Digital & Cyber Forensic Science has played a vital role in both law enforcement investigations and corporate cyber security. In this “golden age of evidence,” digital forensics, especially computer forensics, is playing a vital role in solving a wide range of cases: homicide, forgery, pornography, and much more Computer forensics is an evolving field that is always moving to match the changes in devices and how they are used for identifying, preserving, analyzing, and recovering data from computers and various digital media storage. With increasing cybercrime, computer forensics has now become crucial for public safety, national security, and law enforcement. Tracking the digital activities of potential criminals can help investigators find digitally stored information about their criminal activity. Computer forensics is not only capable of uncovering deliberate criminal intent but can also prevent future cybercrimes
Cyber forensics can be defined as a branch of forensic science dedicated to recovery and investigation of digital or electronic data. These data can be from any digital asset or data storing entity which includes a computer system, mobile device, cloud service, and so on. Technically, all these digital assets have a different design to store data and this makes the very base for dividing digital forensics into several categories. Its various sub branches include computer forensics, network forensics, forensic data analysis, and mobile device forensics
At the end the of the end each post graduate must
Have clear knowledge about the fundamentals and basic functioning of a computer and its different components.
Have a clear view about different programming language and software’s.
Have the ability to identify and solve issues related to the opted steam.
Develop ability for rational approach in solving professional problems and able to draw opinions and conclusions pertaining to his subject.
Acquire adequate skill and competence to complete various professional tasks presented to them.
Carry out research in the form of dissertation.
Develop good teaching and communication skills.
Computer science in PUC or any other equivalent degrees to IT from any UGC recognized university with 45% marks
• Digital Forensic
• Operating System Function
• Program Language Structure
• Information security
• Network security engineers
• Forensic analysts
• Crime Investigation
• Security Architects
• Disaster recovery manager analysis.
• Hands on training with software’s
The course is done on full term basis with duration of 4 years spread out in 8 semesters.
Our course is designed with unique syllabus where students will be trained with hand on experience in data acquisition, seizure and other software related aspects related aspects. Our students are sent for placements so that they face the realistically true events and solve the given task with their innovative new ideas. We prepare our students with national and international level standards with more exposure to the subject and its contents.
Experts in forensic science laboratory
Private detective
Vigilance officers in private banks and airports
Lecturer
Intelligence agencies
IT companies
Police departments
Digital security analyst
Cyber lab
Filed visits
Expert talks
Hands on training by filed experts
Semester | Subjects |
1st Semester |
Introduction to Cyber Security and Introduction to programming language C Digital Forensic Awareness Criminal Law and Minor Acts Empirical study on Programming language- C Kannada Sanskrit Introduction to Cyber Security and Introduction to programming language C- Practical |
2nd Semester |
Introduction to Cyber Security and Introduction to programming language C++ Forensic audio video analysis and speaker identification IT Act Empirical study on Programming language- C++ Hindi English Introduction to Cyber Security and Introduction to programming language- C++ - Practical |
3rd Semester |
Police Science and Vigilance Programming Language-JAVA IT Act Criminology and Victimology Environmental science Yoga/Sports/ Arts Police science and vigilance- Practical Programming Language-JAVA- Practical |
4th Semester |
Cyber Crime Investigation and Digital Forensics Programming Language- Python Security and vigilance Constitution of India Cloud computing and big data Yoga/Sports/ Arts Cyber Crime Investigation and Digital Forensics-Practical Programming language - Python- Practical |
5th Semester |
Cryptography and Information Security Ethical Hacking and Network Defense Research methodology Forensic Psychology Cryptography and Information Security- Practical Ethical Hacking Network Defense- Practical Research methodology- Practical |
6th Semester |
Biometric Security Vulnerability Assessment and Penetration testing Entrepreneurship Minor Project Biometric Security-Practical Vulnerability Assessment and Penetration testing- Practical Entrepreneurship- Practical |
7th Semester |
Malware Analysis in Virtual Machine Network Computing and Communication Cloud computing Internship Malware Analysis in Virtual Machine-Practical Network Computing and Communication-Practical Cloud computing-practical |
8th Semester |
Android Hands on: Complete Penetration Testing and Ethical Hacking Major research & Internship Android-Practical |
(1) University Registration Fee, Eligibility Fee for other State/NRI students, Examination Fee, Uniform Fee, Hostel Fee, Industry visit fee, Internship fee, Transportation fee, Sports & games fee, Extra-curricular activity fee, etc., are extra. The course fees mentioned for subsequent years may vary annually up to 6%. (2) The University Placement & Training Team will assist the admitted students to get (a) Earn While Learn, (b) Industry Internship, and (c) Final Job Placement. (3) Karnataka Quota* : 1. Applicable only to Karnataka students having 50% or more in the applicable subject combination. 2. To be considered as Karnataka domicile student should have studied 7 years including PUC in the Karnataka.