Course Outcome
" Everybody should want to make sure that we have the cyber tools necessary to investigate cyber crimes, and to be prepared to defend against them and to bring people to justice who commit it. "

Undergraduate Course Outcome

The purpose of computer forensics is mainly due to the wide variety of computer crimes that take place. In the present technological advancements it is common for every organization to employ the services of the computer forensics experts. There are various computer crimes that occur on small scale as well as large scale. The loss caused is dependent upon the sensitivity of the computer data or the information for which the crime has been committed.

The computer forensics has become vital in the corporate world. There can be theft of the data from an organization in which case the organization may sustain heavy losses. For this purpose computer forensics are used as they help in tracking the criminal.

Postgraduate Course Outcome


Undergraduate Course Outcome
Sr. No Faculty Name Download Profile
1 Mr. Sharad Shivappa Hegade
Assistant Professor And HOD
2 Dr. Arjun Vithalrao Mane
3 Mr. Shrikant Balasaheb Korke


The department of Digital and Cyber Forensics has two well equipped laboratories for UG (30) and PG (8) courses with 38 computers.

Also the department has following software’s and Tools.
Cell Phone Forensic Suite (ConnectQ 2.0)
Speaker Verification (Spectralayers Pro)
Forensic Server Project
Paraben Forensic Replicator
The Original Data Lifter- File Extraction Pro
Write Blocking Tool (Weibetech Labdock)
Adobe Dream Viewer
Adobe Photoshop
Network USB Data Theft Protection Tool
Data Recovery Stick (Paraben)
EnCase Forensic Edition
Matlab 2010
Multispeech Analyzer

Research Areas

  • Digital Image Forensics
  • Network Forensics
  • Biometric
  • Mobile Forensics

Career Opportunities

  • Chief Information Security Officer (CISO) and Directors of Security
  • Computer Crime Investigators
  • Computer Forensics Investigator
  • CTO - Chief Technology Officer
  • Disaster Recovery Managers
  • Incident Responders
  • Malware Analyst
  • Network Analyst
  • Penetration Tester
  • Security Architect
  • Security Auditor
  • Vulnerability Research Engineer
  • etc...