Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information Technology Engineering/
  4. IT Semester 6/
  5. Cyber Security & Digital Forensics (4361601)/

·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Cyber Security and Digital Forensic Course Code: 4361601

GUJARAT TECHNOLOGICAL UNIVERSITY (GTU)
#

Competency-focused Outcome-based Green Curriculum-2021 (COGC-2021) Semester -VI
#

Course Title: Cyber Security and Digital Forensics
#

(Course Code: 4361601)

Diploma Programme In Which This Course Is OfferedSemester In Which Offered
Information Technology6 th semester

1. RATIONALE
#

Cyber security and digital forensics are two essential disciplines in the field of information technology. Cyber Security and Digital Forensics is essential to address the critical shortage of professionals in these fields. This curriculum equips students with the knowledge and skills needed to protect sensitive data, understand the legal and ethical aspects of digital investigations, and pursue diverse career opportunities in information security and digital forensics. Furthermore, it contributes to national security by preparing professionals to defend critical digital infrastructure and fosters adaptability to emerging threats and technologies in the ever-evolving digital landscape.

This curriculum ensures that graduates are not only technically proficient but also ethically responsible professionals who can play a crucial role in protecting digital assets, solving digital crimes, and contributing to the broader field of information technology and security.

2. COMPETENCY
#

The purpose of this course is to help the student to attain the following industry identified competency through various teaching-learning experiences:

  • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them.
  • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.

3. Course Outcomes:
#

After completing the course, the students will be able to

  • a) Gain knowledge of information security, including Cryptography and hashing techniques.
  • b) Explain the different types of network and system security techniques and threats.
  • c) Understand the different types cybercrimes and Analyse cybercrime.
  • d) Implement ethical hacking methodologies using Kali Linux, including vulnerability analysis.
  • e) Explain how digital forensics methodologies use for investigate cybercrimes.

Cyber Security and Digital Forensic Course Code: 4361601

4. TEACHING AND EXAMINATION SCHEME
#

Teaching SchemeTeaching SchemeTeaching SchemeTotal Credits (L+T+P/2)Examination SchemeExamination SchemeExamination SchemeExamination SchemeExamination Scheme
(In Hours)(In Hours)(In Hours)Theory MarksTheory MarksPractical MarksPractical MarksTotal
LTPCCAESECAESEMarks
4-4630702525150

Legends: L -Lecture; T - Tutorial/Teacher Guided Theory Practice; P -Practical; C - Credit, CA - Continuous Assessment; ESE -End Semester Examination.

Out of 30 marks under the theory CA, 10 marks are for assessment of the micro-project To facilitate the integration of COs and the remaining 20 marks is the average of 2 tests to be taken during the semester for the assessing the attainment of the cognitive domain UOs required for the attainment of the Cos.

5. SUGGESTED PRACTICAL EXERCISES
#

The following practical outcomes (PrOs) that are the subcomponents of the Cos.

Sr. No.Practical Outcomes (PrOs)Approx. Hrs. requiredUnit No.
1 a) Implement Private key Cryptography algorithm DES in python. (Install des package using pip) b) Implement Message digest 5 and Secure Hash Function using python.41
2 Implement the RSA Public key Cryptography algorithm in Python using RSA library.41
Demonstrate intrusion detection system (ids) using any tool.(snort or any other s/w)423
Install Tor browser and perform proxy tunnelling.424
Perform data hiding using Steganography tool Openstego (use AES encryption algorithm).435
Create malicious script for generating multiple folders using python.436
Prepare a case study report on 3 different types of cyber-crimes. ( https://gujaratcybercrime.org) (https://cybercrime.gov.in)437
Study Open-source intelligence (OSINT) framework and perform Information gathering using Username, Email address , Domain name and IP address.448

Cyber Security and Digital Forensic Course Code: 4361601

9a) Installation and configuration of Kali Linux in Virtual box/VMware. b) Perform basic commands in Kali Linux. 44
10 Perform port scanning using NMAP.44
11 a) Installation and configuration of Wireshark. b) Perform Password sniffing using Wireshark. (Analyse GET/POST Request)45
12 Perform Memory forensic using Memoryze tool. (https://fireeye.market/apps/211368)45
13 Perform web Artifact analysis and registry analysis using Autopsy. (https://www.sleuthkit.org/autopsy/)45
14 Create forensic images of entire local hard drives using FTK IMAGER tool. (https://go.exterro.com/l/43312/2023-05-03/fc4b78)45
TOTAL Hrs.56

Note
#

More Practical Exercises can be designed and offered by the respective course teacher to develop the industry relevant skills/outcomes to match the COs. The above table is only a suggestive list .

The following are some sample ‘Process’ and ‘Product’ related skills(more may be added/deleted depending on the course)that occur in the above listed Practical Exercises of this course required which are embedded in the COs and ultimately the competency.

Sr.NoSample Performance Indicators for the PrOsWeightage in %
1Analyze and identify a suitable approach for the problem-solving20
2Use of appropriate technology/software/tools25
3Relevance and quality of output25
4Interpret the result and conclusion15
5Prepare a report/presentation for given problem/Viva15
TotalTotal100

6. MAJOR EQUIPMENT/ INSTRUMENTS AND SOFTWARE REQUIRE
#

Sr. No.Equipment Name with Broad SpecificationsPrO. No.
1Computer system with operating system: Windows 7 or higher Ver.,macOS,and KaliLinux,with4GBorhigherRAM,Pythonversions: 2.7.X, 3.6.X
All

Cyber Security and Digital Forensic Course Code: 4361601

7. AFFECTIVE DOMAIN OUTCOMES
#

The following sample Affective Domain Outcomes (ADOs) are embedded in many of the above-mentioned COs and PrOs. More could be added to fulfil the development of this competency.

  • a) Work as a leader/team member.
  • b) Follow ethical practices for cyber security

The ADOs are best developed through the laboratory/field-based exercises. Moreover, the level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned below:

  • i. ‘Valuing Level’ in 1st year ii. ‘Organization

Level’ in 2nd year. iii.

  • ‘Characterization Level’ in 3rd year

8. UNDERPINNING THEORY
#

Unit No.UNIT OUTCOMESTopics and Sub-topics
Unit - I Introduction of Information Security and Cryptography1a. Learn about how to maintain the Confidentiality, Integrity and Availability of a data. 1b. Analyze and design hash and MD5 algorithms.1.1. Basic Concept of Information Security 1.2. CIA Triad 1.3. OSI Security Architecture (Security Services, Mechanisms and Attacks) 1.4. Private & Public Key Cryptography 1.5. Message Digest 5 Hashing & SHA
Unit- II Network and System security2a. To understand various protocols for network security to protect against the threats in the networks. 2b. Understand the threats and risks to modern data and information systems. 2c. Understand the working and configuration of firewall.2.1. Types of attacks 2.2. Digital signatures: Definition and Properties 2.3. Pretty Good Privacy (PGP)(brief) 2.4. Secure Socket Layer and Transport Layer Security 2.5. IPsec 2.6. HTTPS (Connection initiation & Connection closure) 2.7. Malicious software: Virus and Related Threats (Trojans, Rootkit, Backdoors, keylogger) 2.8. Firewall :Need and Types 2.9. Proxy Server: Need and Types

Cyber Security and Digital Forensic Course Code: 4361601

Cyber Security and Digital Forensic Course Code: 4361601

Cyber Security and Digital Forensic Course Code: 4361601

Cyber Security and Digital Forensic Course Code: 4361601

Unit- IV Ethical Hacking4a. Understand the ethical behaviour with unethical behaviour. 4b. Understand basic terminology as it relates to the Kali Linux distribution. 4c. To learn about various types of attacks, attackers and security threats and vulnerabilities.4.1. Concept of Hacking Types of Hackers 4.2. Basics of Ethical Hacking 4.3. The terminology of Hacking (Vulnerability, Exploit, 0-Day) 4.4. Five Steps of Hacking (Information Gathering, Scanning, Gaining Access, Maintaining Access, Covering Tracks) 4.5. Information Gathering (Active, Passive) 4.6. Introduction to Kali Linux OS • Configuration of Kali Linux • Basic Commands Kali Linux • Vulnerability Scanning/ Vulnerability
4d. To learn about scanning of systems/applications and System Protection.Based Hacking a. Foot printing b. Scanning c. Password Cracking d. Brute Force Attacks e. Injection Attacks f. Phishing Attacks g. Block chain Attacks 4.7. Port Scanning 4.8. Remote Administration Tool (RAT) 4.9. Protect System from RAT 4.10. What is Sniffing and Mechanism of Sniffing Session Hijacking

Cyber Security and Digital Forensic Course Code: 4361601

9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN
#

Unit No.Unit TitleTeaching HoursDistribution of Theory MarksDistribution of Theory MarksDistribution of Theory MarksDistribution of Theory Marks
R LevelU LevelA LevelTotal Marks
IOverview of Information Security and Cryptography844412
IINetwork and System Security1024612

Cyber Security and Digital Forensic Course Code: 4361601

IIICyber Crime1226614
IVEthical Hacking1446616
VDigital Forensics1228616
5612302870

Legends: R=Remember, U=Understand, A=Apply and above (Revised Bloom’s taxonomy)

Note : This specification table provides general guidelines to assist students for their learning and to teachers to teach and question paper designers/setters to formulate test items/questions assess the attainment of the UOs. The actual distribution of marks at different taxonomy levels (of R, U and A) in the question paper may vary slightly from the above table.

10. SUGGESTED STUDENT ACTIVITIES
#

Other than the classroom and laboratory learning, following are the suggested student-related cocurricular activities which can be undertaken to accelerate the attainment of the various outcomes in this course: Students should conduct following activities in group and prepare reports of about 5 pages for each activity, also collect/record physical evidences for their (student’s) portfolio which will be useful for their placement interviews:

  • a) Start or join a cyber security club or team on your campus.
  • b) Undertake hacking and cybercrime investigation assignments/micro-projects in teams.
  • c) Organize or attend workshops and training sessions on topics like ethical hacking, penetration testing, cybercrime and digital forensics.
  • d) Invite industry professionals and experts to give talks and presentations on the latest trends and best practices in cyber security and digital forensics.
  • e) Visit your nearest Gujarat government cybercrime department and learn how investigate cybercrime.
  • f) Organize campaigns to promote cyber security awareness and best practices on your campus.
  • g) Identify the vulnerable points for attacks in simple networks in your college and college websites/government websites.
  • h) Collect and analyze information regarding various types of cyber-attacks and cyber fraud and provide solution to prevent it
  • i) Students are encouraged to register themselves in various MOOCs such as: Swayam, edx, Coursera, Udemy etc to further enhance their learning.

11. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES
#

These are sample strategies, which the teacher can use to accelerate the attainment of the various outcomes in this course:

  • a) Massive open online courses ( MOOCs ) may be used to teach various topics/subtopics.
  • b) Guide student(s) in undertaking micro-projects.
  • c) ‘L’ in section No. 4 means different types of teaching methods that are to be employed by teachers to develop the outcomes.

Cyber Security and Digital Forensic Course Code: 4361601

  • d) About 20% of the topics/sub-topics which are relatively simpler or descriptive in nature is to be given to the students for self-learning , but to be assessed using different assessment methods.
  • e) With respect to section No.11 , teachers need to ensure to create opportunities and provisions for cocurricular activities .

12. SUGGESTED MICRO-PROJECTS
#

Only one micro-project is planned to be undertaken by a students that needs to be assigned to them in the beginning of the semester. The number of students in the group should not exceed three. The microproject could be industry application based, internet-based, workshop based, incident based, laboratorybased or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to maintain a dated work diary consisting of individual contributions in the project work and give a seminar presentation of it before submission. The total duration of the micro-project should not be less than 16 (sixteen) student engagement hours during the course. The student ought to submit a micro-project by the end of the semester to develop the industryoriented COs.

A suggestive list of micro-projects is given here. This has to match the competency and the COs. Similar micro-projects could be added by the concerned course teacher:

Idea 1:Anomaly Detection System: Build an anomaly-based DDoS detection system that establishes a baseline of normal network behaviour and identifies deviations from this baseline as potential attacks. This could involve statistical analysis or machine learning techniques.

Idea 2:Credit Card Fraud Detection System: Develop an intelligent credit card fraud detection system that combines various techniques and technologies to identify and prevent fraudulent credit card transactions in real-time. The system should be able to distinguish between legitimate transactions and unauthorized or fraudulent activities.

Idea 3:Create a Case Study: Ask students to analyze a genuine or hypothetical legal case that involves digital evidence and require them to create a comprehensive report or presentation focusing on the various aspects of digital forensics within the case.

  • Idea 4 : Network traffic logs analysis :Provide network traffic logs for analysis by students to detect any potentially suspicious or malicious activities, including unauthorized access or data exfiltration.
  • Idea 5 : Basic mobile forensic analysis : Students should be guided to perform a mobile forensic analysis, which involves extracting deleted text messages, phone records, and other digital evidence.
  • Idea 6 : Network Scanning & Vulnerability Assessment: Prepare report and suggest ways to secure local area network or WLAN of institute.
  • Idea 7: Identify web application is vulnerable to something like SQL injection or XSS and suggest ways to protect it.

Idea 8 : Use ethical hacking to break passwords.

13. SUGGESTED LEARNING RESOURCES
#

Sr. NoTitle of BookAuthorPublication with place, year and ISBN
1Cryptography And Network SecurityWilliam StallingsPearson

Cyber Security and Digital Forensic Course Code: 4361601

2Cyber security: The Hacker Proof Guide to Cyber security, Internet Safety, Cybercrime &Preventing AttacksLeon TietzTrust Genics
3Cyber Security EssentialsJames GrahamCRC Press
4Kali Linux Made Easy for Beginners And IntermediatesBerg CraigAntony Mwau
5Ethical HackingDaniel GrahamNo Starch Press.
6Handbook Of Digital Forensics and InvestigationEoghan CaseyAcademic Press

14. SUGGESTED LEARNING WEBSITES
#

15. PO-COMPETENCY-CO MAPPING
#

Semester VICyber Security and Digital Forensic(CourseCode:4361601)Cyber Security and Digital Forensic(CourseCode:4361601)Cyber Security and Digital Forensic(CourseCode:4361601)Pos and PSOsCyber Security and Digital Forensic(CourseCode:4361601)Cyber Security and Digital Forensic(CourseCode:4361601)Cyber Security and Digital Forensic(CourseCode:4361601)
Competency & Course OutcomesPO 1 Basic & Discipline specific knowledgePO 2 Problem AnalysisPO 3Design/dev elopment of solutionsPO 4 Engineering Tools, Experimentation & TestingPO 5 Engineering practices for society ,sustainability & environmentPO 6 Project Managemen tPO 7 Lifelong learnin g
Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.Competency • Enhance knowledge of the latest cyber security threats, attacks, crimes and technologies for prevent them. • Demonstrate advanced practical skills in hacking tools and cybercrime investigation.
Course Outcomes CO a) Gain knowledge of information security, including Cryptography and hashing techniques.1--1--1
CO b) Explain the different types of network and system security techniques and threats-211--2

Cyber Security and Digital Forensic Course Code: 4361601

CO c) Understand the different types cybercrimes and Analyse cybercrime.-312113
CO d) Implement ethical hacking tasks using Kali Linux, including vulnerability scanning, penetration testing.1312213
Co e) Explain how digital forensics methodologies use for investigate cybercrimes-213212

Legend: ’ 3’ for high,’ 2 ’ for medium, ‘1’ for low or ‘-’ for the relevant correlation of each competency, CO, with PO/ PSO

16. COURSE CURRICULUM DEVELOPMENT COMMITTEE
#

GTU Resource Persons
#

Sr. No.Name and DesignationInstituteEmail
1Vikas H. SitaparaL.E College (Diploma), Morbivikas9mobile@gmail.com
2Jaydeep R. TadhaniGovernment Polytechnic, Rajkotjay.it2011@gmail.com
3Snehalkumar I. PateGovernment Polytechnic for Girls, Ahmedabader.patelsnehal@gmail.com