LESSON
PLAN
Subject
: CYBSER SECURITY |
||
Year :
IV B-Tech |
Semester
: II |
Branch : IT |
Faculty
: G. Durvasi |
Reg :
R16 |
Academic Year : 2020-21 |
· Understand foundational Cyber Security principles, Security architecture, risk management, attacks, incidents, and emerging IT and IS technologies.
· Understand the importance of Cyber Security and the integral role of Cyber Security professionals.
1. |
Factual
|
CO1: Able to Understand Cyber
Security architecture principles |
2. |
Conceptual |
CO2: Able to Identifying System
and application security threats and vulnerabilities |
3. |
Procedural
|
CO3: Able to Identifying different classes of attacks |
4. |
Applied |
CO4: Able to Understand Cyber Security
incidents to apply appropriate response CO5 : Able to Describing risk management processes and
practices CO6: Able to Evaluation of decision making
outcomes of Cyber Security scenarios |
TEXT
BOOKS:
1.
Cyber Security:
Understanding Cyber Crimes, Computer Forensics and Legal Perspectives,
Nina
Godbole, Sunit Belapure, Wiley.
2.
Principles of
Information Security, Micheal E.Whitman and Herbert J.Mattord, Cengage Learning.
1. Information
Security, Mark Rhodes, Ousley, MGH.
UNIT –
1 :
Introduction
to Cybercrime [Total
Classes : 10]
Activity
/ Schedule of UNIT-1 :
Pre-Class : Videos, E-books, Web links, Case Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Introduction, Cybercrime: Definition and Origins of the Word, |
To learn what cybercrime is. |
Refer Text Book -1 : Page no. 1 |
Discussion on pre-requisites (5 min) PPT presentation (35 min) Discussion or Poll activity (5 min) Summary (5min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Cybercrime and Information Security |
To understand the importance of
cyber security |
Refer Text Book -1 : Page no. 13 |
Revise previous class – (5 mins) PPT presentation (20 min) Example (5
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3 |
Who are Cybercriminals? |
To understand who is called as a
cybercriminal |
Refer Text Book -1 : Page no. 16 |
Revise previous class – (5 mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Classifications of Cybercrimes |
To understand different types of
cybercrime |
Refer Text Book -1 : Page no. 17 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Cybercrime: The Legal Perspectives, |
To understand the legal
perspective on cybercime |
Refer Text Book -1 : Page no. 32 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Cybercrimes: An Indian Perspective, Cybercrime and the Indian ITA 2000 |
To understand the legal
perspective on cybercime in india and ITA 2000 |
Refer Text Book -1 : Page no. 32 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
A Global Perspective on
Cybercrimes |
To get
an overview of cybercrime scenario in the overall global perspective. |
Refer Text Book -1 : Page no. 36 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
Cybercrime Era: Survival Mantra
for the Netizens |
To
understand Survival Mantra for the Netizens |
Refer Text Book -1 : Page no. 39 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
UNIT –
2 :
Cyberoffensess: How criminals
Plan Them [Total Classes : 10]
Activity:
Activity
/ Schedule of UNIT-2 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Introduction: Categories of
Cybercrime |
To understand categories of
cybercrime |
Refer Text Book -1 : Page no. 45 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) Practicing
Some Problems (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
How Criminals Plan the Attacks |
To get an overview of the steps
involved in planning cybercrime |
Refer Text Book -1 : Page no. 49 |
Discussion on pre-requisites (5 min) PPT
presentation (35 min) Discussion or Poll activity (5 min) Summery (5min) Doubts clari-fication (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3. |
Social engineering |
To get an overview on social
engineering |
Refer Text Book -1 : Page no. 61 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Cyberstalking |
To
understand what cyber stalking is |
Refer Text Book -1 : Page no. 65 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Cybercafé and Cybercrimes |
To learn
about the role of cybercafés in cybercrime |
Refer Text Book -1 : Page no. 67 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) Practicing
Some Problems (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Botnets: The fuel for cybercrime |
To learn
about botnets |
Refer Text Book -1 : Page no. 71 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) Practicing
Some Problems (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
Attack Vector |
To learn
about attack vector |
Refer Text Book -1 : Page no. 73 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8. |
Cloud Computing |
To get
an overview on cloud computing |
Refer Text Book -1 : Page no. 75 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9. |
Cybercrime and cloud computing |
To
understand the risk associated with cloud computing |
Refer Text Book -1 : Page no. 77 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
UNIT – 3 : Cybercrime: Mobile and Wireless Devices [Total Classes : 10]
Activity:
1 |
Factual |
Reading Prerequisite concepts- numbers Videos related to asymmetric
cryptography Referring the content on the
Internet |
2 |
Conceptual |
Video Lectures related to number
theory Links from the Internet Explained Examples from Internet |
3 |
Procedural |
Refer to text book content Understanding the concept by
implementation |
4 |
Applied |
Implementing Programs, Assignments Quiz
etc… |
Activity
/ Schedule of UNIT-3 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Introduction, Proliferation of
Mobile and Wireless Devices, |
To understand the growth of mobile
and wireless decvices |
Refer Text Book -1 : Page no. 82 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Trends in Mobility |
To understand mobility types and
implications |
Refer Text Book -1 : Page no. 84 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3 |
Credit Card Frauds in Mobile and
Wireless Computing Era |
To understand types of credit card
frauds in mobile and computing era |
Refer Text Book -1 : Page no. 87 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4 |
Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, |
To understand the security
challenges posed by mobile devices |
Refer Text Book -1 : Page no. 91 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5 |
Authentication
Service Security, |
To understand authentication
service security |
Refer Text Book -1 : Page no. 93 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6 |
Attacks on Mobile/Cell Phones |
To understand attacks on mobile
phones |
Refer Text Book -1 : Page no. 99 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7 |
Mobile Devices: Security Implications for Organizations, |
To understand security
implications for organizations |
Refer Text Book -1 : Page no. 107 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8 |
Organizational Measures for Handling Mobile |
To understand organizational
measures for handling mobile |
Refer Text Book -1 : Page no. 112 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9 |
Organizational Security Policies
and Measures in Mobile Computing Era, |
To understand security policies
and measures in mobile computing era |
Refer Text Book -1 : Page no. 114 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
10 |
Laptops |
To learn physical security
countermeasures on laptops |
Refer Text Book -1 : Page no. 116 |
|
|
UNIT –
4 :
Tools and Methods used in cybercrime [Total
Classes :12]
Activity:
1 |
Factual |
Reading Prerequisite concepts- security services, symmetric keys Videos related to security
services Referring the content on the
Internet |
2 |
Conceptual |
Video Lectures related Security
services and mechanisms NPTEL Videos Links from the Internet Explained Examples from Internet |
3 |
Procedural |
Refer to text book content |
4 |
Applied |
Assignments Quiz
etc… |
Activity
/ Schedule of UNIT-4 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Introduction, tools and methods
used in cybercrime |
|
Refer Text Book -1 : Page no. 125 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Proxy Servers and Anonymizers |
To understand about proxy servers
and anonymizers |
Refer Text Book -1 : Page no. 129 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3. |
Phishing |
|
Refer Text Book -1 : Page no. 131 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Password cracking, |
To learn about password cracking |
Refer Text Book -1 : Page no. 132 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Key loggers and Spywares |
To learn what keyloggers and
spywares do |
Refer Text Book -1 : Page no. 137 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Virus and Worms |
To get the overview of virus and
worms |
Refer Text Book -1 : Page no. 143 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
Trojan Horses and Backdoors |
To learn about Trojan horses and
backdoors |
Refer Text Book -1 : Page no. 151 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8. |
Steganography |
To understand what steganograpy is |
Refer Text Book -1 : Page no. 158 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9. |
DoS and DDoS |
To learn about DoS and DDoS attacks |
Refer Text Book -1 : Page no. 158 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
10. |
Sql Injection |
To learn about SQL injection |
Refer Text Book -1 : Page no. 164 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
11. |
Buffer Overflow |
To understand buffer overflow |
Refer Text Book -1 : Page no. 168 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
12. |
Attacks on Wireless Networks |
To get an overview of wireless
network hacking |
Refer Text Book -1 : Page no. 176 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
UNIT – 5
: Cybercrimes and
Cyber security:Why Do We Need Cyber laws [Total
Classes : 08]
Activity:
1 |
Factual |
Reading Prerequisite concepts- Network layers, email
architecture Videos related to network layer,
email service Referring the content on the
Internet |
2 |
Conceptual |
Video Lectures related to OSI
model NPTEL Videos Links from the Internet Explained Examples from Internet |
3 |
Procedural |
Refer to text book concepts Understanding the architectures |
4 |
Applied |
Assignments Quiz
etc… |
Activity
/ Schedule of UNIT-5 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
The
Indian Context, The Indian IT Act, |
|
Refer Text Book -1 : Page no. 253 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Challenges
to Indian Law and Cybercrime Scenario in India |
|
Refer Text Book -1 : Page no. 271 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in the group Review on the topic Share material on the topic |
3. |
Consequences of Not Addressing the
Weakness in Information Technology Act, |
|
Refer Text Book -1 : Page no. 272 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Digital Signatures and the Indian
IT Act |
|
Refer Text Book -1 : Page no. 273 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Information Security Planning and
Governance, |
To define management’s role in the
development, maintenance, and enforcement of information security policy,
standards, practices, procedures, and guidelines |
Refer Text Book -2 : Page no. 174 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Information Security Policy
Standards, Practices |
To define management’s role in the
development, maintenance, and enforcement of information security policy,
standards, practices, procedures, and guidelines |
Refer Text Book -2 : Page no.177 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
The information Security
Blueprint, |
To Describe what an information
security blueprint is, identify its major components, and explain how it
supports the information security program |
Refer Text Book -2 : Page no. 190 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8. |
Security education Training and
awareness program, |
To Discuss how an organization
institutionalizes its policies, standards, and practices using education,
training, and awareness programs |
Refer Text Book -2 : Page no. 209 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9 |
Continuing Strategies |
To Explain what contingency
planning is and how it relates to incident response planning, disaster
recovery planning, and business continuity plans |
Refer Text Book -2 : Page no. 211 |
|
|
UNIT – 6 : Understanding
Computer Forensics [Total
Classes : 12]
Activity:
1 |
Factual |
Reading
Prerequisite concepts- Referring
the content on the Internet |
2 |
Conceptual |
Video
Lectures related OSI model Explained
Examples from Internet |
3 |
Procedural |
Refer
to text book concepts Understanding
the architectures |
4 |
Applied |
Assignments Quiz etc… |
Activity / Schedule of UNIT-6 :
Pre-Class : Text books, Case Studies etc…
In-Class : Explanation on concept, discussion, doubts clarification, PPT, etc..
Post-Class : Discussion Forum, Review on topic, Assessment,
Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Introduction,
Historical Background of Cyber
forensics, |
To understand the fundamental
concepts in cyber forensics |
Refer Text Book -1 : Page no.317 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Digital
Forensics Science, The Need for Computer Forensics, |
To understand the
need for cyberforensics |
Refer Text Book -1 : Page no.320 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3. |
Cyber
forensics and Digital Evidence |
To learn what
digital evidences is |
Refer Text Book -1 : Page no.327 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Forensics
Analysis of E-Mail |
To understand
forensics analysis of E-mail |
Refer Text Book -1 : Page no.332 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Digital
Forensics Life Cycle, Chain of Custody Concept |
To understand
digital forensics life cycle |
Refer Text Book -1 : Page no.339 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6 |
Network Forensics, Approaching a
Computer Forensics Investigation, |
To understand Computer Forensics Investigation approach |
Refer Text Book -1 : Page no.357 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7 |
Computer
Forensics and Steganography |
To understand Computer Forensics and Steganography |
Refer Text Book -1 : Page no.368 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8 |
Relevance
of the OSI 7 Layer Model to Computer Forensics |
To understand the
network processes and protocols in OSI nodel |
Refer Text Book -1 : Page no.373 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9 |
Forensics and Social Networking Sites:
The Security/Privacy
Threats |
To understand the
data privacy issues involved |
Refer Text Book -1 : Page no.377 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
10 |
Computer
Forensics from Compliance Perspective, |
To understand the
legal requirements for cyberforensics and compliance perspective |
Refer Text Book -1 : Page no.383 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
11 |
Challenges
in Computer Forensics, |
To understand the
challenges faced in cyber-forensics |
Refer Text Book -1 : Page no.389 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
12 |
Special
Tools and Techniques, Forensics
Auditing, Ant forensics |
To learn about
cyber forensics tools available in the market To learn about
auditing |
Refer Text Book -1 : Page no.396 |
Revise previous class – (5 mins) Asking Questions on previous class
randomly (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
Total
classes:
Unit.No |
Name
Of The Unit |
Hours Planned |
Unit-1 |
|
10 |
Unit-2 |
|
12 |
Unit-3 |
|
14 |
Unit-4 |
|
17 |
Unit-5 |
|
8 |
Unit-6 |
Understanding Computer Forensics |
12 |
|
Total Hours |
71 |
Signature of HOD
(S. Kishor Babu)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.