CS8074 CYBER FORENSICS (CF)
Prepared by
Santhosh (Admin)
Important questions
share it a link alone
Don't share as screenshot kind request
Don't waste my hardwork and valuable time
UNIT -1
1. Forensic duplication and
{investigation (systematic approach, Conducting)**(employee termination,Internet abuse)} full topic **
Rare
Rare
2. RNA IN CF
3. Acquiring dta with Linux boot CD
3. Acquiring dta with Linux boot CD
UNIT -2
1. NTFS**, NTFA,FAT,FAT32
2. RAID architecture
Don't share as screenshot
UNIT -31. Procedure to analyse UNIX, E-mail investigation Microsoft email server logs
2. Acquisition procedure for cell phones and Mobile devices
2. Acquisition procedure for cell phones and Mobile devices
UNIT -4
1.Footprinting and Reconnaissance,Scanning Networks
2.Malware Threats ,Sniffing**
3. Enumeration,System Hacking**
2.Malware Threats ,Sniffing**
3. Enumeration,System Hacking**
UNIT -5
1.Session hijacking
2.Hacking wireless networks,mobile platforms**
3.Sql injection**
PART-C
1.Compulsory Questions {a case study where the student will have to read and analyse the subject }
mostly asked from unit 3 (OR) a situation given and you have to answer on your own
don't waste my hardwork and valuable time
As Engineer i think you know how to respect another
Share it as link alone . don't share it as screenshot or any text material if u found this anywhere kindly report me . #Admin WhatsAppContact uS
*These questions are expected for the exams This may or may not be asked for exams All the best.... from admin Santhosh
Thanks for your love and support guys keep supporting and share let the Engineers know about Us and leave a comment below for better improvements If there is any doubt feel free to ask me I will clear if I can or-else I will say some solutions ..get me through WhatsApp for instant updates ~$tuff$£ctorSyllabus
Contact uS
*These questions are expected for the exams This may or may not be asked for exams
All the best.... from admin Santhosh
Thanks for your love and support guys keep supporting and share let the Engineers know about Us and leave a comment below for better improvements
If there is any doubt feel free to ask me I will clear if I can or-else I will say some solutions ..get me through WhatsApp for instant updates ~$tuff$£ctorUNIT I | INTRODUCTION TO COMPUTER FORENSICS | 9 |
---|
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation – Data Acquisition.
UNIT II | EVIDENCE COLLECTION AND FORENSICS TOOLS | 9 |
---|
Processing Crime and Incident Scenes – Working with Windows and DOS Systems. Current Computer Forensics Tools: Software/ Hardware Tools.
UNIT III | ANALYSIS AND VALIDATION | 9 |
---|
Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics – Email Investigations – Cell Phone and Mobile Devices Forensics
UNIT IV | ETHICAL HACKING | 9 |
---|
Introduction to Ethical Hacking - Footprinting and Reconnaissance - Scanning Networks - Enumeration - System Hacking - Malware Threats - Sniffing
UNIT V | ETHICAL HACKING IN WEB | 9 |
---|
Social Engineering - Denial of Service - Session Hijacking - Hacking Web servers - Hacking Web Applications – SQL Injection - Hacking Wireless Networks - Hacking Mobile Platforms.