Course Objectives:

  1. To learn the overview of cybercrime. 
  2. To learn the issues of cybercrime.
  3. To learn the various methods to investigate cybercrime and learn about digital forensics. 
  4. To understand the laws and acts behind.

Unit I

Introduction: Overview of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber Crime, Social Engineering, Categories of Cyber Crime, Property Cyber Crime. Unauthorized Access to Computers, Computer Intrusions, White collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Pornography, Software Piracy, Intellectual Property, Mail Bombs, Exploitation ,Stalking and Obscenity in Internet, Digital laws and legislation, Law Enforcement Roles and Responses.

Click on any topic to read about the topic.

Unit II

Introduction to Digital Forensics: Forensic Software and Hardware, Analysis and Advanced Tools, Forensic Technology and Practices, Forensic Ballistics and Photography, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics, Linux System Forensics, Network Forensics.

Click on any topic to read about the topic.

Unit III

Introduction to Cyber Crime Investigation Investigation Tools, eDiscovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, Email Recovery, Hands on Case Studies, Encryption and Decryption Methods, Search and Seizure of Computers, Recovering Deleted Evidences, Password Cracking.

Click on any topic to read about the topic.

Unit IV

Cyber Laws and Ethics: Digital Evidence Controls – Evidence Handling Procedures – Basics of Indian Evidence ACT IPC and CrPC – Electronic Communication Privacy ACT – Legal Policies. Digital, Indian IT Act

Click on any topic to read about the topic.


  1. Bernadette H Schell, Clemens Martin, Cybercrime, ABC , CLIO Inc, California, 2004.
  2. Understanding Forensics in IT , NIIT Ltd, 2005.
  3. Nelson Phillips and Enfinger Steuart, Computer Forensics and Investigations, Cengage Learning,   New Delhi, 2009.
  4. Kevin Mandia, Chris Prosise, Matt Pepe, Incident Response and Computer Forensics, Tata McGraw -Hill, New Delhi, 2006.
  5. Robert M Slade, Software Forensics, Tata McGraw – Hill, New Delhi, 2005.

Course Outcomes:  After successful completion of the course, students will be able:-

  1. To have various ideas about cybercrime. 
  2. To have knowledge of the various issues of cybercrime. 
  3. To investigate and find the cybercrime.
  4. To have clear idea of the various laws and acts.
error: You can only copy the programs code and output from this website. You are not allowed to copy anything else.