UNIT I INTRODUCTION TO COMPUTER FORENSICS Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation - Data Acquisition. (Chapter - 1) UNIT II EVIDENCE COLLECTION AND FORENSICS TOOLS Processing Crime and Incident Scenes - Working with Windows and DOS Systems. Current Computer Forensics Tools: Software/ Hardware Tools. (Chapter - 2) UNIT III ANALYSIS AND VALIDATION Validating Forensics Data - Data Hiding Techniques - Performing Remote Acquisition - Network Forensics - Email Investigations - Cell Phone and Mobile Devices Forensics. (Chapter - 3) UNIT IV ETHICAL HACKING Introduction to Ethical Hacking – Foot printing and Reconnaissance - Scanning Networks - Enumeration - System Hacking - Malware Threats - Sniffing. (Chapter - 4) UNIT V ETHICAL HACKING IN WEB Social Engineering - Denial of Service - Session Hijacking - Hacking Web servers - Hacking Web Applications - SQL Injection - Hacking Wireless Networks - Hacking Mobile Platforms. (Chapter - 5)