githubEdit

IT402 / CSDF

This Subject is part of IT Curriculum, CSE Students may skip this

Syllabus

Resources

chevron-rightM1: Introductionhashtag

[⤓] IT402-CSDF-M1-RESOURCEarrow-up-right

MODULE 1 - IT402 - STRUCTURED-SYLLABUS

  • Overview of Cyber Crimes

    • Introduction to cyber crimes

  • Classifications of Cyber Crimes

    • E-Mail Spoofing

    • Spamming

    • Cyber defamation

    • Industrial Spying/Industrial Espionage

    • Hacking

    • Software Piracy

    • Password Sniffing

    • Credit Card Frauds

    • Cyber Stalking

    • Botnets

    • Phishing

    • Pharming

    • Man-in-the-Middle Attack

    • Password Cracking

    • Keyloggers and Spywares

    • Virus and Worms

    • Trojan Horses and Backdoors

    • Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

    • SQL Injection

    • Buffer Overflow

chevron-rightM2: Cybersecurity Conceptshashtag

[⤓] IT402-CSDF-M2-RESOURCEarrow-up-right

MODULE 2 - IT402 - STRUCTURED-SYLLABUS

  • Introduction to Cybersecurity

    • Cybersecurity goals

    • Cybersecurity policy

    • Domain of cybersecurity policy

    • Elements of cybersecurity

  • Evolution and Implementation

    • Cybersecurity evolution

    • Implementing hardware-based security

    • Software-based firewalls

  • Security Management

    • Security standards

    • Assessing threat levels

    • Forming an incident response team

chevron-rightM3: Digital Forensics Fundamentalshashtag

[⤓] IT402-CSDF-M3-RESOURCEarrow-up-right

MODULE 3 - IT402 - STRUCTURED-SYLLABUS

  • Introduction to Digital Forensics

    • Overview of digital forensics

  • Applications of Digital Forensics

    • Use in law enforcement

    • Assistance to human resources/employment proceedings

    • Digital forensics services

  • Forensic Methodology

    • Benefits of professional forensics methodology

chevron-rightM4: Types of Computer Forensics Technologyhashtag

[⤓] IT402-CSDF-M4-RESOURCEarrow-up-right

MODULE 4 - IT402 - STRUCTURED-SYLLABUS

  • Forensic Technology Categories

    • Military computer forensic technology

    • Law enforcement computer forensic technology

    • Business computer forensic technology

  • Specialised Forensic Techniques

    • Specialised forensics techniques

    • Hidden data and how to find it

    • Spyware and adware

  • Data Protection

    • Protecting data from being compromised

    • Avoiding pitfalls with firewalls

chevron-rightM5: Cyber Law and Cyber Crimehashtag

[⤓] IT402-CSDF-M5-RESOURCEarrow-up-right

MODULE 5 - IT402 - STRUCTURED-SYLLABUS

  • Introduction to Cyber Law

    • IT laws and cyber crimes

    • Cyber laws

  • Intellectual Property and Legal Systems

    • Intellectual Property Rights (IPR)

    • Legal system of information technology

  • Social Engineering

    • Overview of social engineering

  • Cybercrime Reporting and Distinctions

    • Reporting cybercrime

    • Difference between cyber forensics and cybersecurity

Notes

MidTerm

[⤓] IT402-CSDF-M2-MidTerm-SHORT-NOTESarrow-up-right

EndSem

[⤓] IT402-CSDF-ALL-MODULES-NOTESarrow-up-right

Question Directory

Assignment Questions

[⤓] IT402-Assignment-1arrow-up-right

[⤓] IT402-Assignment-2arrow-up-right

Previous Year Questions

[⤓] Y2S4-IT402-CSDF-MidTerm-PYQ-APR25arrow-up-right

[⤓] Y2S4-IT402-CSDF-EndSem-PYQ-JUN25arrow-up-right

Get Credited for sharing your Knowledge Source with your Peers
Submit Queries/Feedbacks/Suggestions/Complaints using this Form

Last updated