Lab Experiments:
File System Analysis
Log Analysis
Network Devices: Modem, Router, Switch, Hub, Repeater
SQL Injection
Cross Site Scripting
Click Jacking
TCP/IP Attacks
Botnet analysis
Malware Analysis
IR Objectives and Team Building
Email Tracking
IP Tracking
Cyber psychology and Social Engineering Test Profiling
PRACTICAL- DIGITAL FORENSIC
Lab Experiments:
To identify, seize and preserve digital evidence from crime scenes.
To detect deletions, obliterations and modifications of files using encase software.
To trace routes followed by e-mails and chats.
To identify the IP address of the sender of e-mails.
To demonstrate concealment techniques using cryptographic PGP.
To identify encrypted files.
To identify hidden files.
To use digital signatures for securing e-mail and online transactions.
To acquire data from PCs/laptops/HDDs/USBs, pen drives, memory cards and SIM cards.
To use symmetric and asymmetric keys for protection of digital record.
To carry out imaging of hard disks.
Charles P. Fleeger, "Security in Computing", Prentice Hall, New Delhi, 2009.
BehrouzA.Forouzan, ―Cryptography & Network Security‖, Tata McGraw Hill, India, New Delhi, 2009.
William Stallings, ―Cryptography and Network Security, Prentice Hall, New Delhi, 2006
Chalie Kaufman, Radia Perlman, Mike Speciner, ―Network Security: Private Communication in a Public Network‖, Pearson Education, New Delhi, 2004.
Neal Krawetz, ―Introduction to Network Security‖, Thomson Learning, Boston, 2007.
Bruce Schneier, ―Applied Cryptography‖, John Wiley & Sons, New York, 2004.
Samir Nanavati, Michael Thieme, Raj Nanavati “Biometrics – Identity Verification in a Networked World”, WILEY- Dream Tech Edition 2009.(UNIT 1,2,3,4,)
Paul Reid “Biometrics for Network Security”, Pearson Education.2009. (UNIT – V)
Daniel Jurafsky and James Martin “Speech and Language Processing”, 2nd edition, Prentice- Hall, 2008.
Xuedong Huang, Alex Acero and Hsiao-Wuen Hon, “Spoken Language Processing”, Prentice- Hall, May 2001.
Paul Taylor, ”Text-to-Speech Synthesis”, Cambridge University Press, February 2009.
Links:
[1] https://forensicscience.iisuniv.ac.in/courses/subjects/practicalde1-de2-cyber-crime-1
[2] https://forensicscience.iisuniv.ac.in/academic-year/2022-2023