Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Information Security and Cyber Forensics

Devi Ahilya Viswavidyalaya, Indore and CEC via Swayam


Information and Technology are not only words now, today these two words are drivers of change and growth throughout the world. Today’s society is knowledge driven society, in which technology is used as tool for creating, sharing and preserving knowledge. Information Technology along with communication technology (ICT) has become the backbone of socio economic activities and development.Digital India movement of the government has given an additional pace to penetration of ICT in the Indian society. With the use of internet, the world has now become a single village.Every development activity has its own cost and ICT is also not aloof of that. Internet and ICT has opened new ways of crime and the risk is increasing with the advancement and use of technology.There is an utmost need to increase awareness and imparting skills, in the Indian society, on the issues in the domain of Information Security. There is a need to understand the relationship of information security, digital forensics and cyber laws.This course is designed with the aim to create awareness, extend education and prepare the base for further studies in the area of information security, digital forensics and cyber laws.The course will be focusing on information systems, information security, security threats and risks, computer crimes, data security and backup, importance of digital forensic, issues in computer and mobile forensic and cyber laws in detail.


Week Module No Title of the Module

1 1 Introduction to Data

2 Classification of Data

3 Database Management System (DBMS)

4 Information, Knowledge, Need and Importance of Information Part-1

5 Information, Knowledge, need and importance of Information part-2

2 1 Information system

2 Conceptual Framework of Information Systems

3 Types of Information System Part – 1

4 Types of Information System Part – 2

3 1 Development of Information Systems Part -1

2 Development of Information Systems Part -2

3 Introduction to Information Security Part - 1

4 Introduction to Information Security Part - 2

4 1 Security Threats

2 Malicious Software Part-1

3 Malicious Software Part-2

5 1 Network and Denial of Services Attack

2 An Overview of Computer Crimes

3 Types of Cyber Crime Part-1

4 Types of Cyber Crime Part-2

6 1 E-Commerce Attacks

2 Security Technologies Part-1

3 Security Technologies Part-2

4 Security Protocols

7 1 Data Backup, Archival Storage and Wiping of Data

2 Introduction of Digital Forensics

3 Need and importance of Digital Forensics

4 Confiscation and Seizing of Media

8 1 Extraction of information from the media

2 Restoration of deleted files

3 Ethical Password cracking

4 Ethical E-mail tracking

9 1 Legal and Privacy Issues

2 Anti-Forensic

3 Digital Forensics and Case Studies

4 Introduction to Mobile Forensics

10 1 Tools and Techniques used for Mobile Forensics Part - 1

2 Tools and Techniques used for Mobile Forensics Part -2

3 Cyber Laws Internationally

4 Cyber Laws in India

11 1 IT Act 2000 and IT Act2008

2 Copyright Act

3 Patent Law

4 Intellectual Property Law

12 1 Case Studies: Cyber Law

2 Career Building in Information Security

3 Careers in Cyber Forensics

Taught by

Prof. Pratosh Bansal



Start your review of Information Security and Cyber Forensics

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.