M.SC - 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

RASHTRIYA RAKSHA UNIVERSITY

An Institution of National Importance under Ministry of Home Affairs, Govt. of India


(Pioneering National Security and Police University of India)
Lavad, Dehgam, Gandhinagar-382305, Gujarat, India

Syllabus and Examination Evaluation Scheme


as per Choice Based Credit System (CBCS)
(For the candidates to be admitted from the academic year 2020 - 2021 onwards)

Name of the School SCHOOL OF INFORMARTION TECHNOLOGY,


ARTIFICIAL INTELLIGENCE AND CYBER SECURITY

Name of the Programme MASTER OF SCIENCE IN DIGITAL FORENSICS

Syllabus Approval Granted as per  Minutes of Board of Studies Meeting of School of Information
Technology, Artificial Intelligence and Cyber Security dated on
06th June 2021.


Programme Coordinator Vivek Joshi
Assistant Professor
School of Information Technology, Artificial Intelligence and
Cyber Security
Rashtriya Raksha University, Lavad-Dehgam, Gandhinagar-
382305, Gujarat, India
Programme Structure
RASHTRIYA RAKSHA UNIVERSITY
(An Institution of National Importance)
Lavad, Dehgam, Gandhinagar-382305, Gujarat, India

Name of the School: SCHOOL OF INFORMARTION TECHNOLOGY, ARTIFICIAL INTELLIGENCE AND


CYBER SECURITY
Name of the Programme: (Approved as per Academic Council)
MASTER OF SCIENCE IN DIGITAL FORENSICS
Short Name: M.Sc. DF (Under the Centre for Post Graduate Legal Studies)
TEACHING AND EXAMINATION SCHEME
Programme Master of Science Specialization Digital Forensics

Semester I

Programme Two Year Programme


Duration
Effective from Academic 2021 Effective for the batch Admitted in September 2021
Year
Teaching scheme Examination scheme
Code Subject (Marks)
Name Credit Hours (per week) Theory Practical/
Viva
Examinati
on
Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total

Core Compulsory Papers


1A01OPS Operating 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Systems
1A02CIR Cyber 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Security
Management
and Incident
Response
1A03MON Modern 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Networks

1A04FDF Fundamental 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

of Digital
Forensic
1A05ISC Information 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Security
and
Cryptography

1A06PYP Python 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

programming

TOTAL 18 0 18 6 6 18 0 18 12 12 180 420 600 120 180 300

Semester II

Teaching scheme Examination scheme


Code Subject (Marks)
Name Credit Hours (per week) Theory Practical

Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total
2A07SET Server 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Technologies

2A08SRC Security 3 1 4 0 0 3 2 5 0 0 30 70 100 20 30 50

Auditing,
Risk and
Compliance
2A09ADF Advanced 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Digital
Forensic
Analysis

2A10NFA Network 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Security
and
Forensic
Analysis
2A11IPR Cyber Laws 3 1 4 0 0 3 2 5 0 0 30 70 100 20 30 50

and
Intellectual
Property
Rights
Open/General Elective Papers

University Elective Total Credit:2


TOTAL 15 2 17 3 3 15 4 19 6 6 150 350 500 100 150 250

Semester III

Teaching scheme Examination scheme


Code Subject (Marks)
Name Credit Hours (per week) Theory Practical

Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total

3A12RMA Reverse 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Engineering
and Malware
Analysis
3A13MDF Machine 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50

Learning for
Digital
Forensics
3A15MPR Mini 0 0 0 06 06 0 0 0 12 12 0 0 0 100 150 250

Project
(Phase 1)
Complimentary/Discipline Specific Elective Courses
3B14PPL/ Elective: 3 0 3 1 1 3 0 3 2 2 30 70 100 20 30 50
3B14SMA/ Python
3B14MMF
programmi
ng with
libraries/So
cial Media
Analysis/
Multimedia
Forensics
Open/General Elective Papers
University Elective* Total Credit: 4
University Elective* Total Credit: 2
TOTAL 9 0 9 9 9 9 0 9 18 18 90 210 300 160 240 400

Semester IV

Teaching scheme Examination scheme


Code Subject (Marks)
Name Credit Hours (per week) Theory Practical

Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total

4A16PIN Project/ 0 0 0 12 12 0 0 0 24 24 0 0 0 150 300 450

Internship

TOTAL 0 0 0 12 12 0 0 0 24 24 0 0 0 150 300 450

Programme Structure

Semester I II III IV
Total Credits 24 22 24 12
Theory 600 500 300 00
Practical 300 250 400 450
Total Marks of Entire Programme 2900*

*Note: Not possible to reflect marks and credits breakdown for university electives as
student will opt for elective subjects from different schools in the University.
Syllabus
Semester-I
RASHTRIYA RAKSHA UNIVERSITY
(An Institution of National Importance)
Lavad, Dehgam, Gandhinagar-382305, Gujarat, India

SCHOOL OF INFORMARTION TECHNOLOGY, ARTIFICIAL


INTELLIGENCE AND CYBER SECURITY
Name of the Programme: (Approved as per Academic Council)
MASTER OF SCIENCE IN DIGITAL FORENSICS
Programme Master of Science Branch/Spec. Digital Forensics
Semester I Version I
Effective from Academic Year 2021 Effective for the batch Admitted in September
2021
Subject Code 1A01OPS Subject Name Operating Systems

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Fundamentals of Computer:
 Hardware & Software, System Architecture, CPU organization, ALU, registers,
memory, program execution at CPU and system level,
 Data representation: Number systems, character representation codes, Binary,
hex, octal codes and their inter conversions.
2 Basics of Operating Systems:
 Definition – Generations of Operating systems – Types of Operating Systems, 75
OS Service, System Calls, OS structure: Layered, Monolithic, Microkernel
 Operating Systems , Network OS, Mobile OS, Server OS and Client OS , Cloud
OS, Concept of Virtual Machine.
3 Process Management:
 Processes: Definition, Process Relationship, Process states, Process State
transitions, Process Control Block, Context switching – Threads –
 Concept of multithreads, Benefits of threads – Types of threads Process
Scheduling, Scheduling criteria, Scheduling algorithms.

4 Basic Memory Management:


 Definition Logical and Physical address map, Memory allocation: Contiguous
Memory allocation – Fixed and variable partition – Internal and External
fragmentation and Compaction,
 Paging: Principle of operation – Page allocation –– Disadvantages of paging.
Virtual Memory: Basics of Virtual Memory.
5 Basics of File System: Windows, Linux, MAC:
 Windows File System: FAT,NTFS,ExFAT.
 Linux: ext., ext2, ext3, ext4.
 Apple file system.(APFS).
6 Linux:
 Introduction to Shell scripting, writing a script, shell commands, decision making,
arithmetic operation, loop, conditional execution and executing a shell script in
Linux environment.
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 William Stallings Operating Systems Internals and Design Principles Ninth Edition By
Pearson.
 Andrew S Tanenbum, Modern Operating Systems, Prentice-Hall of India Pvt.Ltd
 Richard Petersen, Linux: The Complete Reference, Sixth Edition, McgrawHill.
 Dhananjay Dhamdhere Operating Systems a Concept Based Approach McGraw Hill
Education India
 Avi Silberschatz, Greg Gagne, and Peter Baer Galvin Operating System Concepts John
Wiley & Sons, Inc.
 Curt Schimel UNIX Systems for Modern Architectures 3rd edition Addison-Wesley

Subject Code 1A02CIR Subject Name Cyber Security Management and Incident Response

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Definition and types of cybercrimes, relation of general crimes to cybercrimes,
electronic evidence and handling, electronic media collection, searching and storage of
electronic media. Introduction to internet crimes, Dark web, Tor, Deep web, Credit
card and ATM frauds, White collar crimes, Cyber Criminals versus Cybersecurity
Specialists, Threats, Attacks, Digital Foot printing & Social engineering, Information
gathering methodologies, Competitive Intelligence, DNS Enumerations, Social
Engineering attacks.
2 Ethical Hacking terminology: Five stages of hacking, Vulnerability Research, Legal
implication of hacking, Impact of hacking, Password cracking techniques, Key loggers,
escalating privileges, Hiding Files, Steganography, The Cybersecurity Cube, Three
Dimensions of the Cybersecurity Cube,
3 The Principles of Security, Cybersecurity Safeguards, CIA Triad, Confidentiality, The
Principle of Confidentiality, Protecting Data Privacy, Controlling Access-Laws and
Liability Integrity: Principle of Data Integrity, Need for Data Integrity Checks,
Availability, The Principle of Availability, Ensuring Availability 75
4 Definitions of incident response, Need for Incidents Response, Goals for Incident
Response, Challenges faced by Incident Responder & Team, relation of incident
response to the rest of cybersecurity operations, incident response phases -
preparation, identification, containment, eradication, recovery, follow-up, indicators of
compromise (IOC), forensic analysis as an incident response tool and as support for
cybercrime investigations, cybersecurity forensics principles.
5 Incident Response and Handling Process; Step 1: Identification; Step 2: Incident
Recording; Step 3: Initial Response; Step 4: Communicating the Incident; Step 5:
Containment; Step 6: Formulating a Response Strategy; Step 7: Incident Classification;
Step 8: Incident Investigation; Step 9: Data Collection; Step 10: Forensic Analysis, Step
11: Evidence Protection; Step 12: Notify External Agencies; Step 13: Eradication; Step
14: System Recovery; Step 15: Incident Documentation; Step 16: Incident Damage and
Cause assessment; Step 17: Review and Update the Response Policies
6 Investigation Tools, e-discovery, EDRM Models, digital evidence collection and
preservation, email investigation, email tracking, IP tracking, email recovery
Intro IoT and IoT security issues, Intro Block Chain and it’s security issues, Into to
Cloud and it’s threats along with security issues.
Practical Content:
 10 -15 Practicals as per syllabus.

Reference Books:
 “Incident Response & Computer Forensics, Third Edition” by Jason T. Luttgens and
Matthew Pepe
 “Computer Incident Response and Forensics Team Management: Conducting a
Successful Incident Response”, by Leighton Johnson
 Baloch, R., “Ethical Hacking and Penetration Testing Guide”, CRC Press, 2015.
 Beaver, K., “Hacking for Dummies”, 3rd ed. John Wiley & sons., 2013

Subject Code 1A03MON Subject Name Modern Networks

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to Computer Networks
 Understanding of network and Internet, the network edge, the network core,
Understanding of Delay, Loss and Throughput in the packet-switching network,
protocols layers and their service model, History of the computer network.
Introduction to LAN - Devices, Topologies, Tools, Cables, Configuration
2 Application Layer
 Principles of computer applications, Web and HTTP, E-mail, DNS, Socket
programming with TCP and UDP
3 Transport Layer
 Introduction and transport layer services, Multiplexing and De-multiplexing,
75
Connection less transport (UDP), Principles of reliable data transfer, Connection
oriented transport (TCP), Congestion control.
4 Network Layer
 Introduction, Virtual and Datagram networks, study of router, IP protocol and
addressing in the Internet,IPV6, Routing algorithms, Broadcast and Multicast
routing Label Switching and MPLS, Software Defined Networking: SDN
Control Plane, SDN Data Plane
5 The Link layer and Local area networks
 Introduction and link layer services, error-detection and correction techniques,
Multiple access protocols, addressing, Ethernet, switches, VLANs
6 Security in Computer Networks
 End-Point Authentication, Securing E-Mail, Securing TCP Connections:
SSL/TLS Network-Layer Security: Network security Architecture, IPsec and
Virtual Private Networks, Securing Wireless LANs, IDS, IPS, Firewall, Types of
Firewall, DMZ, UTM
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 Computer Networking-A Top-Down approach, 5thedition, Kurose and Ross, Pearson
 Computer Networks (6th edition), Andrew Tanenbaum, Prentice Hall
 Computer Networking and the Internet (5thedition),Fred Halsall, Addison Wesley
 Data Communications and Networking (4th edition), Behrouz Forouzan, McGraw Hill

Subject Code 1A04FDF Subject Name Fundamentals of Digital Forensics

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to Digital Forensics, branches of digital forensics, digital evidence, Types
of Evidence, Chain of custody, types of Cyber Crime, types of cyber criminals, crime
scene management, evidence collection techniques - Switched Off System, Live System,
Live response and triage-based acquisition techniques, order of volatility.
2 Analysis of evidence, concept of imaging and cloning, file formats of forensic images,
concept of write blocker, Hardware and Software Write blocker, Hash Function, fuzzy
hash and hash collision, data recovery, tools for image creation and analysis.
75
3 Windows forensics – registry analysis, event log analysis, timestamp analysis, super
timeline creation and analysis, use of log2timeline and plaso, windows volume shadow
copy analysis, steganography, password cracking techniques.
4 MFT analysis, $Recycle bin forensics, $i30 analysis, other NTFS artifacts - $data,
$UsnJrnl, amcache, shimcache, shellbags, lnk files, jump lists, USB and Bring Your Own
Device (BYOD) Forensic Examinations, Incident response procedure, browser
forensics, printer artifacts, yellow dot concept in printer forensics.
5 Computer Networks, Distributed System, Backup, Recovery & Replication
6 Types of Cloud Computing Models, Cloud Architecture- Layers, Introduction to
VMWare Simulator, Cloud forensic techniques, reviewing cloud trail logs, data collection
and analysis techniques.
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
1  A Practical Guide to Computer Forensics Investigations Book by Darren R. Hayes

 Digital Evidence and Computer Crime: Forensic Science, Computers and Book by
Eoghan Casey

 Handbook of Digital Forensics and Investigation Book by Eoghan Casey

 The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and
Mac Memory1st Edition by Michael Hale Ligh , Andrew Case, Jamie Levy, AAron Walters.

 Guide to Computer Forensics and Investigations Book by Amelia Phillips, Bill Nelson,
and Christopher Steuart

Subject Code 1A05ISC Subject Name Information Security and Cryptography

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Cryptographic System, Classification of Cryptographic System, Secret Key ,
Cryptography, Cryptanalysis and Attacks, Importance of key, Symmetric Cipher Model,
Substitution and Transposition techniques, Substitution-Permutation Network.
2 Stream and block ciphers & their design principles, Traditional techniques: Caesar
cipher, Monoalphabetic and Polyalphabetic Cipher, Playfair Cipher, RailFence Cipher, 75
Vigenere Cipher, One-Time Pad, Hill Cipher with their analysis and applications.
3 Feistel structure, Block Ciphers with structure and applications: DES, Double DES,
Triple DES, AES; Stream Ciphers with structure and applications: LFSR, RC4; Modes
of Operation: ECB, CBC, CFB, CTR, OFB.
4 Public Key Cryptography, Operation of Public Key Cryptography, RSA algorithm,
Discrete Logarithm Problems, Diffie-Hellman algorithm, ElGamal algorithm, Concept
of digital signatures and Digital Signature Algorithm, Public key infrastructure, Concept
of Security Model.
5 Data Integrity, Hash Functions: MD5 algorithm structure and applications, SHA
algorithm structure and applications, Message Authentication Codes, Hash collisions,
Cyclic Redundancy Check.
6 Introduction to crypto currency, Need of Crypto currency, Block chain technologies,
Overview of Blockchain process and methodologies, Transactions, Mining, Fork,
Blockchain limitation and misconceptions. Emerging Applications: Kerberos, Email
Security, PGP, SMIME, SSL/TLS, Web Security, Introduction to Quantum
Cryptography.
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
  Cryptography and Network Security -- W. Stallings [Prentice Hall].
 Introduction to Cryptography with Coding Theory -- Washington & Trappe [Pearson]
 Introduction to Modern Cryptography -- Katz & Lindell [CRC press].

Subject Code 1A06PYP Subject Name Python programming

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to Python, The basic elements of python, Branching Programs, Control
Structures, Strings and Input, Iteration
2 Functions, Scoping and Abstraction, Specifications, Recursion, Global variables,
Modules, Files, System Functions and Parameters
3 Structured Types, Mutability and Higher-Order Functions, Strings, Tuples, Lists and
75
Dictionaries, Lists and Mutability, Functions as Objects
4 Testing, Debugging, Handling Exceptions and Assertions

5 Classes and Object-Oriented Programming, Abstract Data Types and Classes,


Inheritance, Encapsulation and Information Hiding
6 Advance concepts: Sockets, Threads and Processes, Chat Application, Graphics and
GUI Programming – Drawing using Turtle, Tkinter and Python, Other GUIs
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 John V Guttag. “Introduction to Computation and Programming Using Python”,
Prentice Hall of India
 R. Nageswara Rao, “Core Python Programming”, dreamtech
 Wesley J. Chun. “Core Python Programming - Second Edition”, Prentice Hall
 Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, “Data Structures
and Algorithms in Pyhon”, Wiley
 Kenneth A. Lambert, “Fundamentals of Python – First Programs”, CENGAGE
Publication
 Luke Sneeringer, “Professional Python”, Wrox
 “Hacking Secret Ciphers with Python”, Al Sweigart, URL-
https://inventwithpython.com/hacking/chapters
Semester-II
Semester II Version I
Subject Code 2A07SET Subject Name Server Technologies

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to servers, Client-Server model, Install and Configure Servers, Post- 75
Installation configuration, Troubleshooting server & configurations, Server
Management Overview.

2 Overview of ADDS, Domain Controllers, Install and Managing Active Directory


Domain Service Objects, Configure client server communication and related
services.

3 Configure and Manage Group Policy on server, Group Policy configuration on


client, preferences, Overview of DHCP, Configuring and Managing DHCP,
Securing and Monitoring DHCP, Name Resolution, Installing and Managing
DNS.
4 Configure file server, Protecting Shared Files and Folders by Using Shadow
Copies, Printer and document services, Configuring Network Printing, Configure
Network services.

5 Deploy, manage and monitor server, Configure and Manage Hyper-V, Configure
and manage IIS and Authentication services, Need for high availability of servers,
Basics of Load Balancing & Failover Clustering, Virtual Machine Migration.

6 Need of Business continuity and Disaster Management, Configuring and


managing back-ups, Need for Identity and Access Solutions, Introduction to
RAID servers.

 10 -15 Practicals as per syllabus.


Reference Books:
1  MCSA Windows Server 2016 Complete Study Guide: Exam 70-740, Exam 70-741,
Exam 70-742, and Exam 70-743 -- William Panek [Sybex].

Subject Code 2A08SRC Subject Name Security Auditing, Risk and Compliance

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 02 00 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code 75
of Professional Ethics and other applicable standards. Risk assessment concepts
and tools & techniques used in planning, examination, reporting and follow-up.

2 Fundamentals of business processes: Purchasing, Payroll, Accounts payable,


accounts receivable, Role of IS in these processes. Control Principles related to
controls in information systems.
3 Risk-based audit planning and audit project management techniques. Applicable
laws and regulations that affect the scope, evidence collection and preservation,
and frequency of audits.

4 Evidence Collection Techniques: Observation, Inquiry, Inspection, Interview,


Data Analysis, Forensic Investigation Techniques, Computer-assisted audit
techniques [CAATs] used to gather, protect and preserve audit evidence.

5 Sampling methodologies and substantive/data analytical procedures. Reporting


and Communication techniques: Facilitation, Negotiation, Conflict Resolution,
Audit report structure, issue writing, management summary, result verification.
Audit Quality assurance (QA) systems and frameworks.
Various types of audits : Internal, External, Financial, and methods for assessing
and placing reliance on the work of other auditors and control entities.
6 Introduction to information auditing standards, ISO 27000, ISO 27001
implementation, GDPR, HIPPA, PCIDSS, process of auditing information
systems, information security program development and incident management,
Risk management and compliance, Introduction to Data privacy bill India
PDPA. Audit WRT Forensics: investigating website hacking, Data Breach
Investigation.
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
1  “Auditor’s Guide to IT Auditing” by Richard E. Cascarino
 “IT Audit, Control, and Security” by Robert R. Moeller
 “Human-Computer Interaction and Cybersecurity Handbook” edited by Abbas Moallem
 IT Auditing Using Controls to Protect Information Assets, Third Edition by Mike
Kegerreis, Mike Schiller, Chris Davis
 Auditing IT Infrastructures for Compliance (Information Systems Security & Assurance)
by Martin Weiss, Michael G. Solomon
 “The Information Audit: A Practical Guide”, Susan Henczel, Information Services
Management Series
 The Basics of IT Audit: Purposes, Processes, and Practical Information”, Stephen D.
Gantz, Syngress. 2014

Subject Code 2A09ADF Subject Name Advanced Digital Forensics

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100
Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Memory Forensics Examinations, Tools for memory acquisition, Identify Rogue 75
Processes, DLLs and Handles , Review Network Artifacts, Look for Evidence of Code
Injection, Check for Signs of a Rootkit, Acquire Suspicious Processes and Drivers,
Memory Analysis Techniques with Redline, Advanced Memory Analysis with Volatility,
Malware and Rootkit Hunting in Memory, Perform In-Memory Windows Registry
Examinations, Extract Typed Adversary Command Lines, Investigate Windows
Services, Hunting Malware using Comparison Baseline Systems, Dumping Hashes and
Credentials from Memory, Prefetch and Shimcache Extraction via Memory
2 Linux Installation and Package Management, GNU and Unix Commands, Devices,
Linux File systems, File system Hierarchy, Function of Kernel, Linux Kernel, Kernel
Makefiles, Introduction to Netcat, Use of netcat in forensics, Forensic tools in Linux,
File System Imaging
3 Live response using Linux distributions, use of kali Linux, D.E.F.T., SANS SIFT work
station, collecting volatile data – kernel version, login history, network connections,
running processes, loaded kernel modules, system logs, Dumping RAM, use of LiME,
volatility profiles
4 Detecting use mode rootkits, file carving, file system image analysis, use of the sleuth kit,
autopsy, bulk extractor, foremost, timeline analysis, reversing linux malware, digging
deeper into ELF
5 Smart phone forensics – Introduction to smart phone, smart phone components and
identifiers, forensic impact of flash memory, preserving smartphone evidence, forensic
acquisition process, logical, file system and physical acquisition, introduction to forensic
tools for smartphone, android memory capturing, introduction to JTAG technology,
ISVS and chip off technology
6 Introduction to cellular network, different cellular networks – GSM, GPRS, EDGE,
UMTS, LTE, VOLTE Generations and evolution of cellular network, structure of
mobile phone cellular network, cell site (base transceiver station)
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 A Practical Guide to Computer Forensics Investigations Book by Darren R. Hayes
 Digital Evidence and Computer Crime: Forensic Science, Computers and Book by
Eoghan Casey
 Handbook of Digital Forensics and Investigation Book by Eoghan Casey
 Windows Forensics and Incident Recovery PAP/CDR Edition by Harlan Carvey

Subject Code 2A10NFA Subject Name Network Security and Forensics Analysis
Teaching scheme Examination scheme (Marks)
(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Configuring Your Target Machines and Setup of Your Lab Environment, The 75
Absolute Basics of Penetration Testing, Intelligence Gathering, Vulnerability
Scanning, The Joy of Exploitation, Meterpreter, Avoiding Detection, Exploitation
Using Client-side Attacks
2 Metasploit Auxiliary Modules, The Social-Engineer Toolkit, Fast-Track, Building,
Porting Exploits to the Metasploit Framework, Meterpreter Scripting, Simulated
Penetration Test, Information Gathering
3 Wireless network forensic, event log aggregation, correlation and analysis, switches,
routers, web proxies, honeypots analysis, File Transferring (Tools & Payloads)

4 Privilege Escalation, Backdoors, Data Transmit, Anti Forensic , TOR, Darkweb, VPN
analysis
5 Introduction to IoT devices, IoT Use cases and issues in various areas, IoT network log
analysis, IoT forensics
6 Introduction to Logs, Log Analysis Theory, Defining Log Data, System Audit
Polices, Network Activity Logging, Log Sources, Log Analysis Process, Log Analysis
Tools, Lab: System Log Files, Network, Log Correlation, Log Manipulation
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
Metasploit for Beginners: Create a threat-free environment with the best-in-class tool
Metasploit: The Penetration Tester's Guide by David Kennedy

Subject Code 2A11IPR Subject Name Cyber Law and Intellectual Property Right

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 01 00 04 Theory 30 70 100

Hours 03 02 00 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to Information technology & Cyber Law, Basics of E-commerce and 75
Computer Fraud Techniques Cyber Security Fundaments, Techniques and Core
Principles, IT Rule 2011
2 Cyber Space, Technology & Issues, Regulating Cyber Space: International, National, E-
contract & Electronic Data Interchange, Cyber security policy 2013, Stake Holders of
Cyber Security (NPCA, CERT, NTRO, Defense CERT, , NCIIPC)Protection to critical
Industries.
3 E-signature and E-governance legality under I.T. Act,2000, Cyber Contraventions,
Compensation & Crimes under I.T. Act,2000,ISPs and Websites Legal Liability under
I.T. Act,2000,Corporate Legal Liability, Adjudication Process For Recovery of Losses
under I.T.Act,2000
4 IPR & Cyber Space, Taxation Issues in Cyber Space, IT Act and its relation with Income
Tax Law
5 IT Act and its relation with Indian Penal Code, Case Studies and Case Laws, Relevant
section of other Acts such as IPC, CrPC, Indian Evidence ACT etc
6 Blocking websites, telephone tapping, packet sniffing, Dark web monitoring, social
media monitoring
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 “Cyber Security (with CD): Understanding Cyber Crimes, Computer Forensics and Legal
Perspectives” by Nina Godbole , Sunit Belapure.
 “Cyber Laws & Information Technology” by Dr. Jyoti Rattan
 Cyber Crimes & laws by Taxman and Technology decoded by N.S.Nappani .
Semester-III
Semester III Version I
Subject Code 3A012RMA Subject Name Reverse Engineering and Malware Analysis

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to Reverse Engineering 75
Introduction to x86 and x64 Architecture: Register Set and Data Types, Data
Movement, Canonical Address, Function Invocation
2 Reverse Engineering
Windows Kernel: Windows Fundamental, Survey of Obfuscation techniques,
Piracy and Copy Protection, Deep Web and Dark Net, Anti Reversing
Techniques
3 Basic Static Malware Analysis
Introduction to Malware, Types of malware – Virus, Worm, Trojan, Backdoor,
Ransomware, The Goals of Malware Analysis, Malware Analysis Techniques,
Basic Static Techniques: Hashing, Finding Strings, Packed and Obfuscated
Malware, Portable Executable File Format, Linked Libraries and Functions, PE
File Header and Sections, Virtual Machines for Malware Analysis
4 Advanced Static Malware Analysis
Introduction to x86 Disassembly: Architecture, Main Memory, Instructions,
Opcodes and Endianness, Operands, Registers, Simple Instructions, Stack,
Conditionals, Branching, Analyzing Malicious Windows Programs: Windows
API, Windows Registry, Networking APIs, Kernel vs User Mode, Native API.
5 Dynamic Malware Analysis
Basic Dynamic Analysis: Executing Malware Analysis in safe environment,
Monitoring with Process Monitor, Viewing Processes with Process Explorer,
Comparing Registry Snapshots with Regshot, Faking a Network, Packet Sniffing
with Wireshark.
6 Advanced Dynamic Malware Analysis
Debugging: Source Level vs Assembly Level Debuggers, Kernel vs User mode
Debugging, Using Debugger – OllyDbg/IDA Pro, Exceptions, Modifying
execution with Debugger, Malware Behavior: Reverse Shell, RAT, Botnet,
Process Injection, Hook Injection, APC Injection

 10 -15 Practicals as per syllabus.


Reference Books:
1  Michael Sikorski, Andrew Honig : Practical Malware Analysis - The Hands-On Guide to
Dissecting Malicious Software, 1st Edition
 Eldad Eilam : Reversing – Secrets of Reverse Engineering, Wiley Publishing

Subject Code 3A013MDF Subject Name Machine Learning for Digital Forensics

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to Machine Learning 75
Brief Introduction to Machine Learning Well Posed Learning Problems,
Motivation to Machine Learning, Applications of Machine Learning, Designing
a Learning System, Perspective and Issues in Machine Learning, Concept
Learning; Types of Machine Learning - Supervised Learning, Unsupervised
Learning, Reinforcement Learning
2 Dimensionality Reduction
Subset Selection, Shrinkage Methods, Principle Components Regression; Linear
Classification, Logistic Regression, Linear Discriminant Analysis; Optimization,
Classification-Separating Hyperplanes Classification
3 Supervised and Unsupervised Learning
 Naïve Bayes Classification: Fitting Multivariate Bernoulli Distribution, Gaussian
Distribution and Multinomial Distribution, K-Nearest Neighbors, Decision
Trees.
 Support Vector Machines: Hard Margin and Soft Margin, Kernels and Kernel
Trick, Evaluation Measures for Classification, Ensemble Models, k-means and
Hierarchical Agglomerative Clustering, Evaluation Measures for Clustering
4 Artificial Neural Network
Artificial Neural Networks (Early models, Back Propagation, Initialization,
Training & Validation), Parameter Estimation (Maximum Likelihood
Estimation, Bayesian Parameter Estimation), Decision Trees, Evaluation
Measures, Hypothesis Testing, Ensemble Methods, Graphical Model
5 Clustering
Clustering, Gaussian Mixture Models, Spectral Clustering; Ensemble Methods;
Learning Theory, Reinforcement Learning

6 Applications of Machine Learning in Natural Language Processing, Image &


Video Processing and Analysis, Computer Vision, Financial Data Processing
and Social Network Analysis
Data analysis using machine learning for forensic expert, social media and
machine learning, malware analysis using ML, HIDS, NIPS based analysis
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
1  Tom Mitchell, Machine Learning, TMH
 C. Bishop, Pattern Recognition and Machine Learning, Springer
 R. O. Duda, P. E. Hart and D. G. Stork, Pattern Classification and Scene Analysis, Wiley
 Kishan Mehrotra, Chilukuri Mohan and Sanjay Ranka, Elements of Artificial Neural
Networks, Penram International
 Rajjan Shinghal, Pattern Recognition, Techniques and Applications, OXFORD
 Athem Ealpaydin, Introduction to Machine Learning, PHI
 Andries P. Engelbrecht, Computational Intelligence - An Introduction, Wiley Publication
 Prince , Computer Vision: Models, Learning, and Inference, Cambridge University Press,
Theodoridis and Koutroumbas

Subject Code 3B14PPL Subject Name Python programming with libraries

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 04 00 01 04 Theory 30 70 100
Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Introduction to Digital Forensics, Setting up python Forensic Environment, Forensic 75
searching and indexing, Forensic evidence extraction, Forensic Time

2 IP and banner grabbing, Socket server Framework, building a Port Scanner, Building
an SSH Botnet, Keylogger, Brute force on various protocols

3 Using the Mechanize Library to Browse the Internet, Scraping Web Pages, Parsing
HREF Links with Beautiful Soup, Mirroring Images with Beautiful Soup

4 Network Traffic analysis fundamentals, Using PyGeoIP to Correlate IP to Physical


Locations, Using DPKT to Parse Packets, Analysing LOIC Traffic, Using DPKT to
Find the LOIC, Parsing IRC Commands to the Hive, Identifying the DDoS Attack in
Progress
5 Network Forensics Analysis of Wireless Access Points in the Registry, Using WinReg
to Read the Windows Registry, Using Mechanize to Submit the MAC
Address to Wigle
6 Using Python to Recover Deleted Items in the Recycle Bin, Using the OS Module to
Find Deleted Items, Using PyPDF to Parse PDF Metadata, Understanding EXIF
Metadata, Downloading Images with BeautifulSoup, Investigating Application Artifacts
with Python, Understanding the Skype Sqlite3 Database, Sqlite3 to Automate Skype
Database Queries
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 Mastering Python for Networking and Security, by Justin Seitz
 Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and
Security Engineers, by TJ O'Connor Hands-On Machine Learning for Cyber Security,
Book by Sinan Ozdemir and Som

Subject Code 3B14MMF Subject Name Multimedia Forensics

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 Physics Of Sound: Waves And Sound, Analysis And Synthesis Of Complex Waves, 75
Human And Non-Human Utterances, Anatomy Of Vocal Tract, Speech And Noise
Characteristics, Audio Clarification Principles, Difference Between Language And
Speech, Collection Of Voice Sample
2 Various Approaches In Forensic Speaker Identification, Instrumental Analysis Of
Speech Sample, Interpretation Of Result, Speech Recognition And Speaker
Identification, Voice Authentication, Tools And Software Used In Audio Analysis,
Noise Reduction Tools, Authenticity Of Audio Evidence In Courtroom, Basics of VoIP
technology.
3 Introduction to video technology, different video formats, video recording devices, Legal
concepts regarding Digital Multi-Media Evidence, Scientific methodology of forensic
video analysis: Best practices of collection, recovery, enhancement, analysis and
interpretation of video evidence, Authentication of video as an evidence.
4 Basics of CCTV and DVR, best practices of CCTV evidence retrieval and storage at
scene of crime and laboratory, challenges and precaution at the scene of crime, evidence
handling procedure, Analysis of CCTV recordings, legal issues.
5 Collecting voice sample for analysis, Analysis of voice sample for authentication, Speaker
identification from sample, Video recording of crime scene, Video analysis and
authentication.
6 Metadata analysis of Audio / Video/image file, evidence handling, Case studies.

Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 Cory Altheide, Harlan Carvey, Digital Forensics with Open Source Tools, Syngress
imprint of Elsevier.
 Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer Forensics and
Investigations”, Fourth Edition, Course Technology.
 Angus M.Marshall, “Digital forensics: Digital evidence in criminal investigation”, John –
Wiley and Sons, 2008.

Subject Code 3B14SMA Subject Name Social Media Analysis

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 03 00 01 04 Theory 30 70 100

Hours 03 00 02 05 Practical 20 30 50

Content:
Unit Subject Content Hrs
1 What is Online Social Networks, data collection from social networks, challenges, 75
opportunities, and pitfalls in online social network, Cybercrimes related to social media
and its awareness, scrapping of data from social media API’s.

2 Information privacy disclosure, revelation and its effects in OSM and online social
networks, Privacy issues related to location based services on OSM.
3 Tracking social footprint / identities across different social network, Identifying
fraudulent entities in online social networks, Effective and usable privacy setting and
policies on OSM, Policing & OSM.
4 Social Media Forensics: Case Studies Open Source tools or social media analytics, Safety
on social media.
5 Detection and characterization of spam, phishing, frauds, hate crime, abuse and
extremism via online social media, Data Collection & Analysis, Fake News & content on
social media
6 Legal Issues in world social media, Information Technology (Intermediary Guidelines
and Digital Media Ethics Code) Rules, 2021
Practical Content:
 10 -15 Practicals as per syllabus.
Reference Books:
 Social Media Analytics: Effective Tools for Building, Interpreting, and Using Metrics
 Social Network Analysis: Methods and Application by Katherine Faust and Stanley
Wasserman.
 Understanding Social Networks: Theories, Concepts by Charles Kadushin
 Social Media Data Extraction and Content Analysis by Shalin Hai-Jew

Subject Code 3A15MPR Subject Name Mini Project

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 00 00 06 06 Theory 00 00 00
Hours 00 00 12 12 Practical 100 150 250

Semester-IV
Semester IV Version I
Subject Code 4A16PIN Subject Name Project/Internship

Teaching scheme Examination scheme (Marks)


(Per week) Lecture Practical Total INT EXT Total
(Lab.)
L TU P
Credit 00 00 12 12 Theory 00 00 00

Hours 00 00 24 24 Practical 150 300 450


Examination Evaluation Scheme as per Choice Based Credit System (CBCS)
RRU is gearing up for several initiatives towards academic excellence, quality improvement and
administrative reforms. In view of this priority and in-keeping with RRU Vision and Mission; process was
already initiated towards introduction of semester system, grading system and credit system. The above
initiatives acquired further strength with UGC Circular D. O. No. F.1-2/2008(XI Plan) dated March 2009
informing all the Universities regarding UGC’s new initiatives under the 11th Five Year plan, on speedy
and substantive academic and administrative reforms regarding higher education. Given this background
RRU has framed this “RRU CBCS REGULATION- 2021”. As the RRU has adopted this regulation, the
same will have to be implemented by all the Faculties of RRU for their academic Programmes. The
Evaluation scheme shall be follows as per
1. Examination Evaluation:
1.1 Continuous Internal Assessment (CIA)
The performance of a student in each course is evaluated in terms of percentage of marks with a
provision for conversion to grade points. Evaluation for each course shall be done by a continuous
internal assessment (CIA) by the concerned course teacher as well as by an end semester examination
and will be consolidated at the end of the course. The components for continuous internal assessment
are as follows.

MASTER LEVEL PROGRAMME (M.Sc D.F)


CONTINUOUS ASSESSMENT
Total
No Credit Internal Part External Part
Marks
Internal
Assessment
Seminar/
University
Group
Unit Practical/
Discussion/ External
Credits Test/Cl Total Marks Tutorial
Presentation Exam
ass Test /Viva
/Class
Examination
Activity
Assignments
/ Projects
150
1 4 Credits 30 20 50 30 70
Marks
Mini Project
2 100 150 250
6 Credits
Project/
3 Internship 150 300 450
12 Credits

1.2 Question Paper Pattern:


Each Question Paper will have total four questions as per the following table. Each Student shall have
to secure minimum 50% marks from External Examination for passing the subject. (i.e., 35 marks out of
70 marks).

MASTER LEVEL PROGRAMME (MSc.DF)


EXTERNAL EXAMINATION QUESTION PAPER PATTERN
Question Marks Pattern Extra Question
No.
1 15 Short Answer (5x3 Marks=15) 1
2 20 Long Answer (4x5 Marks =20) 1

3 15 Answer in detail (3x5 Marks=15) 1


4 20 Long Answer (4x5 Marks =20)) 1
Total 70

1.3 Passing Minimum:


The students shall be required cumulatively 50 % passing marks of the total marks of the individual
subject including both Internal Assessment and End Semester Examination. However, a student must
appear in End Semester Examination otherwise the student's result will be declared as absent for a
particular subject(s)."For the award of grade, calculation of CGPA and award of degree the candidate
must score a minimum SGPA of 5.0 in each semester separately.

1.4 Grading:
 The RRU adopts absolute grading system wherein the marks are converted to grades, and
every semester result will be declared with semester grade point average (SGPA) and
Cumulative Grade Point Average (CGPA). The CGPA will be calculated every semester,
except the first semester.
 The grading system is with the following letter grades as given below:

Marks Out of 100 Division/ Grade Point Letter Description


Class Grade
90 to 100 Distinction 10 O Outstanding
80 to <90 9 A+ Excellent
70 to <80 8 A Very Good
60 to <70 First 7 B+ Good
55 to <60 Second 6 B Above Average
50 to <55 Pass 5 C Pass
Less than 50 Fail 0 F Fail
Absent Ab 0 Ab Absent

 A student obtaining Grade “F” shall be considered failed and will be required to reappear in
the examination.
 Number of attempts taken to clear a subject/s shall be shown in the transcripts and grade
cards.

2. Declaration of Semester Results:


For Students, who have appeared both in the current Semester Examination and for their backlog
courses of the Previous Semesters and having result status as Fail-Detained in the previous
Semesters, the result of such students shall be declared as Fail-Detained instead of Withheld in the
current semester and the student shall be allowed to appear in the Remedial.
Students failing in the end semester examinations shall be given the option of either to appear in
remedial examination arranged by the University in which the marks obtained in the internal
examination shall be carried forward or opportunity shall be given to repeat the course in line with
the policy of detention due to lack of attendance in which student shall improve the internal marks.
Backlog: At any given point of time student can have maximum 4 backlogs.

2.1 Grade Point: Grade point is an integer indicating the numerical equivalent of the letter grade.
2.2 Credit Point (P): Credit point is the value obtained by multiplying the grade point (G) by the credit
(C): P = G x C.
2.3 Semester Grade Point Average (SGPA): Semester Grade Point Average (SGPA) is the value
obtained by dividing the sum of credit points (P) earned by a student in various courses taken in a
semester by the total number of credits earned by the student in that semester. SGPA shall be rounded
off to two decimal places.
2.4 Cumulative Grade Point Average (CGPA): ‘Cumulative Grade Point Average’ (CGPA) is the value
obtained by dividing the sum of credit points in all the courses earned by a student for the entire
programme, by the total number of credits. CGPA shall be rounded off to two decimal places. CGPA
indicates the comprehensive academic performance of a student in a programme.
An overall letter grade (Cumulative Grade) for the entire programme shall be awarded to a student
depending on his/her CGPA.

2.5 Calculation of semester grade point average (SGPA) and cumulative grade point average
(CGPA):
 Performance in a semester will be expressed as Semester Grade Point Average (SGPA).
 Cumulative performance of all the semesters together will reflect performance in the whole
programme and will be known as Cumulative Grade Point Average (CGPA). Thus, CGPA
is the real indicator of a student’s performance.
 The formula for calculation of SGPA and CGPA is given below:
SGPA = (Ʃ Ci Mi) / (Ʃ Ci) CGPA = (Ʃ Ʃ Cni Gni) / (Ʃ Ʃ Cni) Where
Ci - number of credits for the ith course, Gi - grade point obtained in the ith course, Cni -
number of credits of the ith course of the nth semester, Gni - grade points of the ith course
of the nth semester
 Refer the following examples for better understanding of CGPA/SGPA.
Example:

SGPA Total credit points earned by a student in a Semester Total Credit

For Example: Semester - I


Marks Obtained Grade Grade Credit
Course Credit
by Students Letter Point Grade
Core Comp. 4 59 B 6 6×4 = 24
Core Allied 4 52 C 5 5×4 = 20
Elective Generic 4 82 A+ 9 9×4 = 36
Elective Option 4 70 B+ 7 7×4 = 28
Foundation 2 51 C 5 5×2 = 10
Generic
Total 18 118
SGPA = 118/18 = 6.55
Thus, SGPA for Semester – I is 6.55
Percentage for Semester I is 6.55 × 10 = 65.5
Cumulative grade point average (CGPA) is Obtained by dividing the total no. points earned in
all the Semester by the total number of credits in all Semester.

For Example: Semester - II


Marks Obtained Grade Grade Credit
Course Credit
by Students Letter Point Grade
Core Comp. 4 51 C 5 5×4 = 20
Core Comp. 3 95 O 10 10×4 = 40
Core Allied 4 82 A+ 9 9×4 = 36
Elective Generic 4 52 C 5 5×4 = 20
Elective Option 3 40 F 0 0×3 = 00
Foundation 2 59 B 6 6×2 = 12
Generic
Total 20 128

Thus, SGPA= 128/20=6.4

Illustration No.2(a)

For Example: Semester – II (Repeat Exam)


Marks Obtained Grade Grade
Course Credit Credit Grade
by Students Letter Point
Elective Option 3 60 B+ 7 7×3 = 21
Ci (First Attempt)128 +
Result 20 Ci (subsequent attempt)
21= 149

Thus, SGPA= 149/20=7.45

CGPA= 6.55x18 +7.45x20


………………… =117.9 +149/38 = 7.02 CGPA
38

Sample calculation for SGPA

Course Credit Grade Letter Grade Point Credit Point SGPA(Credit


(Credit X Grade) Point/Credit)
Semester I
DSC - 1A 06 B 6 36
DSC - 2A 06 B+ 7 42
DSC - 3A 06 C 5 30
AECC – 1 02 B 6 12
Total 20 120 6.0 (120/20)
Semester II
DSC - 1B 06 B 6 36
DSC - 2B 06 B 6 36
DSC - 3B 06 C 5 30
AECC – 2 02 A+ 9 18
Total 20 120 6.0 (120/20)
Semester III
DSC - 1C 06 A 8 48
DSC - 2C 06 A+ 9 54
DSC - 3C 06 A 8 48
SEC – 1 02 A 8 16
Total 20 166 8.3 (166/20)
Semester IV
DSC - 1D 06 C 5 30
DSC - 2D 06 B 6 36
DSC - 3D 06 B+ 7 42
SEC – 2 02 A+ 9 18
Total 20 126 6.3 (126/20)
Semester V
DSE - 1A 06 B 6 36
DSE - 2A 06 A+ 9 54
DSE - 3A 06 A 8 48
SEC – 3 02 B 6 12
Total 20 150 7.5 (150/20)
Semester VI
DSE - 1B 06 B+ 7 42
DSE - 1B 06 B 6 36
DSE - 1B 06 C 5 30
SEC - 4 02 C 5 10
Total 20 118 5.9 (118/20)
CGPA
Grand Total 120 800 6.67 (800/120)
Sample calculation for CGPA

Semester I Semester II Semester III Semester IV Semester V Semester VI


Credit:20; Credit:20; Credit:20; Credit:20; Credit:20; Credit:20;
SGPA: 6.0 SGPA: 6.0 SGPA: 8.3 SGPA: 6.3 SGPA: 7.5 SGPA: 5.9

Thus CGPA= (20x6.0+20x6.0+20x8.3+20x6.3+20x7.5+20x5.9)/120


=6.67
Rashtriya Raksha University
An Institution of National Importance
MASTER OF SCIENCE IN DIGITAL FORENSICS Semester - I- Winter Examination
Date: Paper Code: Time:
Total sections Subject: Total Marks:
Seat Number:

Q. 1 Give the brief answer (Any five) (05*03=15)


1
2
3
4
5
6
Q. 2 Write a short notes (Any four) (04*05=20)
1
2
3
4
5
Q. 3 Give the answer in detail. (Any five) (05*03=15)
1
2
3
4
5
6
Q.4 Write a long note. (Any four) (04*05=20)
1
2
3
4
5

You might also like