COMPUTER & CYBER FORENSICS

COURSE CONTENTS

MODULE 1

Computer fundamentals

covers the operating system, CPU, RAM, and hard drive, which manage and store data. Software includes programs, while networks and the internet enable data sharing and connectivity. Security is maintained with firewalls, and understanding viruses and cloud computing is crucial for effective computer use.

Fundamentals of Internet & Computer Network

essential concepts such as protocols, IP addressing, routing, and network security. Students learn how data is transmitted across networks, the role of routers and switches, and different network topologies. The course also explores internet architecture, DNS, and basics of network troubleshooting. Understanding these fundamentals is crucial for navigating the complexities of modern communication and connectivity.

Hardware/Software/Applications

Hardware encompasses the physical components of a computer, like the CPU and hard drive. Software consists of instructions that manage these components, including the operating system. Applications are specific software programs designed for tasks like word processing and web browsing, making computers versatile tools for various uses.

MODULE 2

Introduction of Web application

introduces students to the basics of web development, covering HTML, CSS, JavaScript, and server-side programming. The course focuses on designing, building, and deploying dynamic web applications, emphasizing user experience and responsive design. Students learn essential concepts such as databases, web frameworks, and security practices to create functional and secure web applications.

Network protocols & Layers

The module provides foundational understanding of communication protocols and the OSI model layers, essential for comprehending network architecture and operations.

MODULE 3

LINUX ESSENTIALS AND SHELL SCRIPTING

provides comprehensive knowledge and practical skills for utilizing the Linux operating system and writing efficient shell scripts to automate tasks and enhance productivity.

ETHICAL HACKING/PENETRATION TESTING

Ensures theoretical understanding and practical skills for assessing and fortifying cyber security by simulating real-world cyber attacks in a controlled and ethical manner.

INTELLIGENCE GATHERING

 involves implementing multiple ways to execute Open source, Active and Passive Intelligence Gathering and Wireless Penetration Testing methods