-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>Introduction to Cyber forensics </br>Unit 1 - Introduction to cyber forensics - Module 1
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Introduction to Traditional Computer Crime, </br>Introduction to Traditional Computer Crime, </br>Traditional problems associated with Computer Crime, </br>Introduction to Identity Theft & Identity Fraud, </br>Types of CF techniques - Incident and incident response methodology , </br>Understanding Computer Investigation – Data Acquisition., </br>Working with Windows and DOS Systems, </br>Preparation for IR: Creating response tool kit and IR team, </br>Processing Crime and Incident Scenes , </br>Forensic duplication and investigation
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:</br>Introduction to Cyber forensics and Privacy</br>Security management</br>Contingency planning
-
Assignment
Assignment topic is Case study on Cyber crimes around the world and due date is .
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>Types of Digital Evidence</br>Program-manupulation || Cyber Forensic </br>Social Engineering Attack || Cyber Forensic
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:</br>EVIDENCE COLLECTION AND FORENSICS TOOLS
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Network Forensics , </br>Cell Phone and Mobile Devices Forensics, </br>Introduction to Ethical Hacking , </br>Social Engineering
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:</br>Computer Investigations
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:</br>Forensic Analysis and Validation
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>Ethical Hacking
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Email Investigations
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Footprinting and Reconnaissance, </br>Denial of Service - Session Hijacking
-
Assignment
Assignment topic is Case study on Cyber crimes around the world and due date is 09-09-2024.
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:</br>basics
-
Announcement*
Dear Students the Announcement* has been uploaded for the following topics:</br>Introduction to Traditional Computer Crime, </br>Traditional problems associated with Computer Crime, </br>Introduction to Identity Theft & Identity Fraud, </br>Types of CF techniques - Incident and incident response methodology
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>SQL Injection , </br>Scanning Networks , </br>Malware Threats - Sniffing, </br>SQL Injection , </br>Enumeration, </br>Hacking Web servers - Hacking Web Applications
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:</br>Traditional problems associated with Computer Crime, </br>Introduction to Ethical Hacking , </br>Traditional problems associated with Computer Crime, </br>Preparation for IR: Creating response tool kit and IR team
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Current Computer Forensics Tools, </br>Software/ Hardware Tools, </br>Validating Forensics Data , </br>Data Hiding Techniques