COMPUTER & CYBER FORENSICS
COURSE CONTENTS
MODULE 1
Computer fundamentals
covers the operating system, CPU, RAM, and hard drive, which manage and store data. Software includes programs, while networks and the internet enable data sharing and connectivity. Security is maintained with firewalls, and understanding viruses and cloud computing is crucial for effective computer use.
Fundamentals of Internet & Computer Network
essential concepts such as protocols, IP addressing, routing, and network security. Students learn how data is transmitted across networks, the role of routers and switches, and different network topologies. The course also explores internet architecture, DNS, and basics of network troubleshooting. Understanding these fundamentals is crucial for navigating the complexities of modern communication and connectivity.
Hardware/Software/Applications
Hardware encompasses the physical components of a computer, like the CPU and hard drive. Software consists of instructions that manage these components, including the operating system. Applications are specific software programs designed for tasks like word processing and web browsing, making computers versatile tools for various uses.
MODULE 2
Introduction of Web application
introduces students to the basics of web development, covering HTML, CSS, JavaScript, and server-side programming. The course focuses on designing, building, and deploying dynamic web applications, emphasizing user experience and responsive design. Students learn essential concepts such as databases, web frameworks, and security practices to create functional and secure web applications.
Network protocols & Layers
The module provides foundational understanding of communication protocols and the OSI model layers, essential for comprehending network architecture and operations.
MODULE 3
LINUX ESSENTIALS AND SHELL SCRIPTING
provides comprehensive knowledge and practical skills for utilizing the Linux operating system and writing efficient shell scripts to automate tasks and enhance productivity.
ETHICAL HACKING/PENETRATION TESTING
Ensures theoretical understanding and practical skills for assessing and fortifying cyber security by simulating real-world cyber attacks in a controlled and ethical manner.
INTELLIGENCE GATHERING
involves implementing multiple ways to execute Open source, Active and Passive Intelligence Gathering and Wireless Penetration Testing methods