M.Tech Cyberforensics Curriculum 2022
M.Tech Cyberforensics Curriculum 2022
Academic
Board of Studies
Curriculum Council
00 recommendation 16.09.2022
Revision No: Approved
date :
date:
01.
02.
Salient Points of
03.
the revision
04.
05.
Note: Times new Roman font and size 12 should be used throughout the document if
specific size is not mentioned.
SRI VENKATESWARA COLLEGE OF ENGINEERING,
(An Autonomous Institution, Affiliated to Anna University, Chennai – 600025)
REGULATIONS 2022
PROGRAMEDUCATIONALOBJECTIVES(PEOs)
PROGRAMOUTCOMES(POs)
PO GRADUATEATTRIBUTES
1. An ability to independently carry out research /investigation and development work to
solve practical problems.
3. Students should be able to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher than the
requirements in the appropriate bachelor program
PEO’s–PO’s&PSO’sMAPPING: (Example)
POs PEOs
I II
1.
2.
3.
SRI VENKATESWARA COLLEGE OF ENGINEERING,
(An Autonomous Institution, Affiliated to Anna University, Chennai – 600025)
REGULATION 2022
CHOICE BASED CREDIT SYSTEM
[Link] CYBERFORENSICS AND INFORMATION SECURITY
CURRICULUM
SEMESTER I
8 Ethical Hacking
CF22112 Essentials PC 0 0 4 2 4 - F
Laboratory
Total 18 2 6 24 28
SEMESTER II
8 Case Study I –
CF22213 Forensic Investigations EEC 0 0 2 1 2 - F
Total 15 2 8 22 25
Semester III
Professional Elective IV
2
PE 3 0 0 3 3 - M
Professional Elective V
3
PE 3 0 0 3 3 - M
Practical Subjects
EEC
6 CF22311 Project Phase I 0 0 12 6 12 - F
Total 9 0 12 15 21
Semester IV
Practical Subjects
EEC
6 CF22411 Project Phase II 0 0 24 12 24 - F
Total 0 0 24 12 24
Total Credit : 73
PROFESSIONAL ELECTIVE
COURSE OBJECTIVES:
1. To understand the concepts of number theory which play an important role in computer
science and cryptography.
2. To understand basic concepts of various algebraic structures used in computer science.
3. To understand the concepts of advanced algebraic structures used in computer science
4. To understand the basic mathematical principles and functions that form the
foundation for coding theory
5. To understand basics of elliptic curves and pseudo random numbers and its usage
TOTAL: 60 PERIODS
OUTCOMES:
Upon successful completion of the course, students should be able to:
CO statements RBT
CO
level
CO1 Grasp the concepts of number theory and their applications to AP
cryptography.
TEXT BOOKS:
1. Kenneth H Rossen, Discrete Mathematics and its Applications, Seventh Edition,
McGraw Hill, 2012.
2. Rudolf Lidl, Gunter Pilz, Applied Abstract Algebra, Second Edition, Springer, 1998.
3. D.S. Malik, J. Mordeson, M.K. Sen, Fundamentals of abstract algebra,
McGraw Hill, 1997.
4. Joseph A. Gallian, Contemporary Abstract Algebra, Narosa, 1998.
5. L. Washington, Elliptic Curves: Number Theory and Cryptography, Chapman
& HallCRC, 2003.
REFERENCES:
1. Niven, H.S. Zuckerman, H. L. Montgomery, An introduction to the theory of
numbers, John Wiley and Sons, 2001.
2. Fraleigh J.B., A first course in abstract algebra, Pearson Education, 2005.
3. Douglas R Stinson, Cryptography: Theory and Practice, CRC Press, 2015.
COs POs
1 2 3
1. 1 3
2. 1 3
3. 1 3
4. 1 3
5. 1 3
CF22101 FOUNDATIONS OF CYBER SECURITY L T P C
3 1 0 4
COURSE OBJECTIVES:
1. Understand various block cipher and stream cipher models
2. Describe the principles of public key cryptosystems, hash functions and digital
signature
3. To get a firm knowledge on Cyber Security Essentials
OUTCOMES:
Upon successful completion of the course, students should be able to:
CO statements RBT
CO
level
CO1 Implement basic security algorithms required by any computing system AP
Analyze the vulnerabilities in any computing system and hence be
CO2 AN
able to design a securitysolution
Analyze the possible security attacks in complex real time systems
CO3 AN
and their effective countermeasures
CO4 Enumerate various governing bodies of cyber laws AP
CO5 Impart various privacy policies for an organization AP
REFERENCES:
1. William Stallings, “Cryptography and Network Security”, Pearson Education, 6th
Edition, 2013.
2. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in
Computing, 5th Edition , Pearson Education , 2015.
3. Graham, J. Howard, R., Olson, R., Cyber Security Essentials, CRC Press, 2011.
4. George [Link], Cyber Space and Cyber Security, CRC Press, 2013.
COs POs
1 2 3
1. 3 1 3
2. 3 1 3
3. 3 1 3
4. 3 1 3
5. 3 1 3
L T P C
CF22102 ADVANCED OPERATING SYSTEMS 3 0 0 3
COURSE OBJECTIVES:
1. Have a detailed knowledge on Operating system concepts
2. Understand the need for operating system security
3. Administer an open source Operating System
TOTAL: 45 PERIODS
OUTCOMES:
Upon successful completion of the course, students should be able to:
CO statements RBT
CO
level
CO1 Enumerate the basic functionalities of operating system AP
CO2 Demonstrate Linux system administration AP
CO3 Formulate Security features for an operating system AP
CO4 Perform memory management in OS AP
CO5 Implement Trust model for Multics system AP
REFERENCES:
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, John Wiley & Sons ,Inc., 9th Edition, 2012.
2. Trent Jaeger, “Operating Systems Security”, Morgan & Claypool Publishers, 2008.
3. Tom Adelstein and Bill Lubanovic, “Linux System Administration”, O'Reilly
Media, Inc., 1st Edition, 2007.
4. William Stallings, “Operating System: Internals and Design Principles”, Prentice
Hall, 7th Edition, 2012.
COs POs
1 2 3
1. 3 1 3
2. 3 1 3
3. 3 1 3
4. 3 1 3
5. 3 1 3
L T P C
CF22103 NETWORK PRINCIPLES AND SECURITY 3 0 0 3
COURSE OBJECTIVES:
1. Identify the basic networking principles
2. Understand the need for network security
3. Expose themselves to security at various network layers
TOTAL: 45 PERIODS
OUTCOMES:
Upon successful completion of the course, students should be able to:
CO statements RBT
CO
level
CO1 Classify and secure various layers of networks AN
CO2 Understand the concept of Network Layer Security U
CO3 Develop protocols for Web and Mail security AP
CO4 Apply various password management techniques for system security AP
CO5 Develop measures for cloud and wireless network security AP
REFERENCES:
1. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and
Protocols”, Wiley Publications, 2003.
2. Charles Pfleeger, ”Security in Computing”, Prentice Hall, 4th Edition, 2006.
3. William Stallings, “Cryptography and Network Security”, Pearson Education, 6th
Edition, 2013.
4. Charlie Kaufman, Radia Perlman, Mike Speciner, “Network Security”, Prentice Hall,
2nd edition , 2002.
COs POs
1 2 3
1. 2 1 3
2. 2 1 3
3. 3 1 3
4. 3 1 3
5. 3 1 3
L T P C
CF22104 COMPUTER FORENSICS & DIGITAL EVIDENCE 3 0 0 3
COURSE OBJECTIVES:
1. Study the procedure for forensic investigation
2. Audit and analyze the computer systems for data extraction
3. Understand the process of cloud and mobile device forensics
CO statements RBT
CO
level
CO1 Plan and prepare for all stages of an investigation AP
CO2 Explore web server attacks, DNS and router attacks AN
CO3 Identify various evidences of cyber crime AP
CO4 Examine network traffic and identify illicit servers E
CO5 Acquire data from mobile devices and crime scenes securely AP
REFERENCES:
1. Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer
Forensics and Investigations: Processing Digital Evidence”, 5th edition,
Cengage Learning, 2015.
2. John [Link], “Computer Forensics”, Cengage Learning, 2005.
3. Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and
Investigations”, Cengage Learning, India Edition, 2008.
4. Marjie [Link], “Computer Forensics and Cyber Crime: An Introduction”,
3rd Edition, Prentice Hall, 2013.
COs POs
1 2 3
1. 2 2 3
2. 2 2 3
3. 2 2 3
4. 2 2 3
5. 2 2 3
L T P C
GR22251 Introduction to Research Methodology and IPR 3 0 0 3
COURSE OBJECTIVES:
To impart knowledge on formulation of research problem, research methodology, ethics
involved in doing research and importance of IPR protection.
OUTCOMES:
Upon successful completion of the course, students should be able to:
CO statements RBT
CO
level
CO1 Critically evaluate any research article based upon research E
methodology.
Correlate the results of any research and develop hypothesis, concept,
CO2 AN
theory and model.
Developing a research proposal, research presentation and review article
CO3 AP
in the field of engineering.
CO4 Enumerate the importance of intellectual property right in research. AP
Develop proposal for patent rights and identify the new developments in
CO5 AP
IPR
TEXT BOOKS:
1. Ranjit Kumar, Research Methodology- A step by step guide for beginners, Pearson
Education, Australia, fourth edition, 2014
2. Ann M. Korner, Guide to Publishing a Scientific paper, Bioscript Press 2008
3. T. Ramappa, “Intellectual Property Rights Under WTO”, S. Chand, 2008
REFERENCES:
1. Kothari, C. R. Research Methodology - Methods and Techniques, New Age International
publishers, New Delhi, fourth edition, 2019
2. Stuart Melville and Wayne Goddard, “Research methodology: an introduction for science &
engineering students’, Juta & Company, 1996.
3. Robert P. Merges, Peter S. Menell and Mark A. Lemley, “Intellectual Property in New
Technological Age”, Aspen Publishers, 2016.
At the end of the course add the Course articulation matrix as per the following format:
COs PO
1 2 3 4 5 6 7 8 9 10 11 12 13 14
1. 3 3 3 2 3 2 2 3 - 2 1 2 3 3
2. 3 3 3 3 3 1 1 2 2 2 2 2 3 3
3. 3 3 3 3 3 - 2 3 2 2 3 2 3 3
4. 2 2 3 2 2 1 - 3 1 2 2 1 2 3
5. 3 3 3 2 3 2 2 3 2 2 2 2 3 3
CF22111 NETWORK DESIGN AND SECURITY LABORATORY
L T P C
0 0 3 2
COURSE OBJECTIVES:
1. Understand the basics of Networking
2. Learn network programming in Linux using C/Python
List of Exercises
I Network Design using CISCO Packet Tracer
1. Configure a LAN with a switch/hub with minimum 3 PCs
2. Configure a internetwork with 2 routers and two or more LANs using static routes
3. Establish a dynamic routing based internetwork with 2 routers and two or more
LANs using RIP/OSPF
4. Analyze the performance of various TCP variants using an FTP application for
the givennetwork
II Network Programming using C/Python
5. Develop a program for demonstrating inter process communication
6. Creation of TCP client/server application
7. Creation of UDP client/server application
8. Develop an Iterative UDP server with 2 or 3 clients
9. Develop a concurrent TCP server with 2 or 3 clients
10. Implement Digital Signature
11. Implement ARP and RARP
12. Create a Socket based application in Python
13. Intrusion Detection using Snort tool
14. Create an application that interacts with e-mail servers in python
15. Develop applications that work with remote servers using SSH, FTP etc in Python
16. Simulate PING and TRACEROUTE commands
Total Hours:45 Periods
Course Outcomes:
At the end of the course, the students will be able to,
CO statements RBT
CO
level
CO1 Design and Configure LAN’s AP
CO2 Create simple network applications using C/Python AP
CO3 Demonstrate Interprocess communication AP
CO4 Simulate IDPS AP
CO5 Develop applications that work with remote servers AP
COs POs
1 2 3
1. 2 1 3
2. 2 1 3
3. 3 1 3
4. 3 1 3
5. 3 1 3
L T P C
CF22112 ETHICAL HACKING ESSENTIALS LABORATORY 0 0 3 2
COURSE OBJECTIVES:
1. Understand the basics of Ethical Hacking
2. Learn various Hacking tools
List of Exercise
1. Basic Linux Commands
2. Advanced Linux commands
3. Information Gathering
4. Vulnerability Analysis
5. Web Application Analysis
6. Database Assessment
7. Password Attacks
8. Wireless Attacks
9. Reverse Engineering
10. Exploitation tools
11. Sniffing & spoofing
12. VM-WARE
Course Outcomes:
At the end of the course, the students will be able to,
CO statements RBT
CO
level
CO1 Gather the information from various sources AP
CO2 Assess the vulnerabilities in Database AN
CO3 Analyse the vulnerabilit ies in Web application AN
CO4 Enumerate various attacks and its counter measures AP
CO5 Use different Exploitation tools AP
LIST OF EQUIPMENT FOR A BATCH OF 18 STUDENTS:
SOFTWARE:
Kali Linux and its Tools
HARDWARE:
Standalone desktops - 18
COs POs
1 2 3
1. 2 2 3
2. 2 2 3
3. 2 2 3
4. 2 2 3
5. 2 2 3
L T P C
CF22201 FUNDAMENTALS TO SECURITY IN BIOMETRICS 3 0 0 3
COURSE OBJECTIVES:
The students will be able to
1. Understand the functionalities of biometrics
2. Discover the need of biometrics for an organization
3. Learn to develop biometric based applications
4. Emphasize the need of biometric security
TOTAL: 45 PERIODS
OUTCOMES:
Upon successful completion of the course, students should be able to:
CO statements RBT
CO
level
CO1 Identify various biometric techniques
CO2 Design biometric recognition systems
CO3 Develop simple biometric based application
CO4 Elucidate the need for biometric security
CO5 Analyse the various attcks possible in Biometric system
References
1. James wayman,Anil [Link] ,Arun [Link] ,Karthik Nandakumar, “Introduction to Biometrics”,
Springer, 2011.
2. Khalid saeed with Marcin Adamski, “New Directions in Behavioral
Biometrics”, CRC Press 2017
3. Paul Reid "Biometrics For Network Security ", Person Education 2004.
COs POs
1 2 3
1. 2 2 3
2. 3 2 3
3. 3 2 3
4. 2 2 3
5. 2 2 3
L T P C
CF22202 DIGITAL FORENSICS AND DIGITAL INVESTIGATIONS 3 0 0 3
COURSE OBJECTIVES:
The students will be able
1. To understand the basic digital forensics and techniques for conducting the forensic
examination on different digital devices.
2. To understand how to examine digital evidences such as the data acquisition, identification
analysis.
TOTAL: 45 PERIODS
OUTCOMES:
Upon successful completion of the course, students should be able to:
CO statements RBT
CO
level
Relate the fundamentals of computer forensics, laws, report writing and
CO1
tools in digital investigations.
Assess the investigative smart practices and applicability of concerned
CO2
laws & investigative tools
CO3 Inspect the acquired data, recover the deleted data and manage a case .
Select the correct method to handle the digital evidence and acquire
CO4
appropriate certification to build the career in digital forensics.
Create a method for gathering, assessing and applying new and existing
CO5
legislation specific to the practice of digital forensics.
References
1. Eoghan Casey, “Digital Evidence and Computer Crime Forensic Science, Computers
and the Internet”, Third Edition, Elsevier, 2011
2. Kevin Mandia, Chris Prosise, Matt Pepe, ―Incident Response and Computer
Forensics ―, TataMcGraw -Hill, New Delhi, 2006.
3. Nelson Phillips and Enfinger Steuart, ―Computer Forensics and Investigations‖,
Cengage Learning, New Delhi, 2009.
4. Cory Altheide and Harlan Carvey, ―Digital Forensics with Open Source Tools‖
Elsevier publication, April 2011
COs POs
1 2 3
1. 2 2 3
2. 2 2 3
3. 2 2 3
4. 2 2 3
5. 2 2 3
CF22203 BLOCKCHAIN FOR SECURITY L T P C
3 0 0 3
COURSE OBJECTIVES:
The students will be able to
1. Understand the cryptography basics of a blockchain
2. Recognize the requirement of a simple blockchain application
3. Study about the tools used for blockchain development
TOTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the students will be able to,
CO statements RBT
CO
level
CO1 Elucidate the requirements of a blockchain
CO2 Design a simple blockchain based application
CO3 Implement Consensus mechanism in blockchain
CO4 Deploy sample applications over Hyperledger
CO5 Explain the requirement of mining in blockchain
References
1. Imran Bashir, “Mastering Blockchain”, Packt Publishing 2017.
2. Melanie Swan, “Blockchain - Blueprint for a New Economy”, O'Reilly Media, 2015
3. Roger Wattenhofer, “The science of the blockchain”, Inverted Forest Publishing, 2016
4. [Link]
5. [Link]
COs POs
1 2 3
1. 2 1 3
2. 2 1 3
3. 3 1 3
4. 3 1 3
5. 3 1 3
CF22204 INTERNET OF THINGS AND SECURITY L T P C
3 1 0 4
COURSE OBJECTIVES:
The students will be able to
1. Understand the fundamentals of Internet of Things
2. Fabricate a low cost embedded system using Raspberry Pi or Arduino
3. Apply IoT in Real world scenario
CO statements RBT
CO
level
CO1 Analyze various protocols of IoT
CO2 Design a portable IoT application using Raspberry Pi or Arduino
CO3 Deploy an IoT application to the cloud.
CO4 Analyze applications of IoT in real time scenario
CO5 Design Prototype for physical and online components
References
1. Adrian McEwen, Hakim Cassimally, Designing the Internet of Things, 1/e,
Wileypublication, 2013
2. Charalampos Doukas , Building Internet of Things with the Arduino, Create space, 2002.
3. Dieter Uckelmann ([Link]), Architecting the Internet of Things, Springer, 2011.
COs POs
1 2 3
1. 2 1 3
2. 3 1 3
3. 2 1 3
4. 2 1 3
5. 3 1 3
CF22211 IOT AND BLOCKCHAIN LABORATORY L T P C
3 1 0 4
Course Objectives:
The students will be able to
Blockchain Implementation
9. Implementation of basic Hash algorithms required for Blockchain
10. Developing simple applications using Hyperledger framework
11. Developing simple applications using Ethereum framework
12. Simulation of mining in Blockchain
13. Implementation of ethereum smart contracts
Course Outcomes:
At the end of the course, the students will be able to,
1. Develop simple applications using Arduino/ Raspberry Pi
2. Implement various security protocols
3. Create simple applications using blockchain tools
4. Simulate mining in blockchain
LIST OF EQUIPMENT FOR A BATCH OF 18 STUDENTS:
SOFTWARE:
Windows/Ubuntu/ Kali Linux with C/C++/Java/Python Cisco Packet Tracer, Snort IDS,
Eclipse or equivalent IDE
HARDWARE:
Standalone desktops – 18 IoT kit -18
COs POs
1 2 3
1. 2 1 3
2. 3 1 3
3. 2 1 3
4. 2 1 3
5. 3 1 3
CF22212 DIGITAL FORENSICS LABORATORY L T P C
0 0 3 2
Course Objectives:
The students will be able to
Perform basic digital forensics.
Demonstrate the use of simple digital forensics tools.
Conduct a digital forensics exercise.
List of Exercises
Disk Imaging and Cloning
1. Use VMWare and modify device configuration in a VMWare system
Course Outcomes:
At the end of the course, the students will be able to,
4. Practice and gain basic knowledge about VMware and various file system
5. Analyse disk structure and file system
6. Perform file recovery
7. Perform mining for digital forensics
8. Apply steganography in digital forensics
LIST OF EQUIPMENT FOR A BATCH OF 18 STUDENTS:
SOFTWARE:
Ubuntu/ Kali Linux with C/C++/Java/Python Sleuth Kit,
Wireshark, VMWare, OWASP, DVWA
HARDWARE:
Standalone desktops - 18
TotalTHours:45
COs POs
1 2 3
1. 2 2 3
2. 2 2 3
3. 2 2 3
4. 2 2 3
5. 2 2 3
13
5