M. Sc. CS Draft Syllabus 13.12.2021
M. Sc. CS Draft Syllabus 13.12.2021
M. Sc. CS Draft Syllabus 13.12.2021
2|Page
1 CTMSCS SIII P4 EL1 Advanced Computer Forensics
2 CTMSCS SIII P4 EL2 Reverse Engineering and Exploit Writing
3 CTMSCS SIII P4 EL3 Critical Infrastructure Security
4 CTMSCS SIII P4 EL4 Database Security
5 CTMSCS SIII P5 EL1 Social Network Analysis
6 CTMSCS SIII P5 EL2 Network Forensics
7 CTMSCS SIII P5 EL3 Mobile Forensics
8 CTMSCS SIII P5 EL4 Research Methodology
Total Credits: 80 L: Lecture T: Tutorial P: Practical 1 C = 1 Hour of Lecture / Tutorial and 1 C = 2 Hours of Practical / Project.
Note: TA-2 will be in form of assignments or workshops.
3|Page
SEMESTER- I
4|Page
CTMSCS SI P1: Essentials of Cyber Security and Cyber
Warfare
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
5|Page
Configuring and monitoring logs, logging with syslog and alternatives, parsing and
filtering logs with grep, sed, awk, and cut and monitoring and accounting with uditd.
Log Aggregation and SIEM, Log Files, Log Parsing, Security Utilities: security-
enhancement utilities, capabilities, and patch management applications. Using built-in
commands and security features, configuring integrity, checkers, integrating host-based
firewalls and managing them to provide security, using hardening scripts, deploying
package management strategies, understanding other tools for increasing security.
UNIT - IV
Introduction to Cyber Warfare
Introduction to Cyber Warfare, Definition for Cyber Warfare, Tactical and Operational
Reasons for Cyber War, Cyber Strategy and Power, Cyber Arms Control.
UNIT - V
Information Warfare and Information Operations
Information Assurance, Information Operations, Information Superiority, Information
Warfare, Network Centric Operations, Psychological Operations, Psychological
Warfare.
Reference Books: -
1. Mastering Linux Security and Hardening: Secure your Linux server and protect it
from intruders, malware attacks, and other external threats by Donald A. Tevault
2. Hardening Linux 1st ed. Edition by James Turnbull
3. Microsoft Windows Security Essentials 1st Edition by Darril Gibson
4. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Book by
Jason Andres and Steve Winterfeld.
5. Cybersecurity and Cyberwar: What Everyone Needs to Know Book by Allan
Friedman and P. W. Singer.
6|Page
CTMSCS SI P2: Cyber Security Audit and Compliance
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 01 00 04 04 25 00:45 50 01:30 100 03:00 - - 200
UNIT – I
The need for information system security compliance
What is IT security assessment? What is an IT security audit? What is compliance?
How does an audit differ from an assessment? Why are governance and compliance
important? What if an organization does not comply with compliance laws? What is the
scope of an IT compliance audit? What does your organization do to be in compliance?
What are you auditing within the IT infrastructure? Maintaining IT compliance.
UNIT - II
Planning and implementation of an IT Infrastructure Audit for compliance:
Defining the scope for audit, Identifying critical requirements for the audit, assessing IT
security, Obtaining Information, Documentation and Resources, Mapping the IT
security policy framework definition to the seven domains of typical IT
infrastructure, Identifying and Testing Monitoring Requirements What Are Controls
and Why Are They Important?: Goal- Based Security Controls, Implementation-
Based Security Controls, The Security Control Formulation and Development Process,
Setting the Stage for Control Implementation through Security Architecture Design,
Implementing a Multitiered Governance and Control Framework in a Business The IT
Audit Process: Audit Plan, Audit Process, Types of IT Audits, Computer-Assisted
Audit Techniques (CAATs), CAATs for Sampling, CAATs for Application Reviews,
CAATs for Auditing Application Controls.
UNIT – III
7|Page
Conducting an IT Infrastructure Audit for Compliance:
Identifying the Minimum Acceptable Level of Risk and Appropriate Security Baseline
Definitions, Seven Domains of a Typical IT Infrastructure, Writing the IT Infrastructure
Audit Report Compliance within User Domain: Compliance law requirements and
business drivers, Items Commonly Found in the User Domain, Compliance within the
workstation domain: Compliance law requirements and business drivers, devices and
components commonly found in the workstation domain, Maximizing C-I-A,
Compliance within the LAN Domain: Compliance law requirements and business
drivers, devices and components commonly found in the LAN domain, Maximizing C-
I-A, Compliance within LAN and WAN Domain: Devices and Components
Commonly Found in the Domain , Penetration Testing and Validating Configurations,
Compliance within Remote Access and Application Domain: Devices and
Components Commonly Found in the Domain, Application Server Vulnerability
Management, Application Patch Management.
UNIT – IV
Risk Assessment and BCP, DR Planning:
Introduction to Risk Analysis, Risk Identification, Risk Assessment, Risk Response and
Mitigation, Risk Reporting, Introduction to Business Continuity Planning (BCP),
Overview of BCP Life Cycle, Need for BCP, Identifying and Selecting Business
Continuity Strategies, Introduction to Disaster Recovery (DR) planning, Identification
of potential disaster status, DR Strategies, Plans for Business Resumption.
UNIT–V
Cyber Law and Auditing Standards/Frameworks:
Indian IT ACT with Amendments, Adjudication under Indian IT ACT, Auditing
Standards and Frameworks: ISO/IEC 27001/2, COBIT, SOC Compliance, HIPAA,
GDPR and PCIDSS.
Reference Books: -
1. Auditing IT Infrastructures for Compliance by Martin M. Weiss, Michael G.
Solomon, Jones & Bartlet Learning, 2015
2. The IT Regulatory and Standards Compliance Handbook by Craig S. Wright,
Syngress, 2015
3. Information Technology Control and Audit 5th Edition by Angel R. Otero, 2019
4. (Internal Audit and IT Audit Series) The Complete Guide to Cyber Security Risks
and Controls by Anne Kohnke, Dan Shoemaker, Ken Sigler, 2016
5. PCI DSS An Integrated Data Security Standard Guide- Press by Jim Seaman,
8|Page
2020
6. AICPA - Guide_ SOC 2 Reporting on an Examination of Controls at a Service
Organization Relevant to Security, Availability, Processing Integrity,
Confidentiality, or Privacy-Wiley, 2018
7. The EU General Data Protection Regulation (GDPR) A Practical Guide by Paul
Voigt and Axel von dem Bussche, 2017
8. PCI DSS, SAQ Instructions and Guidelines (Available online)
9. Bob Hayes, Kathleen Kotwica, “Business Continuity 2nd Edition”, Elsevier
Pub.2013.
10. Governance, risk, and compliance by Microsoft, 2019.
9|Page
CTMSCS SI P3: Web Application Security
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
Objectives
1. To learn the concept of web application technology
2. Learn various aspects of web application security
3. Learn to vulnerability assessment of web application security
4. Exploitation of potential found vulnerability
5. Learn industry standard techniques to exploit advanced vulnerability
UNIT – I
Introduction to web technology and information Gathering
TCP, HTTP/S Protocol Basics, Encoding, Origin, Cookies, Sessions, Fingerprinting the
web server, Subdomain’s enumeration, finding virtual hosts, fingerprinting custom
applications, Enumerating resources, Relevant information through misconfigurations,
Google hacking.
UNIT – II
Web Application Security Vulnerability Terminology
Introduction to Vulnerability Assessment, Life cycle of Vulnerability Assessment,
Vulnerability Scanners, Unknown Vulnerability, False Positive, CVE, CWE, Common
Vulnerability Scoring System (CVSS), STRIDE, DREAD, Secure Source Code Review.
UNIT – III
Proxy and Interception
Burp Suite / OWASP Zed Attack Proxy (ZAP): Logging and monitoring, learning tools
to spider a website, analyzing website content, Brute forcing unlinked files and
directories via ZAP and ffuf, Web authentication mechanisms, Fuzzing with Burp
Intruder, Username harvesting and password guessing, Burp sequencer, Session
management and attacks, Authentication and authorization bypass.
UNIT – IV
Attack Landscape - Web Application Security
10 | P a g e
OWASP 10 Ten – Injection, Broken Authentication, Sensitive Data Exposure, XML
External Entities, Broken Access Control, Security Misconfiguration, Cross Site
Scripting, Insecure Deserialization, Using Components with Known Vulnerabilities,
Insufficient Logging & Monitoring, Cross Site Request Forgery, File Inclusion, Click
Jacking, File Inclusion, File Upload, Insecure Captcha, SSRF/XSPA.
UNIT – V
Advanced Web Security Pen-Testing
Web Service concepts, REST concepts, SQL Injection - Vulnerable code, Sensitive data
in GET, Weak Auth tokens & IDOR, Leaky APIs, Automated Scanning with FuzzAPI /
Astra / other industry standard tools, Introduction to CMS and Docker containers
security.
Reference Books
1. Web Application Security, A Beginner's Guide by Bryan Sullivan, Vincent Liu,
McGraw-Hill Education Publication (2011).
2. Hands-On Bug Hunting for Penetration Testers A Practical Guide to Help Ethical
Hackers Discover Web Application Security Flaws by Joseph Marshall, Packt
Publication (2018).
3. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by Dafydd Stuttard, Marcus Pinto, 2nd Edition, Wiley Publication (2007).
4. The Penetration Tester's Guide to Web Applications by Serge Borso, Artech House
Publication (2019).
5. Web Application Security Exploitation and Countermeasures for Modern Web
Applications by Andrew Hoffman, O'Reilly Media Publication (2020)
11 | P a g e
CTMSCS SI P4: Artificial Intelligence
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
14 | P a g e
CTMSCS SI P5: Introduction to Forensic Science and Law
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
Objectives
1. About the significance of forensic science to human society and criminal
investigation.
2. The fundamental principles of forensic science.
3. The divisions in a forensic science laboratory.
4. The working of the forensic establishments in India and abroad.
5. Legal aspects of forensic investigations
UNIT-I
History of Development of Forensic Science in India. Functions of forensic science.
Historical aspects of forensic science. Definitions and concepts in forensic sciences.
Scope of forensic science. Various contemporary disciplines of forensic sciences and
their applications in different approaches with theoretical concepts Need of forensic
science. Basic principles of forensic science.
UNIT-II
Contemporary development in the academic and practices in forensic sciences-
advantage of scientific investigations- Tools and Techniques in Forensic Science-
Branches of forensic science. Forensic science in international perspectives, including
set up of INTERPOL, and FBI. Duties of forensic scientists. Code of conduct for
forensic scientists. Qualifications of forensic scientists. Data depiction. Report writing.
UNIT-III
Academic institutions involvement -Organizational set up of Forensic Science
Laboratories in India Hierarchical set up of Central Forensic Science Laboratories, State
Forensic Science Laboratories, Government Examiners of Questioned Documents,
Fingerprint Bureaus, National Crime Records Bureau, Police & Detective Training
Schools, NIA, CCNTS, Bureau of Police Research & Development, Directorate of
Forensic Science and Mobile Crime Laboratories. Police Academies. National
investigation agency and other agencies involved in the criminal investigations-
agencies referred for the additional information and requisite examinations
UNIT-IV
15 | P a g e
Definition of Law, Court, Judge, Basic Terminology in Law, Introduction to Criminal
Procedure Code, FIR, Difference between civil and Criminal Justice, Object of
Punishment, Kinds of Punishment, Primary and Sanctioning Rights Primary and
Secondary functions of Court of Law. Law to Combat Crime-Classification – civil,
criminal cases. Essential elements of criminal law. Constitution and hierarchy of
criminal courts. Criminal Procedure Code: Cognizable and non-cognizable offences.
Bailable and nonbailable offences. Sentences which the court of Chief Judicial
Magistrate may pass. Laws specific to Forensic Science: Indian Penal Code pertaining
to offences against persons – Section 121A, 299, 300, 302, 304A, 304B, 307, 309, 319,
320, 324, 326, 351, 354, 359, 362.Sections 375 & 377 and their amendments. Indian
Evidence Act – Evidence and rules of relevancy in brief. Expert witness. Cross
examination and re-examination of witnesses. Sections 32, 45, 46, 47, 57, 58, 60, 73,
135, 136, 137, 138, 141. CrPC – Sections 291,291A, 292 & 293 in the code of criminal
procedure.
UNIT-V
Introduction to Computer and its components, different types of storage media,
Category to Cyber-crime, Cyber Law, IT Act 2000 and its amendments, International
Cyber Laws, Cyber Ethics, Child Sexual Abuse Material related to cyber domain,
various acts related to social media, privacy and security on cyber domain, case studies.
References:
1. B.B. Nanda and R.K. Tiwari, Forensic Science in India: A Vision for the Twenty
First Century, Select Publishers, New Delhi (2001).
2. M.K. Bhasin and S. Nath, Role of Forensic Science in the New Millennium,
University of Delhi, Delhi (2002).
3. S.H. James and J.J. Nordby, Forensic Science: An Introduction to Scientific and
Investigative Techniques, 2nd Edition, CRC Press, Boca Raton (2005).
4. W.G. Eckert and R.K. Wright in Introduction to Forensic Sciences, 2nd Edition,
W.G. Eckert (ED.), CRC Press, Boca Raton (1997).
5. R. Saferstein, Criminalistics, 8th Edition, Prentice Hall, New Jersey (2004).
6. W.J. Tilstone, M.L. Hastrup and C. Hald, Fisher’s Techniques of Crime Scene
Investigation, CRC Press, Boca Raton (2013)
7. Tallinn Manual on The International Law Applicable to Cyber Warfare,
International Group of Experts and NATO by Michael N. Schmitt
8. IT Act 2000 and 2008 bare acts documents
Cyber Law in India, Satish Chandra (2017)
16 | P a g e
CTMSCS SI L1: Essentials of Cyber Security and Cyber
Warfare Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
17 | P a g e
CTMSCS SI L2: Web Application Security Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
18 | P a g e
CTMSCS SI L3: Artificial Intelligence Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
19 | P a g e
SEMESTER- II
20 | P a g e
CTMSCS SIII P1: Network Security
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
21 | P a g e
source code assessment tools, application assessment tools, system assessment tools,
exploit tools.
UNIT–III
Cryptography
Introduction to Security: need for security, principle of security, security approaches.
Encryption Techniques: plaintext, cipher text, substitution & transposition techniques,
encryption & decryption, key range & size. Symmetric and Asymmetric encryption.
Public Key Cryptography and Message Authentication: Public key cryptographic
principles, digital signatures, key management, hash function and message digest.
Types of attacks and countermeasures.
UNIT–IV
Wireless Network Security
802.11 Protocols, WAP and inherent security issues, promiscuous and monitor mode,
Sniffing wireless packets, management, control, and data frames, WLAN authentication
and encryption, WEP, WPA and WPA 2. WLAN authentication and security flaws.
WLAN based attacks and countermeasures. WLAN Pen testing tools.
UNIT–V
Network Forensics
Digital evidence, Network based digital evidence, Network Forensic investigation
methodology, Sources of network-based evidence, Evidence acquisition, Network
traffic capture and analysis, Traffic capture and analysis tools, Event log aggregation,
correlation, and analysis. Data in motion investigation
Reference Books
1. Stallings, W., Network Security Essentials: applications and standards. 3rd ed.
Pearson Education India, 2007.
2. Stallings, W., Cryptography and Network Security: Principles and Practice. 6th
ed. Pearson, 2004.
3. Forouzan, B.A., Cryptography & Network Security. Tata McGraw-Hill
Education, 2010 2.
4. Kahate, A. Cryptography and Network Security. McGraw-Hill Higher Ed., 2009.
5. Michael Gregg, Build Your Own Security Lab: A Field Guide for Networking
Testing.
6. Sherri Davidoff and Jonathan Ham, Network Forensics Tracking Hackers
through Cyberspace.
22 | P a g e
7. Mastering Wireless Penetration Testing for Highly Secured Environments by
Aaron Johns
8. Chris McNab, Network Security Assessment: Know Your Network 9. Cameron
Buchanan and Vivek Ramachandran, Kali Linux Wireless Penetration Testing
Beginner's Guide
23 | P a g e
CTMSCS SII P3: Malware Analysis
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
24 | P a g e
UNIT – IV
Behaviors of Malware
Common behavior of the malwares, Process Injection, Process Replacement, Hook
Injection, Data Encoding, Anti- Disassembly, Anti-Debugging, Anti-Virtual Machine
Techniques, Packers and Unpacking.
UNIT - V
Other Platform Malware
Introduction to Linux Malwares, Linux Binary architecture, Analysis of Linux Malware,
Android Architecture, Android Permissions, Types of Android Malware, Analysis and
Reverse Engineering of android malware.
Reference Books
1. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious
Software by Michael Sikorski and Andrew Honig.
2. Learning Malware Analysis: Explore the Concepts, Tools, and Techniques to
Analyze and Investigate Windows Malware by Monappa K A (2018)
3. Mastering Malware Analysis: The Complete Malware Analyst's Guide to
Combating Malicious Software, APT, Cybercrime, and IoT Attacks by Alexey
Kleymenov, Amr Thabet (2019)
4. Malware Analysis Cookbook: Tools and Techniques for Fighting Malicious Code
by Matthew Richard, Blake Hartstein, Michael Hale Ligh, Steven Adair.
5. Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, Reversing
Tools, and Obfuscation by Alexandre Gazet, Bruce Dang, and Elias Bachaalany
6. The IDA Pro Book: The unofficial guide to the world’s most popular disassembler
by Chris Eagle
7. Android Malware and Analysis by Tim Strazzere, Manu Quintans, Jose Andre
Morales, Shane Hartman, Ken Dunham
8. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux
and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy and Aaron
Walters
9. Malware Forensics: Investigating and Analyzing Malicious Code by James M.
Aquilina, Eoghan Casey, Cameron H. Malin
10. Sockets, Shellcode, Porting and Coding: Reverse Engineering Exploit and Tool
Coding for Security Professionals by James C. Foster and Mike Morgan Price
25 | P a g e
CTMSCS SII P3: Mobile Security
26 | P a g e
Unit-IV
Android Application Security Auditing and Pen-Testing
Security auditing using Drozer, MobSF (Mobile Security Framework): Static and
Dynamic Analysis, Android application security vulnerability assessment using QARK,
Android dynamic instrumentation using Frida and Objection framework. Introduction to
Xposed is a framework.
Unit-V
Request Interception and traffic analysis
Traffic Analysis for Android Devices, Android traffic interception, Ways to analyse
Android traffic, Passive analysis, Active analysis, HTTPS Proxy interception, Other
ways to intercept SSL traffic
Reference Books
1. Android Security Internals: An In-Depth Guide to Android's Security Architecture by
Nikolay Elenkov, No Starch Press Publication (2015).
2. Android Hacker's Handbook by Joshua J. Drake, Zach Lanier, Georg Wicherski, Pau
Oliva Fora, Stephen A. Ridley, Collin Mulliner, Wiley Publication (2014).
3. Learning Pentesting for Android Devices by Aditya Gupta, Packt Publication (2014).
4. Android Apps Security Mitigate Hacking Attacks and Security Breaches by Sheran
Gunasekera, Apress Publication (2020).
5. The Mobile Application Hacker's Handbook by Dominic Chell, Tyrone Erasmus, Shaun
Colley, Ollie Whitehouse, Wiley Publication (2015).
27 | P a g e
CTMSDFIS S1 P3: Incident Response and Digital Forensics
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
30 | P a g e
CTMSCS SII P5: Minor Project
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 02 02 04 06 25 00:45 50 01:30 100 03:00 --- --- 200
Students will need to work on a minor project under guidance of an internal faculty
member. The students will need to submit a regular progress report for internal
evaluation. A project report will need to be submitted and presented at the end of the
semester for final evaluation.
31 | P a g e
CTMSCS SII L1: Network Security Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
32 | P a g e
CTMSCS SII L2: Malware Analysis Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
33 | P a g e
CTMSCS SII L3: Mobile Security Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
34 | P a g e
CTMSCS SII L4: Incident Response and Digital Forensics
Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
35 | P a g e
SEMESTER- III
36 | P a g e
CTMSCS SIII P1: Blockchain and Cryptocurrencies
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
UNIT–I
Introduction to Cryptography and Cryptocurrencies
Introduction, Cryptography, Hash Function, Hash Pointers and One-Way Functions,
Data Structures, Digital Signatures – ECDSA, Memory Hard Algorithm, Zero
Knowledge Proof, Distributed Database, Two General Problem, Byzantine General
Problem and Fault Tolerance, Memory Hard Algorithm – Hashcash Implementation,
Direct Acyclic Graph, Introduction to Quantum Computing and How it will break
existing methods
UNIT-II
Blockchain
Introduction, Advantages over Conventional distributed database, Blockchain Network,
Mining Mechanism, Distributed Consensus, Merkle Patricia Tree, Transactions and Fee,
Anonymity, Reward, Chain Policy, Life of Blockchain Application, Soft & Hard Fork,
Private and Public Blockchain
UNIT–III
Distributed Consensus
Nakamoto Consensus, Proof of Work, Proof of Stake, Proof of Burn, Difficulty Level,
Sybil Attack, Energy Utilization, Alternate Smart Contract Construction
UNIT–IV
Cryptocurrency
History, Distributed Ledger, Bitcoin Protocols – Mining Strategy and Rewards,
37 | P a g e
Ethereum Construction, Gas Limit, DAO, Smart Contract, GHOST, Vulnerabilities,
Attacks, Sidechain, Name coin, Case Study related to – Naïve Blockchain Construction,
Play with Go-Ethereum, Toy Application using Blockchain
UNIT-V
Cryptocurrency Regulation
Stakeholders, Roots of Bitcoin, Legal Aspects-Cryptocurrency Exchange, Black Market
and Global Economy, Applications: Internet of Things, Medical Record Management
System, Domain Name Service and Future of Blockchain, Case study related to Mining
Puzzles
Reference Books
1. Bitcoin and Cryptocurrency Technologies: A comprehensive Introduction,
Princeton University Press, 2016 by Arvind Marayan, Joseph Bonneau, Edward
Felten, Andrew Miller and Steven Goldfeder.
2. Bitcoin and Blockchain Security by Elli Androulaki and Ghassan Karame
3. Blockchain Cybersecurity, Trust and Privacy by Ali Dehghantanha, Reza M.
Parizi, Kim-Kwang Raymond Choo
4. Blockchain for Cyber Security and Privacy: Architectures, Challenges and
Applications by Mamoun Alazab, Yassine Maleh, Mohammad Shojafar, Imed
Romdhani
5. The Truth Machine: The Blockchain and the Future of Everything by Michael
Casey and Paul Vigna
6. Blockchain for Distributed Systems Security by Laurent L. Njilla, Charles
Kamhoua and Sachin Shetty
7. Bitcoin: A Peer-to-Peer Electronic Cash System by Satoshi Nakamoto
8. The Age of Cryptocurrency by Paul Vigna and Michael Casey
9. The Basics of Bitcoins and Blockchains by Antony Lewis
10. Blockchain Basics: A Non-Technical Introduction in 25 Steps by Daniel Drescher
38 | P a g e
CTMSCS SIII P2: IoT Security and Forensics
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
Objectives
1. To understand the basic concept and architecture of IoT.
2. To understand the IoT communication and messaging protocols.
3. To understand the IoT enabling technologies.
4. To understand the IoT security aspects.
5. To understand the basics of IoT security.
UNIT – I
Introduction to IoT
Definition & Characteristics of IoT; Evolution of IoT; Physical Design of IoT – IoT
Components; Logical Design of IoT; IoT Levels and Deployment Techniques; IoT
Applications & Domains; IoT Enabling Technologies; Challenges in IoT
UNIT – II
M2M & System Management
M2M; Difference between IoT and M2M; Software Defined Networking (SDN);
Network Function Virtualization (NFV); Simple Network Management Protocol
(SNMP); Limitation of SNMP, Network Operator Requirements; H/W and S/W
Communications in IoT (UART, SPI, I2C, JTAG)
UNIT – III
IoT Communication and Messaging Protocols
IoT Protocol Design – Protocol Stack for IoT; IoT Communication Protocol – HTTP
Basics, HTTP Architecture; MQTT Basics, MQTT Architecture; XMPP Basics, XMPP
Architecture; COAP Basics, COAP Architecture
UNIT – IV
IoT Security
IoT Interoperability; Need for IoT Security; Privacy & Threat to Data in IoT, IoT
Attack Vectors & IoT Attack Surfaces; IoT Pen testing Approaches; Understanding
OWASP Top 10 for IoT; Threat Modeling in IoT; IoT Cloud Security Architecture;
Case Study
UNIT – V
IoT Forensics, Standards & Guidelines
39 | P a g e
Introduction to IoT Forensics; Forensic Investigation of IoT Devices & Components;
IoT Forensic Tools & Techniques; IoT Standards and Guidelines; Case Study
Reference Books
1. Internet of Things_ A Hands-On Approach by Arshdeep Bahga, Vijay Madisetti -
Universities Press (India) Private Limited (2015)
2. A Beginner’s Guide to Internet of Things Security-Attacks, Applications,
Authentication, and Fundamentals - by B. B. Gupta (Author)_ Aakanksha Tewari
(Author) - CRC Press (2020).
3. IoT Penetration Testing Cookbook_ Identify vulnerabilities and secure your smart
devices – by Aaron Guzman, Aditya Gupta - Packt Publishing (2017)
4. Practical IoT Hacking_ The Definitive Guide to Attacking the Internet of Things –
by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou,
Beau Woods - No Starch Press (2021)
5. Practical Internet of Things Security, by Brian Russell and Drew Van Duren, 2016.
6. From Machine-to-Machine to the Internet of Things: Introduction to a New Age of
Intelligence, by Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand,
Stamatis Karnouskos, David Boyle, 1st Edition, Academic Press, 2014.
7. Securing the Internet of Things, by Shancang Li and Li Da Xu, Elsevier, 2017
8. IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet
of Things, by David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton
and Jerome Henry, Cisco Press, 2017.
9. Digital Forensic Investigation of Internet of Thing Devices, Reza Montasari,
Hamid Jahankhani, Richard Hill, Simon Parkinson, Springer; 1st ed. 2021 edition
40 | P a g e
CTMSCS SIII P3: Cloud Security and Forensics
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
UNIT – I
Introduction to cloud computing
Introduction to cloud computing, characteristic of cloud computing, cloud computing
models: Service model and deployment model, cloud services and technologies,
research challenges, cloud computing reference architecture, network recruitment for
cloud computing. Cloud Computing Security Baseline: Overview of computer security,
vulnerabilities and attacks, privacy and security in cloud storage services, privacy and
security in multi clouds, cloud accountability, Understanding the Threats, Classification
and countermeasures: Infrastructure and host threats, service provider threats, generic
threats, threat assessment.
UNIT – II
Security Challenges in Cloud Computing
Creating a Safe Environment, Access control, The CIA model : Confidentiality,
Integrity, Availability, A real-world example, The principles of security: The Principle
of Insecurity, The Principle of Least Privilege, The Principle of Separation of Duties,
The Principle of Internal Security, Data center security: Select a good place, Implement
a castle-like structure, Secure your authorization points, Defend your employees,
Defend all your support systems, Keep a low profile, Server security: The importance of
logs, Where to store the logs?, Evaluate what to log, Evaluate the number of logs, The
people aspect of security: Simple forgetfulness, Shortcuts, Human error, Lack of
information, Social engineering, Evil actions under threats, Evil actions for personal
41 | P a g e
advantage.
UNIT – III
Securing Network in Cloud
The Open Systems Interconnection model: Layer 1 – the Physical layer, Layer 2 – the
Data link layer, Address Resolution Protocol (ARP) spoofing, MAC flooding and
Content Addressable Memory table overflow attack, Dynamic Host Configuration
Protocol (DHCP) starvation attack, Cisco Discovery Protocol (CDP) attacks, Spanning
Tree Protocol (STP) attacks, Virtual LAN (VLAN) attacks, Layer 3 – the Network
layer, Layer 4 – the Transport layer, Layer 5 – the Session layer, Layer 6 – the
Presentation layer, Layer 7 – the Application layer, TCP/IP, Architecting secure
networks, Different uses means different network, The importance of firewall, IDS, and
IPS, Firewall, Intrusion detection system (IDS), Intrusion prevention system (IPS).
UNIT- IV
Securing Cloud Communications and API
Encryption security, Symmetric encryption, Stream cipher, Block cipher, Asymmetric
encryption, Diffie-Hellman, RSA algorithm, Elliptic Curve Cryptography,
Symmetric/asymmetric comparison and synergies, Hashing, MD5, SHA, Public key,
infrastructure, signed certificates versus self-signed certificates, cipher security,
Designing a redundant environment for your APIs. Identification and Authentication
System and Its Dashboard dentification versus authentication versus authorization,
Identification, Authentication: Something you know, something you have, something
you are, The multifactor authentication, Authorization: Mandatory Access Control,
Discretionary Access Control, Role-based Access Control, Lattice-based Access
Control, Session management, Federated identity.
UNIT– V
Securing Cloud Storage and Cloud Forensics
Different storage types,: Object storage, Block storage, File storage, Securing the
Hypervisor :Various types of virtualization, Full virtualization, Paravirtualization,
Partial virtualization, Comparison of virtualization levels, Hypervisors: Kernel-based
Virtual Machine, Xen, VMware ESXi, Hyper-V, BareMetal, Containers, Docker, Linux
Containers, Criteria for choosing a hypervisor : Team expertise, Product or project
maturity, Certifications and attestations, Features and performance, Hardware concerns,
Hypervisor memory optimization, Additional security features, Hardening the hardware
management: Physical hardware – PCI passthrough, Virtual hardware with Quick
Emulator, virtualization, Hardening the host operating system, Cloud Forensics, Cloud
Forensic Frameworks, Digital Forensic Investigation and Cloud Computing,
42 | P a g e
Dimensions of cloud forensics, cloud crime, challenges in cloud forensics, usages of
cloud forensics, Cloud forensics tools.
Reference Books
1. Practical Cloud Security: A Guide for Secure Design and Deployment by Chris
Doston
2. CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide by Brian
T O’Hara
3. OpenStack Cloud Security Paperback by Alessandro Locati Fabio, PacktPub
4. Cloud Computing Security: Foundations and Challenges edited by John R. Vacca,
CRC Press
5. Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L.
Krutz, Russell Dean Vines, John Wiley & Sons
43 | P a g e
CTMSCS SIII P4 EL1: Advanced Computer Forensics
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
UNIT – I
Introduction to Memory Forensics
Introduction to Primary Storage, Understanding Random Access Memory (RAM) and
It’s Working, Memory Management, Hibernation. Direct Memory Access (DMA).
Address Space, Registers, Segmentation, Paging, Address Translation, Physical Address
Extension, Virtual Memory, Demand Paging, Shared Memory, Stacks and Heaps,
Privilege Separation, System Calls. Important Artefacts in Memory, Challenges
involved in Memory Forensics, Live v/s Dead Forensics.
UNIT – II
Windows Memory Forensics
Acquiring RAM Dump from Windows Machines, Analyzing Windows RAM dump
using Open-Source Tools. Understanding Windows Objects and Pool Allocation.
Analyzing Processes, Handles, DLLs, Registry, Event Logs, Network Communications
Disk Artefacts and Other Important Artefacts. Understanding Event Reconstruction and
Timeline, Introduction to Analysis of Memory to Investigate Windows Malware
UNIT – III
Linux Memory Forensics
Understanding ELF Files, Shared Library, Global Offset Table, Procedure Linkage
Table, Linux Address Translation. Acquiring RAM Dump from Linux Machines,
Analyzing Linux RAM dump using Open-Source Tools. Analyzing Processes,
Command-line Arguments, Handles, Bash History, Network Communications, Disk /
Filesystem Artefacts and Other Important Artefacts. Understanding Event
44 | P a g e
Reconstruction and Timeline. Introduction to Analysis of Memory to Investigate Linux
Malware
UNIT – IV
Handling Anti-Forensic Techniques
Introduction to Cryptography, Encryption Types, Handling Encrypted Evidences,
Introduction to Steganography, Handling Stego Content, Detecting Log and Timestamp
Manipulations, Analyzing Anonymous Browsers and Communications, Investigating
Pluggable Devices and Applications, Detecting Wiping Tools, Identifying Important
Artefacts to Support use of Anti-Forensic Techniques / Tools.
UNIT – V
Emerging Domains of Computer Forensics
Introduction to Chip-Off and JTAG. Investigating Containers and Virtual Machines
Investigating Cryptocurrencies and Dark web Related Cases using Computer
Forensics. Using Artificial Intelligence based Solutions for Effective Forensic
Investigation of Computers. Other Emerging Challenges and Domains Related to
Computer Forensics.
Reference Books
1. The Art of Memory Forensics: Detecting Malware and Threats in Windows,
Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, et al.
2. The little handbook of Windows Memory Analysis: Just some thoughts about
Memory, Forensics and Volatility! by Andrea Fortuna
3. Introduction to Modern Cryptography: Third Edition by Jonathan Katz and
Yehuda Lindell
4. Applied Cryptography: Protocols, Algorithms and Source Code in C 20th
Edition by Bruce Schneider
5. Codes, Ciphers, Steganography & Secret Messages by Sunil Tanna
6. Digital Watermarking and Steganography: Fundamentals and Techniques,
Second Edition by Frank Y. Shih
7. Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual
Environments 1st Edition by Diane Barrett and Greg Kipper
8. Data Hiding Techniques in Windows OS: A Practical Approach to Investigation
and Defense 1st Edition by Nihad Ahmad Hassan, Rami Hijazi
9. Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems,
Mobile Devices and Network Protocols 1st Edition by Michael T. Raggo and
Chet Hosmer
10. Tor Darknet_ Master the Art of Invisibility
45 | P a g e
46 | P a g e
CTMSCS SIII P4 EL2: Reverse Engineering and Exploit
Writing
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
47 | P a g e
UNIT–IV
Introduction to exploits, Challenges of Software Security, Increase in Exploits via
Vulnerabilities, Exploits vs. Buffer Overflows, Intel x86 Architecture, Exploits: Stack,
Heap, Format Strings, Challenges for Exploit Writing.
UNIT– V
Implementing System Calls, Targeting Vulnerabilities, Remote and Local Exploits,
Format String Attacks, Race Conditions, Coding Sockets: Client-Side Socket
Programming, Server-Side Socket Programming, Memory Organization, NASL: Goals
and Script Writing, Exploit Development using Metasploit, Stack Overflow Exploits,
Heap Corruption Exploits, Integer Bug Exploits.
Reference Books
1. Mastering Reverse Engineering by Reginald Wong, Packt Publications
2. Reversing Secrets of Reverse Engineering by Eldad Eilam.
3. Hacking - The art of exploitation by Jon Erickson
4. Writing Security Tools and Exploits by James C. Foster and Vincent T. Liu.
5. The IDA Pro Book: The unofficial guide to the world’s most popular disassembler
by Chris Eagle
6. The Shellcoder's Handbook: Discovering and Exploiting Security Holes by Chris
Anley, Felix Lindner, and John Heasman
7. Sockets, Shellcode, Porting and Coding: Reverse Engineering Exploit and Tool
Coding for Security Professionals by James C. Foster and Mike Morgan Price
48 | P a g e
CTMSCS SIII P4 EL3: Database Security
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
UNIT-III
Database Architecture:
49 | P a g e
Introduction to Oracle Architecture – Physical & Memory Structure; Introduction to
MySQL Architecture – Query & Storage Engine, Database Connection Manager,
Transaction & Storage Manager, Introduction to Microsoft SQL Server Architecture
Physical & Memory Structure, Buffer Management, Threads and Processes
UNIT-IV
Database Security Assessment – 1:
Authentication: OS Authentication, Database Authentication – Access Control, Roles
and Responsibilities; Password Policies; SQL Statements for access control; Database
monitoring tools; Database Security Flaws; Threats/Attack Vectors on Database
Systems; Scanning for Database Servers – Common Ports; Understanding SQL
Injections; Identifying Vulnerabilities – Through Errors, Direct testing, Source Code
Analysis, String Based Matching
UNIT-V
Database Security Assessment – 2:
Database Information Gathering; Statement Exploitation; PL/SQL Injection – Injecting
into SELECT, DELETE, INSERT, UPDATE statements, Executing User-Supplied
Queries with DBMS_SQL; Database Auditing; Preventive Measures
Reference Books
1. Database Security by Alfred Basta, Melissa Zgola, Dana Bullaboy, Thomas L. Whitlock
Sr. (Published by Course Technology, Cengage Learning)
2. Database Security and Auditing: Protecting Data Integrity and Accessibility, by Hassan
A. Afyouni (Published by Cengage Learning)
3. The Database Hacker’s Handbook: Defending Database Servers by David Litchfield,
Chris Anley, John Heasman, and Bill Grindlay (Published by Wiley Publishing)
4. Effective Oracle Database 10g Security by Design by David C. Knox (Published by
Oracle Press)
5. SQL Injection Attacks and Defense by Justin Clarke (Published by Elsevier, Inc)
50 | P a g e
CTMSCS SIII P4 EL4: Critical Infrastructure Security
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
51 | P a g e
(CSRF), Exploiting Hard-Coded Values, Brute-Force and their relevance in
ICS/SCADA.
UNIT-V
Security Standards, Risk and Mitigation:
CIA Triad for ICS/SCADA, Common ICS Cybersecurity Standards: NIST System
Protection Profile for Industrial Control Systems (SPP ICS), NIST SP 800-82, ISA/IEC
62443 (formerly ISA-99), etc., General ICS Risk Mitigation Considerations: ICS
Network Considerations, ICS Host-Based Considerations ICS Physical Access
Considerations. The Risk Mitigation Process: Integrating the Risk Assessment Steps,
Integrating the Risk Scenarios, performing a Cost-Benefit Analysis, Establishing the
Risk Mitigation Strategy.
Reference Books
1. Industrial Automation with SCADA: Concepts, Communications and Security by
K S Manoj Notion Press; 1st edition 2019.
2. Handbook of SCADA/Control Systems Security by Robert Radvanovsky, Jacob
Brodsky CRC Press, 2016
3. Securing SCADA Systems by Ronald L. Krutz, Wiley Publication, Inc. 2005
4. Hacking Exposed: Industrial Control Systems by Aaron Shbeeb, Clint Bodungen,
Bryan Singer, Stephen Hilt, Kyle Wilhoit, Tata McGraw Hill, 2017.
5. Industrial Cybersecurity Efficiently secure critical infrastructure systems by
Pascal Ackerman, Packt Publication, 2017.
6. Cybersecurity for Industrial Control Systems_ SCADA, DCS, PLC, HMI, and
SIS (2011, Auerbach Publications, CRC Press)
7. Cyber-security of SCADA and Other Industrial Control Systems (2016, Springer
International Publishing)
8. Cybersecurity of Industrial Systems by Jean-Marie Flaus (2019, ISTE, John
Wiley & Sons)
9. An Architecture for SCADA Network Forensics by Tim Kilpatrick M.S., Jesus
Gonzalez Ph.D., Rodrigo Chandia Ph.D., Mauricio Papa, SujeetShenoi
52 | P a g e
CTMSCS SIII P4 EL4: Mobile Security
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
53 | P a g e
Security auditing using Drozer, MobSF (Mobile Security Framework): Static and
Dynamic Analysis, Android application security vulnerability assessment using QARK,
Android dynamic instrumentation using Frida and Objection framework. Introduction to
Xposed is a framework.
Unit-V
Request Interception and traffic analysis
Traffic Analysis for Android Devices, Android traffic interception, Ways to analyse
Android traffic, Passive analysis, Active analysis, HTTPS Proxy interception, Other
ways to intercept SSL traffic
Reference Books
1. Android Security Internals: An In-Depth Guide to Android's Security
Architecture by Nikolay Elenkov.
2. Android Hacker's Handbook by Joshua J. Drake, Zach Lanier, Georg Wicherski,
Pau Oliva Fora, Stephen A. Ridley, Collin Mulliner, Wiley publication.
3. Learning Pentesting for Android Devices by Aditya Gupta, Packt Publication.
54 | P a g e
CTMSCS SIII P5 EL1 Database Forensics
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
UNIT–I
Security and Information Technology
Introduction to Database and Database Management Systems; Role of Database in
Information Systems; Objectives & Need for Database Security; Attackers and their
motives; Security Architecture, Global Policies for Database Environment.
UNIT–II
Database Review
Structural Components of Database (Tuples, Keys, Queries); Models of Database;
Types of Database; Database System Architecture – Three Levels of the Architecture;
Client/Server Architecture; Introduction to Relational Database; Introduction to Virtual
Private Database; Roles and Applications of VPD; Importance of Cryptography in
Database.
UNIT–III
Database Architecture
Introduction to Oracle Architecture – Physical & Memory Structure; Introduction to
MySQL Architecture – Query & Storage Engine, Database Connection Manager,
Transaction & Storage Manager, Introduction to Microsoft SQL Server Architecture -
Physical & Memory Structure, Buffer Management, Threads and Processes.
UNIT–IV
55 | P a g e
Database Forensics – 1
Introduction to Database Forensics; Database Artifacts – Types & Categories, Tables or
Views with SQL, Privilege Changes, Changes to Security, Object Changes, ID based
searches, Database Dumps, Data files, Database Users, Jobs, Triggers; Non-Database
Artifacts – Webserver Logs, Application Logs, Database trace, SQL *Net Trace, Errors
Logs, Security Controls and more;
UNIT– V
Database Forensics – 2
Introduction to SQL Server; SQL Server Artifacts – Types & Categories; Residential
Artifacts - Data Cache, Active VLFs, Reusable VLFs, Server Logins, Database Users,
Jobs, Triggers, Errors Logs, Data Files; Non- Residential Artifacts, System Event Logs,
Web Server Logs, Security Controls and more; Collection of Volatile SQL Server
Artifacts, Collection of Non-Volatile SQL Server Artifacts, Analysis of Collected
Artifacts – Database Server Versioning, Recovering Deleted Data Files, Recovering
Transaction Log, Recovering Query Logs and more; Execution of SQL Server Data
Collection Scripts.
Reference Books
1. Database Security by Alfred Basta, Melissa Zgola, Dana Bullaboy, Thomas L.
Whitlock Sr. (Published by Course Technology, Cengage Learning)
2. Database Security and Auditing: Protecting Data Integrity and Accessibility, by
Hassan A. Afyouni (Published by Cengage Learning)
3. Database Forensics: A Clear and Concise Reference by Gerardus Bkijdyk
4. Oracle Incident Response and Forensics – Preparing for and Responding to Data
Breaches by Pete Finnigan (Published by Apress)
5. SQL Server Forensic Analysis by Kevvie Fowler (Publication – Addison-Wesley)
56 | P a g e
CTMSCS SIII P5 EL1: Social Network Analysis
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
Objectives
1. Students will learn social media working concepts.
2. Students will learn social media based online data investigations and analysis.
3. Students will learn the intelligence gathering concepts from open source available
data.
UNIT – I
Social Networking
Fundamentals of Social Networking, Social Networking viral, why social networking is
popular, Psychology & Sociology for Online Media, Concepts of Geospatial
Information System, How Facebook works?
UNIT – II
Social Media & Legal Implication
Graph Theory and Social Networks, Markets and Strategic Interactions in Networks,
Information Networks and the World Wide Web, Network Dynamics: Population and
Structural Models, Legal aspects of Privacy in India, Institutions and Aggregate
Behavior, Social Media and its impact on Business, Politics, Law and Revolutions,
Legal Responsibilities for Social Networking.
UNIT – III
Information Gathering from Resources
Intelligence gathering, People searching, OSINT, Deep Web, Defamatory content
analysis, Multimedia forensics over Social Networking, Emerging Trends in Social
Networks
UNIT – IV
Social Networking exploitation and hacking
Introduction: hacking on Twitter data Micro formats: semantic Markup and common
sense collide, Twitter: friends, followers, and set wise operations, Twitter: the tweet,
LinkedIn: clustering your professional network for fun (and profit?), cosine similarity,
and collocations, Facebook: the hackers outlook.
57 | P a g e
UNIT – V
Social Networking Forensics
Twitter GPS & Account Data, Hidden Social Network Content, Cell Phone Owner
Information, Hidden, Photo GPS & Metadata, Deleted Websites & Posts, Website
Owner Information, Alias Social Network Profiles, Additional User Accounts, Sensitive
Documents & Photos, Live Streaming Social Content, Videos Uploaded by Location,
Newspaper Archives & Scans, Social Content by Location, Text Transcripts of Videos,
Historical Satellite Imagery, Duplicate Copies of Photos, Public Government Records,
Document Metadata, Voter Registration Records, Facebook Wall Posts
Reference Books
1. Social Network Analysis: Methods and Applications by Katherine Faust and
Stanley Wasserman
2. Social network analysis by John Scott
3. Models and Methods in Social Network Analysis by Stanley Wasserman, Peter J.
Carrington, John Scott
4. The SAGE Handbook of Social Network Analysis by John Scott, Peter J.
Carrington
5. Analysing Social Networks by Jeffrey C. Johnson, Martin G Everett, and Stephen
Borgatti
6. Social Network Analysis: Methods and Examples by Franziska B. Keller, Lu
Zheng, and Song Yang
7. Social Network Analysis by David Knoke and Song Yang
8. The Development of Social Network Analysis by Linton Freeman
9. Advances in Social Network Analysis: Research in the Social and Behavioural
Sciences by Joseph Galaskiewicz, Stanley Wasserman
10. Understanding Social Networks: Theories, Concepts, and Findings by Charles
Kadushin
58 | P a g e
CTMSCS SIII P5 EL2: Network Forensics
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
Objectives
1. Students will learn social media working concepts.
2. Students will learn social media based online data investigations and analysis.
3. Students will learn the intelligence gathering concepts from open source available
data.
Unit – I
Practical Investigative Strategies
Real-World Cases: Hospital Laptop Goes Missing, catching a Corporate Pirate, Hacked
Government Server, Footprints, Concepts in Digital Evidence, Real Evidence, Best
Evidence, Direct Evidence, Circumstantial Evidence, Hearsay, Business Records,
Digital Evidence, Network-Based Digital Evidence, Challenges Relating to Network
Evidence, Network Forensics Investigative Methodology (OSCAR), Obtain
Information, Strategize, Collect Evidence, Analyze, Report. Technical Fundamentals:
Sources of Network-Based Evidence, On the Wire, In the Air, Switches , Routers,
DHCP Servers, Name Servers, Authentication Servers, Network Intrusion
Detection/Prevention Systems, Firewalls, Web Proxies ,Application Servers, Central
Log Servers, Principles of Internetworking, Protocols, Open Systems Interconnection
Model , Example: Around the World... and Back, Internet Protocol Suite, Early History
and Development of the Internet Protocol Suite, Internet Protocol, Transmission Control
Protocol, User Datagram Protocol
Unit – II
Evidence Acquisition
Physical Interception, Cables, Radio Frequency, Hubs, Switches, Traffic Acquisition
Software, libpcap and WinPcap, The Berkeley Packet Filter (BPF) Language, tcpdump,
Wireshark, tshark, dumpcap, Active Acquisition, Common Interfaces, Inspection
Without Access, Strategy, Traffic Analysis Packet Analysis, Protocol Analysis ,Where
to Get Information on Protocols, Protocol Analysis Tools, Protocol Analysis
Techniques, Packet Analysis, Packet Analysis Tools ,Packet Analysis Techniques ,
Flow Analysis ,Flow Analysis Tools, Flow Analysis Techniques, Higher- Layer Traffic
59 | P a g e
Analysis ,A Few Common Higher-Layer Protocols, Higher-Layer Analysis Tools,
Higher-Layer Analysis Techniques , Case Study: Ann‘s Rendezvous , Analysis:
Protocol Summary, DHCP Traffic , Keyword Search, SMTP Analysis—Wireshark,
SMTP Analysis— TCPFlow, SMTP Analysis—Attachment File Carving , Viewing the
Attachment, Finding Ann the Easy Way, Timeline, Theory of the Case.
Unit – III
Statistical Flow Analysis
Process Overview, Sensors, Sensor Types, Sensor Software, Sensor Placement,
Modifying the Environment, Flow Record Export Protocols, NetFlow, IPFIX, sFlow,
Collection and Aggregation, Collector Placement and Architecture, Collection Systems,
Analysis Flow Record Analysis Techniques, Flow Record Analysis Tools. Wireless:
Network Forensics Unplugged: The IEEE Layer 2 Protocol Series, Why So Many Layer
2 Protocols? The 802.11 Protocol Suite,802.1X, Wireless Access Points (WAPs), Why
Investigate Wireless Access Points? Types of Wireless Access Points, WAP Evidence,
Wireless Traffic Capture and Analysis, Spectrum Analysis, Wireless Passive Evidence
Acquisition, analyzing 802.11 Efficiently, Common Attacks, Sniffing, Rogue Wireless
Access Points, Evil Twin, WEP Cracking, Locating Wireless Devices, Gather Station
Descriptors, Identify Nearby Wireless Access Points, Signal Strength, Skyhook.
Unit – IV
Switches, Routers, and Firewalls
Storage Media, Switches, Why Investigate Switches?, Content-Addressable Memory
Table, Address Resolution Protocol, Types of Switches, Switch Evidence, Routers,
Why Investigate Routers?, Types of Routers , Router Evidence, Firewalls, Why
Investigate Firewalls?, Types of Firewalls, Firewall Evidence , Interfaces, Web
Interface, Console Command-Line Interface (CLI) ,Remote Command-Line Interface,
Simple Network Management Protocol (SNMP) , Proprietary Interface, Logging, Local
Logging, Simple Network Management Protocol, syslog, Authentication, Authorization,
and Accounting Logging, Web Proxies: Why Investigate Web Proxies? , Web Proxy
Functionality , Caching ,URI Filtering, Content Filtering , Distributed Caching,
Evidence, Types of Evidence , Obtaining Evidence, Squid, Squid Configuration, Squid
Access Logfile, Squid Cache, Web Proxy Analysis, Web Proxy Log Analysis Tools ,
Example: Dissecting a Squid Disk Cache, Encrypted Web Traffic, Transport Layer
Security (TLS), Gaining Access to Encrypted Content, Commercial TLS/SSL
Interception Tools.
Unit – V
Network Intrusion Detection and Analysis
60 | P a g e
Why Investigate NIDS/NIPS? Typical NIDS/NIPS Functionality , Sniffing, Higher-
Layer Protocol Awareness, Alerting on Suspicious Bits, Modes of Detection,
Signature-Based Analysis, Protocol Awareness, Behavioral Analysis, Types of
NIDS/NIPSs, Commercial, Roll- Your-Own, NIDS/NIPS Evidence Acquisition, Types
of Evidence, NIDS/NIPS Interface, Comprehensive Packet Logging, Snort , Basic
Architecture, Configuration, Snort Rule Language.
Reference Books
1. Introduction to Security and Network Forensics by William J. Buchanan CRC
Press.
2. Network Forensics: Tracking Hackers through Cyberspace by Person
61 | P a g e
CTMSCS SIII P5 EL3: Mobile Forensics
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs. Marks Hrs.
Marks Hrs. Marks Hrs.
03 00 00 03 03 25 00:45 50 01:30 100 03:00 - - 200
62 | P a g e
cache, d, data, dalvik-cache, data, dev, init, mnt, proc, root, sbin, misc, sdcard, system,
build.prop, app, framework, ueventd.goldfish.rc and ueventd.rc, Application data
storage on the device, Shared preferences, Internal storage, External storage, SQLite
database, Network, Android filesystem overview, Viewing filesystems on an Android
device, Common Android filesystems, Flash memory filesystems, Media-based
filesystems, Pseudo filesystems.
UNIT–III
Data Extraction in Android Device
Introducing Android Forensics: Mobile forensics, The mobile forensics approach:
Investigation Preparation, Seizure and Isolation, Acquisition, Examination and
Analysis, Reporting; Challenges in mobile forensics, Extracting Data Logically from
Android Devices, Logical extraction overview, What data can be recovered logically?,
Root access, Manual ADB data extraction, USB debugging, Using ADB shell to
determine if a device is root, ADB pull, Recovery mode, Fastboot mode, Determining
bootloader status, Booting to a custom recovery image, ADB backup extractions,
Extracting a backup over ADB, Parsing ADB backups, Data locations within ADB
backups, ADB Dumpsys, Dumpsys battery stats, Dumpsys procstats, Dumpsys user,
Dumpsys App Ops, Dumpsys Wi-Fi, Dumpsys notification, Dumpsys conclusions,
Android SIM card extractions, Acquiring SIM card data, SIM security, SIM cloning,
Issues and opportunities with Android Lollipop. Extracting Data Physically from
Android Devices.
UNIT-IV
Logical and Physical Extraction
Physical extraction overview, What data can be acquired physically?, Root access,
Extracting data physically with dd, Determining what to image, Writing to an SD card,
Writing directly to an examiner's computer with netcat, Installing netcat on the device,
Using netcat, Extracting data physically with nanddump, Verifying a full physical
image, Analyzing a full physical image, Autopsy, Issues with analyzing physical
dumps, Imaging and analyzing Android RAM, What can be found in RAM?, Imaging
RAM with LiME, Imaging RAM with mem, Output from mem, Acquiring Android SD
cards, What can be found on an SD card?, SD card security, Advanced forensic
methods, An overview of data recovery, How can deleted files be recovered?,
Recovering data deleted from an SD card, Recovering data deleted from internal
memory, Recovering deleted data by parsing SQLite files, Recovering deleted data
through file carving techniques, Analyzing backup.
UNIT-V
63 | P a g e
Android Application Forensics
Forensic Analysis of Android Applications, Application analysis, Why do app
analysis?, The layout of this chapter, Determining what apps are installed,
Understanding Linux epoch time, Wi-Fi analysis, Contacts/call analysis, SMS/MMS
analysis, User dictionary analysis, Gmail analysis, Google Chrome analysis, Decoding
the Web Kit time format, Google Maps analysis, Google Hangouts analysis, Google
Keep analysis, Converting a Julian date, Facebook analysis, Facebook Messenger
analysis, Skype analysis, Recovering video message-es from Skype, Snapchat analysis,
Viber analysis, Tango analysis, WhatsApp analysis, Decrypting WhatsApp backups.
Reference Books
3. Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and
Presentation, Second Edition by Lee Reiber, McGraw-Hill Education Publication
(2018).
4. Android Hacker's Handbook by Joshua J. Drake, Zach Lanier, Georg Wicherski,
Pau Oliva Fora, Stephen A. Ridley, Collin Mulliner, Wiley Publication (2014).
5. Android Forensics Investigation, Analysis and Mobile Security for Google
Android by Andrew Hoog, Elsevier Science Publication (2011).
6. Learning Android Forensics by Rohit Tamma, Donnie Tindall, Packt Publication
(2015).
7. Practical Mobile Forensics, A Hands-on Guide to Mastering Mobile Forensics for
the IOS, Android, and the Windows Phone Platforms, 3rd Edition by Heather
Mahalik, Satish Bommisetty, Oleg Skulkin, Rohit Tamma, Packt Publication
(2018)
64 | P a g e
CTMSCS SIII P5 EL4: Research Methodology
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
03 01 00 04 04 25 00:45 50 01:30 100 03:00 - - 200
Objectives
1. To understand basic concepts of research and its methodologies
2. To identify appropriate research topics
3. To select and define appropriate research problem and parameters
4. To learn how to prepare a project proposal to undertake a project or a grant
5. To learn how to organize and conduct research on advanced projects in a more
appropriate manner
6. To learn how to write a research report and thesis based on the research.
UNIT – I
Objectives and types of research: Descriptive vs. Analytical, Applied vs. Fundamental,
Quantitative vs. Qualitative, Conceptual vs. Empirical. Research Formulation,
Literature review and Development of hypothesis
UNIT – II
Research design and methods, Developing a research plan - Exploration, Description,
Diagnosis, Experimentation. Determining experimental and sample designs
UNIT – III
Data Collection and analysis: Methods of data collection – Sampling Methods and Data
Processing. Data Analysis: Types of data, Basic concept of frequency distribution,
measure of central values – Mean, median and mode, measure of dispersion, range,
mean deviation and standard deviation, probability, theory and classical definition of
probability, Bayes theorem of probability, conditional probability and coincidence
probability, Chi-square test, ANOVA, SPSS. Types of Errors and Interpretation of
Findings.
UNIT – IV
Reporting and thesis writing: Structure and components of scientific reports and thesis,
Significance and Different steps in the preparation, Illustrations, Bibliography.
65 | P a g e
Presentations: Oral and Poster, Importance of effective communication in scientific
research.
UNIT – V
Basics of Ethical issues, Intellectual property rights, Copy right, Reproduction of
published material: Plagiarism in scientific research and communications.
Reference
1. Garg, B.L., Karadia, R., Agarwal, F. and Agarwal, U.K., 2002. An introduction to
Research Methodology, RBSA Publishers.
66 | P a g e
CTMSCS SIII L1: Blockchain and Cryptocurrencies
Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
67 | P a g e
CTMSCS SIII L2: IoT Security and Forensics Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
68 | P a g e
CTMSCS SIII L3: Cloud Security and Forensics Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
69 | P a g e
CTMSCS SIII L4: Program Elective 1 Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
70 | P a g e
CTMSCS SIII L5: Program Elective 2 Laboratory
Teaching Scheme Evaluation Scheme
Theory Practical
Internal Exams University Exams University Exams (LPW) Tot al
Th Tu Pr C TCH
TA-1/TA-2 MSE Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 00 01 01 02 -- -- -- -- -- -- 100 03:00 100
71 | P a g e
SEMESTER- IV
72 | P a g e
CTMSCS SIV P1 Major Project
Teaching Scheme Evaluation Scheme
Theory Practical
Tot al
Internal Exams University Exams University Exams (LPW)
Th Tu Pr C TCH
TA-1/TA-2 MSE
Marks Hrs Marks Hrs
Marks Hrs Marks Hrs
00 10 10 20 30 25 00:45 50 01:30 100 03:00 - - 200
Students will need to work on a major project under guidance of internal faculty
members. The students will need to submit a regular progress report for internal
evaluation. A project report will need to be submitted and presented at the end of the
semester for final evaluation.
73 | P a g e