Difference between revisions of "Fall 2025: Cyber Forensics"
Jump to navigation
Jump to search
Line 16: | Line 16: | ||
!Readings | !Readings | ||
|- | |- | ||
− | | style="width: 12%; " | Unit 1 | style="width: 60%" | ''''' | + | | style="width: 12%; " | Unit 1 | style="width: 60%" | '''''Digital Forensics''''': |
| style="width: 15%" | [http://mkbhandari.com/mkwiki/data/spring2023/DM/1Intro.pdf '''1Intro.pdf'''] | | style="width: 15%" | [http://mkbhandari.com/mkwiki/data/spring2023/DM/1Intro.pdf '''1Intro.pdf'''] | ||
| Chapter 1 (CB1) | | Chapter 1 (CB1) | ||
|- | |- | ||
| Unit 2 | | Unit 2 | ||
− | | ''''' | + | | '''''Windows OS Forensics:''''': |
| [http://mkbhandari.com/mkwiki/data/spring2023/DM/2DMT.pdf '''2DMT.pdf'''] | | [http://mkbhandari.com/mkwiki/data/spring2023/DM/2DMT.pdf '''2DMT.pdf'''] | ||
| Chapter 2 (CB1) | | Chapter 2 (CB1) | ||
|- | |- | ||
| Unit 3 | | Unit 3 | ||
− | | ''''' | + | | '''''Evidence Recovery:''''': |
| [http://mkbhandari.com/mkwiki/data/spring2023/DM/3AR.pdf '''3AR.pdf'''] | | [http://mkbhandari.com/mkwiki/data/spring2023/DM/3AR.pdf '''3AR.pdf'''] | ||
| Chapter 6 (CB1) | | Chapter 6 (CB1) | ||
|- | |- | ||
| Unit 4 | | Unit 4 | ||
− | | ''''' | + | | '''''Investigation:''''': |
| [http://mkbhandari.com/mkwiki/data/spring2023/DM/4CL.pdf '''4Classification.pdf'''] | | [http://mkbhandari.com/mkwiki/data/spring2023/DM/4CL.pdf '''4Classification.pdf'''] | ||
| Chapter 4 (CB1) | | Chapter 4 (CB1) | ||
|- | |- | ||
| Unit 5 | | Unit 5 | ||
− | | ''''' | + | | '''''Cyber Crimes and Cyber Laws:''''': |
| [https://www-users.cse.umn.edu/~kumar001/dmbook/index.php#item4 Read from Authors' web page] | | [https://www-users.cse.umn.edu/~kumar001/dmbook/index.php#item4 Read from Authors' web page] | ||
| Chapter 5 (CB1) | | Chapter 5 (CB1) | ||
− | |||
− | |||
− | |||
− | |||
− | |||
|} | |} | ||
Revision as of 21:09, 17 August 2025
Contents
Logistics
- Class Timings: Wednesdays 1:00 pm - 3:00 pm (5th and 6th slot)and Thursdays 10:45 am - 12:45 pm (3rd and 4th slot)
- Classroom: R33
- Lab Timings: Mondays 8:45 am - 12:45 pm (1st - 4thslots)
- Labs: CS Lab 5
Course Overview
- As per the Delhi University Course Guidelines
Lectures
Lecture | Topic | Lecture Slides | Readings |
---|---|---|---|
Unit 1 | style="width: 60%" | Digital Forensics: | 1Intro.pdf | Chapter 1 (CB1) | |
Unit 2 | Windows OS Forensics:: | 2DMT.pdf | Chapter 2 (CB1) |
Unit 3 | Evidence Recovery:: | 3AR.pdf | Chapter 6 (CB1) |
Unit 4 | Investigation:: | 4Classification.pdf | Chapter 4 (CB1) |
Unit 5 | Cyber Crimes and Cyber Laws:: | Read from Authors' web page | Chapter 5 (CB1) |
Assignments and Tests
Class Assignments
- Assignment No. 1,
- Assignment No. 2,
Tests and Quizzes
- Test 1 :
- Test 2 :
Resources
Course Books:
- CB1: Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education.
References:
- R2: Data Mining: Concepts and Techniques, 3nd edition,Jiawei Han and Micheline Kamber.
- R3: Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Pearson Education 2003.
- R4: Introduction to Data Mining with Case Studies, G.K. Gupta, PHI 2006.
- R5: Insight into Data mining: Theory and Practice, Soman K. P., DiwakarShyam, Ajay V., PHI 2006