0% found this document useful (0 votes)
307 views2 pages

Digital Forensics: Unit No. 1 Computer Forensics

This document outlines the topics covered in a digital forensics course divided into 5 units. Unit 1 discusses computer forensics, including guidelines, examination stages, challenges, and tools. Unit 2 covers network and internet forensics, such as network monitoring, traffic analysis, and reconstructing online activities. Unit 3 focuses on forensic investigation, evidence handling, and legal issues. Unit 4 examines mobile and memory forensics as well as steganography. Unit 5 analyzes different types of malware. The document concludes with a list of 18 lab exercises involving tools like Autopsy, Wireshark, and steganalysis software.

Uploaded by

kingraaja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
307 views2 pages

Digital Forensics: Unit No. 1 Computer Forensics

This document outlines the topics covered in a digital forensics course divided into 5 units. Unit 1 discusses computer forensics, including guidelines, examination stages, challenges, and tools. Unit 2 covers network and internet forensics, such as network monitoring, traffic analysis, and reconstructing online activities. Unit 3 focuses on forensic investigation, evidence handling, and legal issues. Unit 4 examines mobile and memory forensics as well as steganography. Unit 5 analyzes different types of malware. The document concludes with a list of 18 lab exercises involving tools like Autopsy, Wireshark, and steganalysis software.

Uploaded by

kingraaja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Digital Forensics

Unit No. 1 Computer Forensics


When and how is computer forensics used, Guidelines for successful computer forensics, the stages
of a computer forensics examination, what issues do computer forensics examiners face? Risks in
Computer Forensics, Standard Procedure, Incident Verification, System identification, Recovery of
Erased and damaged data, Disk imaging and preservation, Data encryption and compression,
Forensic software.

Unit No. 2 Network & Internet Forensics


Overview of OSI Model, Introduction to NAT, Network Information-Gathering Tools, Monitoring User
Activity, Investigating Routers, Hacking Routers, SNORT, Analysis using Wireshark, , tcpdump,
Tracking Network Traffic, Reviewing Network Logs, Network Tracking Tools, Live Acquisition of
Network Traffic, Order of Volatility, Standard Procedure. Internet & World wide web threats, Domain
Name Ownership Investigation, Reconstructing Past Internet Activities and Events, Email Forensics:
E-mail Analysis, Email Forensics: Email Headers and Spoofing, Messenger Forensics: AOL, Yahoo,
MSN, and Chats, Browser Forensics: Analyzing Cache and Temporary Internet Files, Browser
Forensics: Cookie Storage and Analysis, Browser Forensics: Web Browsing Activity Reconstruction.

Unit No. 3 Forensic Investigation, Evidence Presentation and Legal aspects of Digital Forensics
Authorization to collect the evidence, Authentication of the evidence, Performing RAID Acquisition,
Remote Network Data Acquisition Tools, Validating Forensic Data, Analysis of the evidence,
Reporting on the findings, Testimony, Writing Investing Reports.
Definition of Cyber Crime in IT Act, Structure of IT Act, Adjudications and Criminal Provisions,
Tampering with computer source documents and Hacking, Online Obscenity & Pornography, Cyber
Stalking, Theft of Identity, Cyber Defamation, Admissibility of Digital Evidence.

Unit No. 4 Mobile & Memory Forensics, Steganography


Collecting and Analyzing Evidence, analyzing other Storage Devices, Digital Camera Forensics,
Recovering and Reconstructing Deleted Data, Introduction to Steganography, Steganography
Background, Steganography Functions, Robustness and Cryptography, Steganalysis, Image
Steganalysis, Digital Image and Audio- Audio Steganalysis, Video Steganalysis, Tools for
Steganography, Data Hiding, Data Hiding -Generic, Data Hiding and Steganography, Alternate Data
Stream (ADS), Data Recovery, Reasons for Data Recovery, Data recovery Chances, Data Recovery
Technique, Data Loss prevention, Specific Do’s and Don’ts in extracting data from Memory
Knowledge and usage of special and general purpose tools for Memory Forensics

Unit No. 5 Malware Analysis


Different types of malware, Analyzing Live Windows System for Malware, Analyzing Live Linux
System for Malware, Analyzing Physical and Process Memory Dumps for Malware, Discovering and
Extracting Malware from Windows Systems, Technical Analysis of malware from Digital Forensics
perspective, Discovering and Extracting Malware from Linux Systems, Rootkits and Rootkit
Detection and Recovery, Reverse Engineering Tools and Techniques, Reversing and Fuzzing of
malware from Digital Forensics perspective.
Lab Exercises –

1. Forensics with Autopsy


2. Packet Capturing with Wireshark
3. Packet Analysis With TCPDUMP
4. Reviewing Network logs
5. Analysis using Sysinternals Analysis using Knoppix
6. Live Acquisition Forensics
7. Data Recovery with Runtime Software (www.runtime.org) and R-Tools Technologies
8. Investigating the Reverse DNS
9. Investigating the Webserver Owner
10. Finding Information in Cookies
11. Examining Artifacts with E-mail Examiner
12. Examining Artifacts with EnCase
13. Examine E-mail Headers
14. Web browsing analysis using Pasco
15. Packet Capture using ProDiscover Investigator
16. hard drive diagnostics using HDDScan
17. Data Restoration with Office FIX
18. Simple LSB Steganalysis (LSB extraction) for bitmap images

You might also like