Digital Forensics By Dr. Navjot Kaur Kanwal

Language: 
English

If you are an internet user, this is a must join course for you, designed in a most illustrative manner with lot of multimedia for your better understanding. Technology has facilitated us in many ways, almost in all facets of our life. No one can deny the extent of convenience being provided by Information and communication technology but in contrast because of its anonymity, it provides a suitable platform for criminals to commit crime. In the contemporary world due to revolutionary outburst of computers and mobile phones which has led to increase in various types of cyber crimes using these digital devices and Internet. Digital Forensics is a branch of Forensic Science comprises of recovery and investigation of materials found in digital devices like a Computers, network devices, tablet or a cell phone and typically refers to the seizure, acquisition, and analysis of digital data and the presentation of the report in the courtroom. 
The course is very useful for the students, lawyers, investigating officers who are keen to know and passionate about the concepts of Digital Forensics. There is continuous increase in the demand of digital forensic experts, a flourishing carrier option for those who are interested to explore this challenging profession. Other than career option, it makes you aware about different threats on the internet and how to protect yourself from all these threats. 

This course is based on UGC Curriculum and presented as a four credit elective course. The objective of this course are to :
•    Understand and utilize the  fundamental concept of computers and digital forensics
•    Students shall be prepared for various technologies/tools to combat and investigate computer and cyber crimes.
      The first part deals with fundamentals of computer architecture, importance of hardware , software , input/output devices, processor, memory, storage devices, then make you learn about various file systems and encoding and decoding in computers.
     The second half of the syllabus is dedicated to various types of cyber crimes and its investigation and finally we would understand some of the challenges faced in present scenario. 

Course layout
Week        Lecture         Title of Video and Reading text/Lecture/ppt

First Week    Lecture 1        Introduction to Digital Forensics 
            Lecture 2        Fundamentals of Computer Hardware and accessories-1
            Lecture 3        Fundamentals of Computer Hardware and accessories-2

Second week    Lecture 4        Computer architecture 
            Lecture 5        Understanding the binary number system & Conversions 
            Lecture 6        Encoding and Decoding  formats 

Third Week    Lecture 7        Methods of storing data
            Lecture 8        Computer Memory
            Lecture 9        Development of hard disk, physical construction, CHS & LBA addressing

Fourth Week    Lecture 10      Processor
            Lecture 11    Software 
            Lecture 12      Operating System Part I 

Fifth week    Lecture 13      Operating System Part II (History & Development)
            Lecture 14      Understanding file system –I
            Lecture 15     Understanding file system-II (file formats )

Sixth Week    Lecture 16      Networking and types of networks
            Lecture 17      Networking Devices
            Lecture 18      Internet

Seventh Week    Lecture 19      The Internet Protocols
            Lecture 20      Definition and types of computer crimes
            Lecture 21      Distinction between computer crimes and conventional crimes.

 Eighth week     Lecture 22      Basic Concepts of  Network security –I
            Lecture 23     Basic Concepts of  Network security –II
            Lecture 24     Encryption and decryption methods

Ninth Week    Lecture 25      Types of computer crimes-l
                        Computer virus, and computer worm, Trojan horse, trap door, super zapping, logic bombs.
            Lecture 26     Types of computer crimes-ll
                          Social media crimes, intellectual property crimes, cyber pornography& child pornography,                         cyber terrorism, hate speech and cyber security
            Lecture 27     Types of computer crimes –lll

Tenth Week    Lecture 28        Seizure of suspected computer. Preparation required prior to seizure
            Lecture 29         Legal and privacy issues in computer forensics
            Lecture 30         Open and Proprietary tools for Digital Forensics

Eleventh week    Lecture 31         Disk Forensics
            Lecture 32         Digital Forensics-Memory & Network forensics
            Lecture 33         Computer forensic investigation Restoration of deleted files, Password cracking, Email                            tracking

Twelfth week     Lecture 34         Digital Forensics - Mobile phone Forensics
            Lecture 35         Digital  Forensics - forensics
            Lecture 36          Relevant law to combat computer crime –Information Technology Act

Thirteen week    Lecture 37          Discussion on Practical aspects of IT Act
            Lecture 38          New challenges of computer forensic-I
            Lecture 39          New challenges of computer forensic- II

Books and references
•    Bayuk, J. (2010). CyberForensics: Understanding information security investigations. Springer Science & Business     Media.
•    Casey, E. (2009). Handbook of digital forensics and investigation. Academic Press.
•    Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the internet. Academic     Press.
•    EC-Council. (2016). Computer forensics: Investigating network intrusions and cybercrime (CHFI). Cengage Learning.
•    Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2015). Cybercrime and digital forensics: An introduction.     Routledge.
•    Nelson, B., Phillips, A., & Steuart, C. (2014). Guide to computer forensics and investigations. Cengage Learning.
•    Rajaraman, V. (2008). Computer basics and C programming. PHI Learning Pvt.
•    Robertazzi, T. (2011). Basics of computer networking. Springer Science & Business Media.
•    Sammons, J. (2012). The basics of digital forensics: The primer for getting started in digital forensics. Elsevier.
•    Santanam, R., Sethumadhavan, M., & Virendra, M. (2010). Cyber security, cyber crime and cyber forensics:     Applications and perspectives: Applications and perspectives. IGI Global.
•    Wempen, F. (2014). Computing fundamentals: Introduction to computers. John Wiley & Sons.

Summary
Course Status :    Upcoming
Course Type :    Elective
Duration :    16 weeks
Start Date :    05 Jul 2021
End Date :    23 Oct 2021
Exam Date :    
Enrollment Ends :    31 Aug 2021
Category :    
Library and Information Sciences
Credit Points :    4
Level :    Undergraduate/Postgraduate

Knowledge Partner: 

ITI Student Resume Portal

रिज्यूम पोर्टल का मुख्य उद्देश्य योग्य छात्रों की जानकारी सार्वजनिक पटल पर लाने की है जिससे जिन्हें आवश्यकता हो वह अपने सुविधा अनुसार छात्रों का चयन कर सकते हैं

ITI Student Resume

Search engine adsence

अडाना | अभोगी कान्ह्डा | अल्हैया बिलावल | अल्हैयाबिलावल | अहीर भैरव | अहीरभैरव | आनंदभैरव | आसावरो | ककुभ | कलावती | काफ़ी | काफी | कामोद | कालिंगड़ा जोगिया | कीरवाणी | केदार | कोमल-रिषभ आसावरी | कौशिक कान्हड़ा | कौशिक ध्वनी (भिन्न-षड्ज) | कौसी  | कान्ह्डा | खंबावती | खमाज | खम्बावती | गारा | गुणकली | गुर्जरी तोडी | गोपिका बसन्त | गोरख कल्याण | गौड मल्हार | गौड सारंग | गौड़मल्लार | गौड़सारंग | गौरी | गौरी (भैरव अंग) |चन्द्रकान्त | चन्द्रकौन्स | चारुकेशी | छाया-नट | छायानट | जयजयवन्ती | जयतकल्याण | जलधर  | केदार | जेजैवंती | जेतश्री | जैत | जैनपुरी | जोग | जोगकौंस | जोगिया | जोगेश्वरी | जौनपुरी | झिंझोटी | टंकी | तिलंग | तिलंग बहार | तिलककामोद | तोडी | त्रिवेणी | दरबारी कान्हड़ा | दरबारी कान्हडा | दीपक | दुर्गा | दुर्गा द्वितीय | देव गन्धार | देवगंधार | देवगिरि बिलावल | देवगिरी | देवर्गाधार | देवश्री | देवसाख | देश | देशकार | देस | देसी | धनाश्री | धानी | नंद | नट भैरव | नट राग | नटबिलावल | नायकी कान्ह्डा | नायकी द्वितीय | नायकीकान्हड़ा | नारायणी | पंचम | पंचम जोगेश्वरी | पटदीप | पटदीपकी | पटमंजरी | परज | परमेश्वरी | पहाड़ी | पीलू | पूरिया | पूरिया कल्याण | पूरिया धनाश्री | पूर्याधनाश्री | पूर्वी | प्रभात | बंगालभैरव | बड़हंससारंग | बसन्त | बसन्त मुखारी | बहार | बागेश्री | बागेश्वरी | बिलावल शुद्ध | बिलासखानी तोडी | बिहाग | बैरागी | बैरागी तोडी | भंखार | भटियार | भीम | भीमपलासी | भूपाल तोडी | भूपाली | भैरव | भैरवी | मधमाद सारंग | मधुकौंस | मधुवन्ती | मध्यमादि सारंग | मलुहा | मल्हार | मांड | मारवा | मारू बिहाग | मालकौंस | मालकौन्स | मालगुंजी | मालश्री | मालीगौरा | मियाँ की मल्लार | मियाँ की सारंग | मुलतानी | मेघ | मेघ मल्हार | मेघरंजनी | मोहनकौन्स | यमन | यमनी | रागेश्री | रागेश्वरी | रामकली | रामदासी मल्हार | लंका-दहन सारंग | लच्छासाख |ललिट | ललित | वराटी | वसंत | वाचस्पती | विभाग | विभास | विलासखानी तोड़ी | विहाग | वृन्दावनी सारंग | शंकरा | शहाना | शहाना कान्ह्डा | शिवभैरव | शिवरंजनी | शुक्लबिलावल | शुद्ध कल्याण | शुद्ध मल्लार | शुद्ध सारंग | शोभावरी | श्याम | श्याम कल्याण | श्री | श्रीराग | षट्राग | सरपर्दा | सरस्वती | सरस्वती केदार | साजगिरी | सामंतसारंग | सारंग (बृंदावनी सारंग) | सिंदूरा | सिंधुभैरवी | सिन्धुरा | सुघराई | सुन्दरकली | सुन्दरकौन्स | सूरदासी मल्हार | सूरमल्लार | सूहा | सैंधवी | सोरठ | सोहनी | सौराष्ट्रटंक | हंसकंकणी | हंसकिंकिणी | हंसध्वनी | हमीर | हरिकौन्स | हामीर | हिंदोल | हिन्डोल | हेमंत |हेमकल्याण | हेमश्री |