Difference between revisions of "Fall 2025: Cyber Forensics"
Jump to navigation
Jump to search
Line 52: | Line 52: | ||
== Resources == | == Resources == | ||
+ | '''References:''' | ||
* '''R1''': Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013. <br> | * '''R1''': Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013. <br> | ||
* '''R2''': C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011. <br> | * '''R2''': C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011. <br> | ||
+ | |||
+ | '''Additional References:''' | ||
+ | # Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina | ||
+ | # Online Course management System: https://esu.desire2learn.com/ | ||
+ | # Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi. | ||
+ | # Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning | ||
+ | # Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education |
Revision as of 21:34, 17 August 2025
Contents
Logistics
- Class Timings: Tuesdays and Thursdays 2:30 pm - 3:30 pm, Fridays 12:30 pm - 1:30 pm
- Classroom: Tue and Thu: R2; Fri: CL-4
- Lab Timings: Mondays 3:30 pm - 5:30 pm
- Labs: CS Lab 5
Course Overview
- As per the Delhi University Course Guidelines
Lectures
Lecture | Topic | Lecture Slides | Readings |
---|---|---|---|
Unit-1 | Digital Forensics:: | 1Intro.pdf | Chapter 1 (CB1) |
Unit 2 | Windows OS Forensics: | 2DMT.pdf | Chapter 2 (CB1) |
Unit 3 | Evidence Recovery: | 3AR.pdf | Chapter 6 (CB1) |
Unit 4 | Investigation: | 4Classification.pdf | Chapter 4 (CB1) |
Unit 5 | Cyber Crimes and Cyber Laws: | Read from Authors' web page | Chapter 5 (CB1) |
Assignments and Tests
Class Assignments
- Assignment No. 1,
- Assignment No. 2,
Tests and Quizzes
- Test 1 :
- Test 2 :
Resources
References:
- R1: Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013.
- R2: C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011.
Additional References:
- Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina
- Online Course management System: https://esu.desire2learn.com/
- Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi.
- Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning
- Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education