: Software/ Hardware Tools.
UNIT IIIANALYSIS AND VALIDATION     9
Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics – Email Investigations – Cell Phone and Mobile Devices Forensics
UNIT IVETHICAL HACKING      9
Introduction to Ethical Hacking - Footprinting and Reconnaissance - Scanning Networks - Enumeration - System Hacking - Malware Threats - Sniffing
UNIT VETHICAL HACKING IN WEB  
9
Social Engineering - Denial of Service - Session Hijacking - Hacking Web servers - Hacking Web Applications – SQL Injection - Hacking Wireless Networks - Hacking Mobile Platforms.





Santhosh (Admin)

TO THE ENGINEER FOR THE ENGINNEER BY AN ENGINEER Kindly join Us on social media's link at the top corner

Post a Comment

Please Select Embedded Mode To Show The Comment System.*

Previous Post Next Post