The overall aim of the unit is to enable the students to gain an understanding, what computer forensics entails and how it is carried out, what technical tools can be used, and what constraints are imposed by legal considerations. To this purpose, students analyze various scenarios, choose tools relevant to the investigations, and practically carry out forensic tests. The structure of various operating and file systems and their impact on the choice of forensic procedures is an essential part of the course.

crpto

This course covers the basics of modern cryptography as used to secure e-commerce transactions and code distributed over the Internet. The course covers cryptographic primitives used for encryption and authentication; it also explains how these primitives are used to improve the security of applications. Emphasis is placed on what problems cryptography can solve. The overall aim of this course is to explore the various encryption and decryption techniques that can be applied to secure various e-commerce applications. The emphasis is on gaining an understanding of the concepts, the practical usability, and the vulnerabilities of different methods in cryptology.

This course is designed to expose students to advanced principles and concepts of intrusion detection with special focus on attack behaviour analytics aspects.