B.Sc. Digital Forensic Syllabus
B.Sc. Digital Forensic Syllabus
Course Structure:
****MaximumCreditPointscanbetransferredUpto20outofTotalCreditPoint140fromMOOC’s Courses.
3
Credit Distribution
MatrixDepartment of Digital
Forensics
B.Sc. in Digital Forensics
Semester – I
Semester – II
Semester – III
Sl. No. Paper Code Paper Name Credit
L T P C
Theory
1 BSDF–301 Operating Systems and System 3 1 0 4
Software
2 BSDF–302 Computer Networks and 3 1 0 4
Network Security
3 BSDF – 303 Biometric Security 3 1 0 4
4 BSDF – 304 Generic Elective 3 1 0 4
5 BSDFSEC – 305 Cyber Security 3 1 0 4
Total Credit (Theory) 15 5 0 20
Practical
1 BSDF–391 Laboratory – 5 - Computer Networks 0 0 4 3
and Network Security
2 BSDF–392 Laboratory – 6 – Cyber Security 0 0 4 3
Total Credit (Practical) 0 0 8 6
5
Semester – IV
Semester – V
Semester – VI
Semester – I
8
Module I:
Number Systems, Operations and Codes, Decimal Numbers, Binary Numbers, Decimal to Binary Conversion,
Binary Arithmetic,1’s and 2’s complement of binary numbers, Signed numbers, Arithmetic operations with
signed numbers,
Hexadecimal numbers, Binary to hexadecimal conversion, Hexadecimal to binary conversion, Hexadecimal to
decimal conversion, Decimal to Hexadecimal conversion, Hexadecimal addition and subtraction, Octal
numbers, Octal to decimal conversion, Decimal to Octal conversion, Octal to binary conversion, Binary to
Octal conversion, Binary coded decimal, 8421 BCD code, BCD addition, Digital codes- gray code, binary to
gray code conversion, Alphanumeric codes, parity codes.
Module II:
Logic Gates, Logic Levels and Waveforms, Logic Levels and Digital waveforms, Logic Gates: AND, OR,
NOT, XOR, XNOR, NAND (Definition, Symbols, Truth Tables and Operation). Universal Property of
NAND and NOR gates. Logic gate operations with pulse waveforms.
Module III:
Boolean Algebra and Logic Simplifications. Boolean operations and expressions, Laws and rules of Boolean
algebra, De-morgans theorems, Boolean analysis of logic circuits, simplification using Boolean algebra,
standard forms of Boolean expression, Boolean expressions and truth tables. The Karnaugh Map, Karnaugh
SOP minimization, Karnaugh POS minimization, Five variable Karnaugh maps.
Module IV:
Combinational Logic and its functions, Basic combinational Logic circuits, Implementing combinational
logic, combinational logic using NAND and NOR gates, Basic overview of logic functions, Basic adders,
parallel binary adders, comparators, decoders, encoders, code converters, multiplexers, demultiplexers, parity
generators/ checkers.
Module V:
Sequential Circuits, Latches, RS flip flop using NAND/ NOR gates, Clocked RS, D, JK and T flip flops, Edge
triggered flip flops, Master slave flip flops, Asynchronous counter operation, Synchronous counter operations,
Up/ Down Synchronous counter, Design of synchronous counters. Basic shift register functions. Serial in-
Parallel out shift registers, Parallel in -Serial out shift registers, Serial in- Serial out shift registers, Parallel in
Parallel out shift registers.
References
Reference Books:
Paper–II–Introduction to Programming(BSDF–102)
Module I
Module II
Classes and Objects: Function in C++ - The main function, Function prototyping- Call by value- Call
by reference- Return by reference. Basic concepts of object-oriented programming- Benefits of OOP-
Applications of OOP. Specifying a class- Defining member functions-Private member functions-
Arrays within a class - Memory allocation for objects-Static data members -Static member functions -
Arrays of objects -Friendly functions.
Module III
Module IV
Module V
Pointers- Pointers to objects- this pointer-Pointers to derived classes- Virtual functions- Pure virtual
functions-Opening and closing a file- File opening modes- File pointers and their manipulations-
Sequential input and output operations.
Reference Books:
1. Object oriented Programming with ANSI & Turbo C++,Ashok N. Kamthane,First Edition, 2011,
Pearson India.
3. Object Oriented Programming with C++,E. Balagurusamy , Fifth edition, Tata McGraw Education
Hill, 2011.
5. Object Oriented Programming in Turbo C++,Robert Lafore,1991, First Edition, Galgotia Publications.
Semester – II
11
Module II
Types of Computer Forensics Systems: Internet Security Systems, Intrusion Detection Systems,
Firewall Security Systems, Storage Area Network Security Systems, Network Disaster Recovery
Systems, Public Key Infrastructure Systems, Wireless Network Security Systems, Satellite Encryption
Security Systems, Instant Messaging (IM) Security Systems, Net Privacy Systems, Identity
Management Security Systems, Identity Theft, Biometric Security Systems ,Router Forensics. Cyber
forensics tools and case studies. Ethical Hacking: Essential Terminology, Windows Hacking, Malware,
Scanning, Cracking.
Module III
Evidence Collection and Data Seizure: Why Collect Evidence, Collection Options Obstacles, Types of
Evidence, The Rules of Evidence, Volatile Evidence, General Procedure, Collection and Archiving,
Methods of Collection, Controlling Contamination: The Chain of Custody, Reconstructing the Attack,
The digital crime scene, Investigating Cybercrime, Investigating Web attacks, Investigating network
Traffic ,Identification of Data: Timekeeping, Forensic Identification and Analysis of Technical
Surveillance Devices, Reconstructing Past Events.
Module IV
Basic of law, Understanding cyber space, Defining cyber law, Scope and jurisprudence , Concept of
jurisprudence, Overview of Indian legal system, Introduction to IT Act 2000, Amendment in IT Act.
Module V
Cyber Crimes – Types of cyber crimes –against individuals institution, and states-various offenses and
punishments, digital signature-concepts of public key and private key, certification authorities and
their role, creation and authentication of digital signature. E-contracting –salient features of E-
contracts, formation of E-contracts and types, E-governance, E-governance models, E-commerce-
salient features and advantages.
Reference Books:
Module I
Introduction to Data Structures, Basic Terminology, Data Structure Operations; Algorithm:
Definition, Algorithm Analysis, Complexity, Asymptotic Notation, Recursion. Array: Introduction,
Linear Arrays, Representation of Linear Arrays in Memory, operations; Multidimensional Arrays.
Module II
Stack: Introduction, Array Representation and Basic Operations; Implementation of Stacks.
Application of Stacks, Evaluating Arithmetic Expression using Stacks, Infix to Postfix Notation,
Evaluating a Postfix Notation.
Module III
Queue: Introduction, Implementation of Queue, Priority Queue, Dequeue, Linked List:
Introduction, Representation of Linked List, operations in Linked List, Doubly and Circular Linked
List.
Module IV
Trees - Introduction, Binary Trees, Representation, Traversing and its Algorithms, AVL tree.
Module V
Sorting: Bubble sort, Insertion sort, Selection sort, Heap sort, Quick sort, Merge sort; Comparison
of sorting algorithms. Searching: Linear Search, Binary Search; Comparison of searching
algorithms.
Reference Books:
SEMESTER – III
15
Module I
Definition- Functions- OS as Resource Manager, Types – Structure- Concept of Batch
Processing, Multi-programming, Multi-user systems and Real-time systems, POST
Bootstrapping – Kernel
Module II
Process management: process concept, process scheduling, operations on processes,
cooperating processes, interprocess communication, communication in client server systems,
threads, overview, multithreading models, CPU scheduling, scheduling criteria, CPU scheduling
algorithms, process synchronization, critical-section problem semaphores, deadlocks,
prevention, avoidance and detection.
Module III
Storage Management: memory management, contiguous memory allocation, paging,
segmentation, segmentation with paging, virtual memory, demand paging, page replacement.
I/O hardware ,I/O Software , Disks – Disk Scheduling . File organization ,File system
implementation , allocation methods, Security , Protection mechanism
Module IV
General concepts - system software and application software, Assemblers- Design of assembler,
Macros and Macroprocessor, Macro definitions& Instructions, Features of macro facility,
Nested macros calls.
Module V
Loading, Linking & Relocating- Loading& Linking Schemes- Relocatablity of Programs,
Concepts of Binders, Linking Loaders, Overlays, Dynamic Binders, Design of an absolute
loader. Compilers – Different phases of compilers
Reference Books:
Module I
Introduction: - Types of Computer Networks, Reference Models - ISO-OSI Reference Model,
TCP/IP Reference Model.
Protocol Hierarchies Network layer: Routing Algorithm , ARP,RARP-Transport Layer: Elements of
transport protocols, UDP, Segment Structure, TCP ,Service model, TCP Protocol, Application Layer:
HTTP, DNS.
Module II
Computer Security Concepts, the OSI Security Architecture, Security Attacks, Security Services,
Security Mechanisms, A Model for Network Security. Access Control Models, Chinese Wall, Clark-
Wilson, Bell-LaPadula, Non Interference and Role Base Model.
Module III
Symmetric Encryption Principles, Symmetric Block Encryption Algorithms. Public-Key
Cryptography Principles, Public-Key Cryptography Algorithms, Digital Signatures. Key Distribution
and User Authentication: Symmetric Key Distribution Using Symmetric Encryption, Kerberos, Key
Distribution Using Asymmetric Encryption,X.509 Certificates, Public-Key Infrastructure.
Module IV
Transport-Level Security: Web Security Considerations, Secure Socket Layer and Transport Layer
Security, Transport Layer Security, HTTPS, Secure Shell (SSH). IP Security: IP Security Overview,
IP Security Policy, Encapsulating Security Payload, Combining Security Associations, Internet Key
Exchange.
Module V
Electronic Mail Security: Pretty Good Privacy, S/MIME. Intruders: Intruders, Intrusion Detection,
Password Management. Firewalls: The Need for Firewalls, Firewall Characteristics, Types of
Firewalls, Firewall Basing, Firewall Location and Configurations.
Reference Books:
1. Network security essentials, William Stallings, fourth edition, 2011 Pearson Education
Computer
Module I
Biometric fundamentals and standards: Definition, Biometrics versus traditional techniques,
Characteristics, Key biometric processes: Verification - Identification - Biometric matching,
Performance measures in biometric systems, assessingthe privacy risks of biometrics - Designing
privacy sympathetic biometric systems, Different biometric standards, and Application
properties.
Module II
Physiological Biometric Technologies: Fingerprints ,Technical description, characteristics ,
Competing technologies ,strengths, weaknesses ,deployment ,Facial scan , Technical description
,characteristics ,weaknesses-deployment ,Iris scan ,Technical description , characteristics,
strengths ,weaknesses ,deployment
Module III
Retina vascular pattern, Technical description, characteristics, strengths, weaknesses,
Deployment, Hand scan, Technical description, characteristics, strengths, weaknesses
deployment, DNA biometrics. Behavioral Biometric Technologies: Handprint Biometrics, DNA
Biometrics.
Module IV
Signature and handwriting technology, Technicaldescription, classification, keyboard / keystroke
dynamics, Voice, data acquisition, featureextraction, characteristics, strengths, weaknesses,
deployment.
Module V
Multi biometrics and multi factor biometrics, two-factor authentication with passwords, tickets
and tokens, executive decision, implementation plan.
Reference Books:
1. Handbook of Biometrics,Anil K Jain, Patrick Flynn and Arun A Ross,2010, Springer, USA.
2.Biometric Technologies and Verification Systems,John R Vacca,2009.Elsevier, USA
2. Biometrics-Identityverification in a network, Samir Nanavathi, Michel Thieme, and Raj
Nanavathi, 1st Edition,2002.WileyEastern.
3. Implementing Biometric Security,JohnChirillo and Scott Blaul, 1st Edition, 2005, Wiley
EasternPublication..
4. Biometrics for Network Security, John Berger, 1st Edition,2004, PrenticeHall.
18
Semester – IV
19
Module I
Introduction: Characteristics of the Database approach,Problems with file system data management, Data
models, Schemas and instances, Database System Architecture, Data Abstraction, Data Independence, Data
Definitions and Data Manipulation Languages.
Data models, Entity Relationship (ER), Mapping ER Model to Relational Mode,Weak and strong entity,
Enhanced Entity Relationship (EER) and object modeling. specialization and generalization, Network.
Relational and Object Oriented Data Models, Integrity Constraints and Data Manipulation Operations.
Module II
Physical Data organization, Hashed files, Indexed files, B- Trees, sequential Organization files. The relational
Data model concepts, Relational model constraints ,Relational algebra, Tuple relational calculus, Domain
relational calculus, SQL.
Database design, Functional dependencies, Basic definitions, Trivial and non trivial dependencies, Closure of
a set of dependencies, closure of a set of attributes ,Irreducible set of dependencies, Non loss decomposition
and functional dependencies First, Second and Third Normal forms, Boyce –Codd Normal forms.
Module III
Introduction- Introduction to Databases Security Problems in Databases .Database Integrity and Security
Concepts, Domain constraints, Referential Integrity .Introduction to database security concepts, Methods for
database security, Discretionary access control method, Mandatory access control and role base access control
for multilevel security.Use of views in security enforcement.Overview of encryption technique for
security.Statisticaldb security.
Module IV
Crash Recovery, Failure classification, Recovery concepts, Log base recovery techniques (Deferred and
Immediate update), Checkpoints, Recovery with concurrent transactions (Rollback, checkpoints, commit),
Database backup and recovery from catastrophic failure. Shadow paging.
Security Models -2 Bell and LaPadula's Model Biba's Model, Dion's Model , The Lattice Model for the Flow
Control.
Module V
Security Mechanisms: User Identification/Authentication Memory Protection, Resource Protection, Control
Flow Mechanisms Isolation Security .Secure DBMS Design Security
A Model for the Protection of Object Oriented Systems,SORION Model for the Protection of Object-Oriented
Databases
Reference Books:
Paper–II–Software Engineering(BSDF–402)
Module I
Introduction to Software Engineering, Definition, Program Vs Software, and Software process,
Software Characteristics, Brief introduction about product and process, Software process and
product matrices.
Module II
Software life cycle models, Definition, Waterfall model, Increment process models, Evolutionary
process models, Selection of a life cycle model.
Module III
Software Requirement Analysis and Specification Requirements Engineering type of requirements,
Feasibility Studies, Requirement Elicitation, Various steps for requirement analysis, Requirement
documentation, Requirement validation. Project planning-Size estimation, cost estimation, the
constructive cost model (COCOMO)
Module IV
Design concept and principles:architectural designs, user interface design
Module V
Software Testing What is testing?, Test, Test case and Test Suit, Verification and Validation, Alpha,
beta and acceptance testing, functional testing, Levels of testing ,types of s/w test ,black box testing
,Unit testing, integration testing, validation testing, testing boundary conditions, structural testing ,
regression testing, system testing and debugging.
Reference Books:
Module I
Foundation, Terminology, Substitution Cipher and Transposition Cipher, Simple XOROne Time
Pads, Computer Algorithms, Large Numbers, Cryptographic Protocols, Communication using
Symmetric Cryptography, One Way Functions-One Way Hash Function Communications using
Public Key Cryptography, Digital Signatures-Digital Signature with Encryption, Random and
Pseudo Random Sequence Generation.
Module II
Basic Protocols-Key Exchange, Authentication, Authentication and Key Exchange, Formal Analysis
of Authentication and Key Exchange Protocols-Multiple Key Public Key Cryptography, Secret
Splitting-Secret Sharing. Intermediate Protocols, Timestamp Services- Sublimal Channel,
Undeniable Digital Signature- Proxy Signature, Group Signature
Module III
Advanced Protocols, Zero knowledge proofs, Zero knowledge proofs of identity, Blind Signature,
Identity based Public key cryptography-Digital Certified Mail. Esoteric Protocol
,Secure Elections, Secure Multiparty Computation, Anonymous Multiparty Computation-
Anonymous Message Broadcast, Digital Cash
Module IV
Cryptographic Techniques, Key length, Key Management, Public Key Cryptography Versus
Symmetric Cryptography, Encrypting communication Channel, Encrypting Data for storage-
Hardware vs software Encryption. Cryptographic Algorithm, Information Theory, Data Encryption
Standard (DES), IDEA, Blowfish.
Module V
One way Hash Function- N Hash- MD4- MD5-MD2- Secure Hash Algorithm(SHA)- Public Key
algorithms, Knapsack Algorithm, RSA- Public Key Digital Signature Algorithms- Digital Signature
Algorithm(DSA)- DSA Variants- Gost Digital Signature Algorithm, Key Exchange Algorithm- Diffie
Hellman – Station to Station Protocol, Encrypted Key Exchange
Reference Books:
Semester – V
23
Paper–I–Computer Forensics(BSDF-501)
Module I
Introduction, Investigating Computer Crime, Steps to Prepare for a Computer Forensics
Investigation,Computer Forensics Investigation Methodology
Module II
Data Acquisition and Duplication Concepts, Data Acquisition Types, Validation Methods
Module III
Volatile Memory Forensics, Defeating Anti forensic technique (Steganography, Password breaking,
decryption), Deleted File Recovery
Module IV
Operating System Forensics, Windows Forensics, Linux Forensics, Metadata Extraction
Module V
Event Log Analysis, Registry Analysis, Network Forensics, Investigating EMail Crimes,
Report Writing and Presentation
Reference Books:
Module I
Digital Investigation: Digital evidence and computer crime ,history and terminals of computer crime
investigation ,technology and law ,the investigate process ,investigate reconstruction
,modus operandi, motive and technology ,digital evidence in the court room.
Module II
Computer basics for digital investigators: applying forensic science to computers, forensic
examination of windows systems ,forensic examination of unix systems ,forensic examination of
macintosh systems, forensic examination of handheld devices.
Module III
Networks: Networks basics for digital investigators, applying forensic science to networks,digital
evidence on physical and datalink layers ,digital evidence on network and transport layers ,digital
evidence on the internet.
Module IV
Investigating Computer Crime: Investigating computer intrusions ,investigatingcyberstalking,digital
evidence as alibi.
Module V
Guidelines: Handling the digital crime scene – digital evidence examination guidelines.
Reference Books:
1. Digital Evidence and Computer Crime Forensic science, Computers and Internet,
EoghanCasey,Second Edition, 2011 ,Elsevier AcademicPress.
2. A Electronic Discovery and Digital Evidence in a Nut Shell-Daniel J Capra,Shira A
scheindlin,-Third Edition, 2009 The Sedona Conerence-AcademicPress.
3. The Best Damn Cybercrime and Digital Forensics Book Perio,Jack Wiles, Anthony
Reyes , Jesse Varsalone,2007 SyngressPublishing.
4. Computer Evidence and Computer Crime: Forensic Science, Computers, and the
Internet.Casey, Eoghan, 2000 , Cambridge UniversityPress
SEMESTER – VI
26
Module I
Wireless Fundamentals: Wireless Hardware,Wireless Network Protocols, Wireless Programming
WEP Security. Wireless Cellular Technologies,concepts,Wireless reality,Security
essentials,Information classification standards, Wireless Threats: Cracking WEP ,Hacking
Techniques,Wireless Attacks, Airborne Viruses.
Module II
Standards and Policy Solutions ,Network Solutions ,Software Solutions ,Physical Hardware
Security, Wireless Security ,Securing WLAN ,Virtual Private Networks ,Intrusion Detection System
,Wireless Public Key infrastructure. Tools,Auditingtools,Pocket PC hacking, wireless hack
walkthrough.
Module III
Security Principles,Authentication, Access control and Authorization, Non-repudiation, privacy and
Confidentiality, Integrity and Auditing, Security analysis process. Privacy in Wireless World,
Legislation and Policy, Identify targets and roles analysis, Attacks and vulnerabilities
,Analyze mitigations and protection.
Module IV
WLAN Configuration, IEEE 802.11,Physical layer, media access frame format ,systematic
exploitation of 802.11b WLAN ,WEP ,WEP Decryption script ,overview of WEP attack ,
Implementation , Analyses of WEP attacks.
Module V
Global Mobile Satellite Systems; case studies of the IRIDIUM and GLOBALSTAR systems. Wireless
Enterprise Networks: Introduction to Virtual Networks, Blue tooth technology, Blue tooth
Protocols. Server-side programming in Java, Pervasive web application architecture, Device
independent example application
Reference Books:
1. Wireless Security Essentials: Defending Mobile from Data Piracy, Russel Dean Vines
,First Edition, 2002, John Wiley &Sons,.
2. Maximum Wireless Security, Cyrus, Peikari and Seth Fogie,2002, SAMSPublishing.
3. Wireless and Mobile Networks Architectures,Yi-Bing Lin and Imrich Chlamtac,2001,
John Wiley &Sons.
4. Mobile and Personal Communication systems and services, Raj Pandya, 2001, Prentice
Hall of India..
5. Wireless Security and Privacy- Best Practices and Design Techniques, Tara M.
Swaminathan and Charles R. Eldon, 2002, AddisonWesley.
27
Paper–II–Malware Analysis(BSDF–602)
Module I:
World of Malwares, What is Malware?,Kinds of Malware, Why Malware is being created?, Various
Terminology about Malware
Module II
Malware Analysis Lab Setup, Creating your own Virtual World, A Copy of Windows XP / 7, Tools for
analysis of the Windows Malware, Prohibition on Connection Between Virtual System and Host
System
Module III
Basic Static Analysis of Malware, Anti-Virus Scanning, Hashing: Fingerprint of Malware
Detecting Packers, Analysing PE file Headers and Sections, Module 12: Basic Dynamic Analysis of
Malware, Running Malware using Sandboxie, Analysing the Process of Malware, Monitoring,
Registry Changes, Network Traffic Analysis
Reference Books:
1. M.Y. Iscan and S.R. Loth, The scope of forensic anthropology in, Introduction to Forensic
Sciences, 2nd Ed., W.G. Eckert (Ed.), CRC Press, Boca Raton(1997).
2. D. Ubelaker and H. Scammell, Bones, M. Evans & Co., New York(2000).
3. S.Rhine, Bone Voyage: A Journey in Forensic Anthropology, University of Mexico Press,
Mexico(1998)
28
29