IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec. Transport layer Security: SSL protocol, Cryptographic Computations - TLS Protocol
PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls - Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation – Data Acquisition.
Processing Crime and Incident Scenes -Working with Windows and DOS Systems. Current Computer Forensics Tools: Software/ Hardware Tools
Validating Forensics Data - Data Hiding Techniques- Performing Remote Acquisition -Network Forensics - Email Investigations - Cell Phone and Mobile Devices Forensics.
Reference Book:
John R.Vacca, Computer Forensics, Cengage Learning, 2005 MarjieT.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rd Edition, Prentice Hall, 2013. AnkitFadia Ethical Hacking Second Edition, Macmillan India Ltd, 2006 Kenneth C.Brancik Insider Computer Fraud Auerbach Publications Taylor & Francis Group-2008.
Text Book:
Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, Computer Forensics and Investigations, Cengage Learning, India Edition, 2016. CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition, 2015.