0% found this document useful (0 votes)
237 views5 pages

CF Lab Manual Final

cf Lab Manual

Uploaded by

mohanapriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
237 views5 pages

CF Lab Manual Final

cf Lab Manual

Uploaded by

mohanapriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

(CYBER SECURITY)

LABORATORY MANUAL

ACADEMIC YEAR: 2025-2026

COURSE CODE: CB3601


COURSE NAME: CYBER FORENSICS LABORATORY
REGUALATION: R-2021
LAB IN-CHARGE: [Link] PANDIAN, AP/CSE(AIML)

Prepared By Verified By
Mr.S. KARUPPASAMY PANDIAN [Link]
AP/CSE (AIML) HoD / CSE(AIML)

Approved By
INSTITUTE MISSION
1 Providing comprehensive learning environment
2 Imparting state-of-the-art technology to fulfil the needs of the students and Industry
3 Establishing Industry-Institute alliance for bilateral benefits
4 Promoting Research and Development activities
5 Offering student lead activities to inculcate ethics, social responsibilities, entrepreneurial,
and leadership skills

INSTITUTE VISION
To become a centre of excellence in preparing engineering with excellent technical, scientific
research and entrepreneurial abilities to contribute to the society.

DEPARTMENT VISION
To become a center of excellence in Artificial Intelligence and Machine Learning by nurturing innovation,
ethical responsibility, and technical competence to solve real-world problems for societal betterment

DEPARTMENT MISSION
To impart strong theoretical foundations and practical skills in Artificial Intelligence, Machine
1 Learning, and Computer Science through a structured academic framework
To promote innovation, research, and entrepreneurship by providing exposure to real-world
2 applications and interdisciplinary collaboration
To cultivate ethical, socially responsible, and lifelong learners who are equipped to face the
3 evolving challenges in AI and ML domains.
PROGRAMME EDUCATIONAL OBJECTIVES
Apply their technical competence in computer science to solve real world problems,
PEO – I
with technical and people leadership
Conduct cutting edge research and develop solutions on problems of social
PEO – II
relevance.
Work in a business environment, exhibiting team skills, work ethics, adaptability and
PEO-III
lifelong learning.

PROGRAMME SPECIFIC OUTCOMES


Exhibit design and programming skills to build and automate business solutions
PSO – I
using cutting edge technologies.
Strong theoretical foundation leading to excellence and excitement towards
PSO – II
research, to provide elegant solutions to complex problems.
Ability to work effectively with various engineering fields as a team to design,
PSO-III
build and develop system applications.

SYLLABUS
Course
COURSE NAME L T P C
Code
CB3601 CYBER FORENSICS 3 0 4 5

COURSE OBJECTIVES:

 To learn cyber crime and forensics


 To become familiar with forensics tools
 To learn to analyze and validate forensics data
 To understand cyber laws and the admissibility of evidence with case studies
 To learn the vulnerabilities in network infrastructure with ethical hacking

LIST OF EXPERIMENTS

Sl. No List of Experiments

Study and explore the following forensic tools- FTK Imager, Autopsy, EnCase Forensic Imager,
1 LastActivityView, USBDeview

2 To understand and perform the recovery of deleted files using FTK Imager.

Acquire a forensic image of a hard disk using EnCase Forensics Imager and validate its integrity
3
through hashing.
4 Restore a previously acquired forensic image using EnCase Forensics Imager and validate its
integrity.
5 Collect email evidence from the victim's PC and extract browser artifacts using Chrome History
View
6 Identify USB devices connected to a system using USBDeview.

7 To perform a live forensics investigation using the Autopsy tool.

8 Understand and perform email tracking and tracing to find the source and route of an email.

9 Content Beyond Syllabus: Disk & File System Forensics

10 Model Practical Examination

Lab Requirements: for a batch of 60 students


Operating Systems: Linux / Windows - Hard Disk, Network switch & LAN connectivity
Tools: FTK Imager, Autopsy

TOTAL: 30 PERIODS

COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the basics of cyber crime and computer forensics
CO2: Apply a number of different computer forensic tools to a given scenario
CO3: Analyze and validate forensics data
CO4: Understand Admissibility of evidence in India with Cyber laws and Case Studies
CO5: Identify the vulnerabilities in a given network infrastructure
CO6: Implement real-world hacking techniques to test system security
PLAN OF IMPLEMENTATION
Number
Sl. No Cumulative Requiremen
List of Experiments of periods
periods t
planned
Study and explore the following forensic tools- FTK
Imager, Autopsy, EnCase Forensic Imager,
1 4 4
LastActivityView, USBDeview

To understand and perform the recovery of deleted files


2 4 8
using FTK Imager. Operating
Acquire a forensic image of a hard disk using EnCase Systems:
3 Forensics Imager and validate its integrity through 4 12 Windows ,
hashing. Hard Disk,
4 Restore a previously acquired forensic image using Network
4 16
EnCase Forensics Imager and validate its integrity. switch &
5 Collect email evidence from the victim's PC and extract LAN
4 20
browser artifacts using Chrome History View connectivity
6 Identify USB devices connected to a system using Tools:
4 24
USBDeview. FTK
7 To perform a live forensics investigation using the Imager,
3 27
Autopsy tool. Autopsy
8 Understand and perform email tracking and tracing to
3 30
find the source and route of an email.
9 Content Beyond Syllabus: Disk & File System
3 33
Forensics
10 Model Practical Examination 3 36

You might also like