Posts

SPY 2008 Ethical Hacking 3

Course Main Objective(s):   Basics of the ethical hacking Foot printing and scanning Techniques for system hacking Malware and their attacks and detect and prevent them Signature of different attacks and prevent them Detect and prevent the security attacks in different environments     Mid Term 1: (Assignment Due Date: ) Assignment 1:   Assignment 2:   Week Date Lecture Slides Lab Slides Additional Resources 1 Week 1 2 Week 2 & 3 3 Week 4 & 5 4 Week 5 5 Week 6 & 7 6 Week 8 & 9 7 Week 10 8 Week  9 Week  10 11 12 13

SPY 2010 Digital Forensics 2

The course on advanced digital evidence collection and analysis techniques covers a range of topics, including advanced techniques and tools for digital evidence acquisition, preservation, analysis, and presentation; cybercrime investigations and prosecution; legal and ethical issues in cyber forensics; advanced malware analysis and reverse engineering; memory forensics and analysis; cloud forensics and virtualization; mobile device forensics; industrial control system (ICS) forensics; emerging trends and challenges in cyber forensics; and case studies and practical applications of cyber forensic techniques. The course aims to equip students with advanced knowledge and skills in digital evidence collection and analysis techniques used in cyber forensic investigations, as well as the ability to apply legal and ethical principles to conduct cyber forensic investigations and solve complex cyber forensic challenges. Mid Term 1:  (Assignment Due Date: ) Assignment 1: Assignment 2: Week ...

SPY 2005 Digital Forensics 1

The course on digital forensics and its applications in cybersecurity covers a range of topics including an introduction to digital forensics, computer and network architecture, digital evidence collection and preservation, file systems and disk analysis, network forensics and traffic analysis, malware analysis and reverse engineering, incident response and digital forensics, basic cryptography, operating system forensics, and anti-forensics techniques. The course aims to equip students with the knowledge and skills necessary to conduct a forensic investigation of digital devices and networks in the context of cybersecurity.   Mid Term 1: 13th April 2025 at 12:30 PM (Assignment Due Date: 24th April 2025) Assignment 1:   Link Assignment 2:   Link Week Date Lecture Slides Lab Slides Additional Resources 1 Week 1 2 Week 2 3 Week 3 Lab Experiments 4 Week 4 5 Week 5 6 Week 6  7 Week 7 8 Week 8 9 Week 9 10 Week 10 11 12 13 14 15 16 17