Page 48 - REC :: M.E. CSE Curriculum and Syllabus - R2019
P. 48

CP19215                  DIGITAL FORENSICS LABORATORY                    Category   L  T  P  C
                                                                                           PE      0   0   4  2


               Objectives:
                ⚫   To understand how cybercrimes are prevented through various methods
                ⚫   To implement and test various tools and procedures for identifying security vulnerabilities.
                ⚫   Understand how to develop a firewall and protect a system.
                ⚫   To configure and test incidence response mechanisms.
                ⚫


                                                      List of  Experiments
                1   Analyze the packet structure of IPSec headers and SSL and TLS using Wireshark.
                2   Explore the structure of a file using HEX workshop.
                    Create an image of your data and perform a through forensics examination and create a report on your findings
                3
                    using FTK imager/ Encase/ProDiscover tool.
                4   Perform Vulnerability Testing and do Bespoke Penetration testing and Web application Testing.
                5   Recover a deleted file content using command prompt and also do it using Stellar phoenix tool.
                6   Perform anti rootkit tool scans for hidden drivers, files, processes, SSDT and stealth objects.
                7   Configure a Firewall in windows or Linux platform or in Android and perform a simple port and IP blocking.
                8   Perform Image Steganography using image forensics tools (GHIRO).
                9   Write a program to perform IP spoofing.
               10  Set up a VPN in Android Mobile and perform Security features.
               11  Configure and test an Incidence Response Automation Tools
                                                                                   Total Contact Hours   :  60


               Course Outcomes:
               Upon completion of the course, students will be able to
                ⚫   Students will identify various vulnerabilities in systems
                ⚫   Prevent any attacks in computer infrastructure
                ⚫   Perform a thorough analysis of computer hardware for any viruses or malware
                ⚫   Able to setup a firewall for his personal devices.
                ⚫   Configure various tools and analyze its abilities for protection from attackers.
   43   44   45   46   47   48