FSP 201 Ethical Hacking
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>FSP</strong> <strong>201</strong><br />
<strong>Ethical</strong> <strong>Hacking</strong><br />
& IT Security<br />
Syllabus
SYLLABUS<br />
<strong>FSP</strong> <strong>201</strong> : <strong>Ethical</strong> <strong>Hacking</strong> &<br />
IT Security<br />
Course Objective:<br />
On completion of this course the students would be able to understand the fundamentals of computer, the<br />
various storage devices, the concepts of Operating Systems and to use Windows System. After acquiring this<br />
basic knowledge, the students will gain a good knowledge regarding the various ways in which Cyber crimes<br />
are committed, their investigation and the tools that are used for the analysis.<br />
Course Syllabus<br />
Module I: Introduction to Computer Crime and <strong>Ethical</strong> <strong>Hacking</strong><br />
Ø Introduction of Computers and cyber crimes:<br />
Ø Stand alone computer crimes-<br />
Ø Printing of counterfeit currency and other documents.<br />
Ø Computer scanners, imaging software (Photoshop, Photo paint etc.)<br />
Ø Software piracy,<br />
Ø Data recovery.<br />
Module II: Networking For <strong>Ethical</strong> <strong>Hacking</strong><br />
Ø Networked computer Crimes:<br />
Ø Unauthorized access and interception: <strong>Hacking</strong>,<br />
Ø Computer viruses & program<br />
Ø Manipulations computers security & Internet,<br />
Ø Use of Biometrics methods with special reference to personal identification.<br />
Module III: Image Identification<br />
Ø Image processing: - Introduction and process,<br />
Ø Image Enhancement and restoration.<br />
Ø The investigation of erased tapes and analysis of signals (Analog video image processing),<br />
Ø Compression and encryption methods’<br />
Ø Methods for digital video recording,<br />
Ø Digitalization techniques,<br />
Ø Investigation of integrity of images and videos.<br />
Module IV: Database Searching<br />
Ø<br />
Bioinformatics: Introduction, theory and practice of database searching,<br />
1
SYLLABUS<br />
<strong>FSP</strong> <strong>201</strong> : <strong>Ethical</strong> <strong>Hacking</strong> &<br />
IT Security<br />
Ø<br />
Ø<br />
Ø<br />
Ø<br />
Ø<br />
Integrated information retrieval and internet access,<br />
Searching for sequence homology and alignment.<br />
Basic concepts of the UNIX database and programming,<br />
Computing concepts of the UNIX operating system.<br />
Patent Laws and Intellectual rights.<br />
Text & Reference:<br />
Ø James, S.H. and Nordby, J.J. Eds., Forensic Science An Introduction to Scientific and Investigation<br />
Techniques, CRC Press, London, 2003.<br />
Ø Leshin, C.B., Internet and Marignani, A., Forensic Science and the Internet. The Canadian Society<br />
of Forensic Science Journal, Vol. 29, 1996.<br />
2
First Edition <strong>201</strong>3<br />
All right including copyrights reserved with the publishers. No part of this book may be reproduced or<br />
Copied in any form of by any means (Graphic, Electronic or Mechanical), or reproduced on any<br />
information storage devices, without the written permission of the publishers.<br />
Note: Due care has been taken while publishing this book, but the author, Publisher and Printers are<br />
not responsible in any manner for any mistake that may have inadvertently crept in. In case of doubts<br />
the reader shall cross-check the contents with original Government Publication of Notifications, Any<br />
mistakes noted may be brought to our notice which shall be taken care in the next edition. All disputes<br />
subject to Delhi Jurisdiction only.<br />
Published by<br />
© <strong>201</strong>3 SIFS INDIA