15.02.2014 Views

FSP 201 Ethical Hacking

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>FSP</strong> <strong>201</strong><br />

<strong>Ethical</strong> <strong>Hacking</strong><br />

& IT Security<br />

Syllabus


SYLLABUS<br />

<strong>FSP</strong> <strong>201</strong> : <strong>Ethical</strong> <strong>Hacking</strong> &<br />

IT Security<br />

Course Objective:<br />

On completion of this course the students would be able to understand the fundamentals of computer, the<br />

various storage devices, the concepts of Operating Systems and to use Windows System. After acquiring this<br />

basic knowledge, the students will gain a good knowledge regarding the various ways in which Cyber crimes<br />

are committed, their investigation and the tools that are used for the analysis.<br />

Course Syllabus<br />

Module I: Introduction to Computer Crime and <strong>Ethical</strong> <strong>Hacking</strong><br />

Ø Introduction of Computers and cyber crimes:<br />

Ø Stand alone computer crimes-<br />

Ø Printing of counterfeit currency and other documents.<br />

Ø Computer scanners, imaging software (Photoshop, Photo paint etc.)<br />

Ø Software piracy,<br />

Ø Data recovery.<br />

Module II: Networking For <strong>Ethical</strong> <strong>Hacking</strong><br />

Ø Networked computer Crimes:<br />

Ø Unauthorized access and interception: <strong>Hacking</strong>,<br />

Ø Computer viruses & program<br />

Ø Manipulations computers security & Internet,<br />

Ø Use of Biometrics methods with special reference to personal identification.<br />

Module III: Image Identification<br />

Ø Image processing: - Introduction and process,<br />

Ø Image Enhancement and restoration.<br />

Ø The investigation of erased tapes and analysis of signals (Analog video image processing),<br />

Ø Compression and encryption methods’<br />

Ø Methods for digital video recording,<br />

Ø Digitalization techniques,<br />

Ø Investigation of integrity of images and videos.<br />

Module IV: Database Searching<br />

Ø<br />

Bioinformatics: Introduction, theory and practice of database searching,<br />

1


SYLLABUS<br />

<strong>FSP</strong> <strong>201</strong> : <strong>Ethical</strong> <strong>Hacking</strong> &<br />

IT Security<br />

Ø<br />

Ø<br />

Ø<br />

Ø<br />

Ø<br />

Integrated information retrieval and internet access,<br />

Searching for sequence homology and alignment.<br />

Basic concepts of the UNIX database and programming,<br />

Computing concepts of the UNIX operating system.<br />

Patent Laws and Intellectual rights.<br />

Text & Reference:<br />

Ø James, S.H. and Nordby, J.J. Eds., Forensic Science An Introduction to Scientific and Investigation<br />

Techniques, CRC Press, London, 2003.<br />

Ø Leshin, C.B., Internet and Marignani, A., Forensic Science and the Internet. The Canadian Society<br />

of Forensic Science Journal, Vol. 29, 1996.<br />

2


First Edition <strong>201</strong>3<br />

All right including copyrights reserved with the publishers. No part of this book may be reproduced or<br />

Copied in any form of by any means (Graphic, Electronic or Mechanical), or reproduced on any<br />

information storage devices, without the written permission of the publishers.<br />

Note: Due care has been taken while publishing this book, but the author, Publisher and Printers are<br />

not responsible in any manner for any mistake that may have inadvertently crept in. In case of doubts<br />

the reader shall cross-check the contents with original Government Publication of Notifications, Any<br />

mistakes noted may be brought to our notice which shall be taken care in the next edition. All disputes<br />

subject to Delhi Jurisdiction only.<br />

Published by<br />

© <strong>201</strong>3 SIFS INDIA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!