Information and Technology are not only words now, today these two words are drivers of change and growth throughout the world. Today’s society is knowledge driven society, in which technology is used as tool for creating, sharing and preserving knowledge. Information Technology along with communication technology (ICT) has become the backbone of socio economic activities and development.
Digital India movement of the government has given an additional pace to penetration of ICT in the Indian society. With the use of internet, the world has now become a single village.
Every development activity has its own cost and ICT is also not aloof of that. Internet and ICT has opened new ways of crime and the risk is increasing with the advancement and use of technology.
There is an utmost need to increase awareness and imparting skills, in the Indian society, on the issues in the domain of Information Security. There is a need to understand the relationship of information security, digital forensics and cyber laws.
This course is designed with the aim to create awareness, extend education and prepare the base for further studies in the area of information security, digital forensics and cyber laws.
The course will be focusing on information systems, information security, security threats and risks, computer crimes, data security and backup, importance of digital forensic, issues in computer and mobile forensic and cyber laws in detail.
Week Module No Title of the Module
1 1 Introduction to Data
2 Classification of Data
3 Database Management System (DBMS)
4 Information, Knowledge, Need and Importance of Information Part-1
5 Information, Knowledge, need and importance of Information part-2
2 1 Information system
2 Conceptual Framework of Information Systems
3 Types of Information System Part – 1
4 Types of Information System Part – 2
3 1 Development of Information Systems Part -1
2 Development of Information Systems Part -2
3 Introduction to Information Security Part - 1
4 Introduction to Information Security Part - 2
4 1 Cyber Security, and Security Risk Analysis
2 Security Threats
3 Malicious Software Part-1
4 Malicious Software Part-2
5 1 Network and Denial of Services Attack
2 Definition and Types of Computer Crimes
3 Types of Cyber Crime Part-1
4 Types of Cyber Crime Part-2
6 1 E-Commerce Attacks
2 Data security technologies Part 1
3 Data security technologies Part 2
4 Data security Practices
7 1 Data Backup, Archival Storage and Wiping of Data
2 Introduction of Digital Forensics
3 Need and importance of Digital Forensics
4 Confiscation and Seizing of Media
8 1 Extraction of information from the media
2 Restoration of deleted files
3 Ethical Password cracking
4 Ethical E-mail tracking
9 1 Legal and Privacy issues
3 Digital Forensics and Case Studies
4 Introduction to Mobile Forensics and Issues in Mobile Forensics
10 1 Techniques and Tools for Mobile Forensics Part - 1
2 Techniques and Tools for Mobile Forensics Part - 2