Difference between revisions of "Fall 2025: Cyber Forensics"
Jump to navigation
Jump to search
Line 18: | Line 18: | ||
| style="width: 12%; " | Unit-1 | | style="width: 12%; " | Unit-1 | ||
| style="width: 60%" | '''''Digital Forensics:''''': | | style="width: 60%" | '''''Digital Forensics:''''': | ||
− | | style="width: 15%" | [ | + | | style="width: 15%" | [unit1.pdf] |
| Chapter 1 (CB1) | | Chapter 1 (CB1) | ||
|- | |- | ||
| Unit 2 | | Unit 2 | ||
| '''''Windows OS Forensics:''''' | | '''''Windows OS Forensics:''''' | ||
− | | [ | + | | [unit2.pdf] |
| Chapter 2 (CB1) | | Chapter 2 (CB1) | ||
|- | |- | ||
| Unit 3 | | Unit 3 | ||
| '''''Evidence Recovery:''''' | | '''''Evidence Recovery:''''' | ||
− | | [ | + | | [unit3.pdf] |
| Chapter 6 (CB1) | | Chapter 6 (CB1) | ||
|- | |- | ||
| Unit 4 | | Unit 4 | ||
| '''''Investigation:''''' | | '''''Investigation:''''' | ||
− | | [ | + | | [unit4.pdf] |
| Chapter 4 (CB1) | | Chapter 4 (CB1) | ||
|- | |- | ||
| Unit 5 | | Unit 5 | ||
| '''''Cyber Crimes and Cyber Laws:''''' | | '''''Cyber Crimes and Cyber Laws:''''' | ||
− | | | + | | [unit5.pdf] |
| Chapter 5 (CB1) | | Chapter 5 (CB1) | ||
|} | |} |
Revision as of 21:36, 17 August 2025
Contents
Logistics
- Class Timings: Tuesdays and Thursdays 2:30 pm - 3:30 pm, Fridays 12:30 pm - 1:30 pm
- Classroom: Tue and Thu: R2; Fri: CL-4
- Lab Timings: Mondays 3:30 pm - 5:30 pm
- Labs: CS Lab 5
Course Overview
- As per the Delhi University Course Guidelines
Lectures
Lecture | Topic | Lecture Slides | Readings |
---|---|---|---|
Unit-1 | Digital Forensics:: | [unit1.pdf] | Chapter 1 (CB1) |
Unit 2 | Windows OS Forensics: | [unit2.pdf] | Chapter 2 (CB1) |
Unit 3 | Evidence Recovery: | [unit3.pdf] | Chapter 6 (CB1) |
Unit 4 | Investigation: | [unit4.pdf] | Chapter 4 (CB1) |
Unit 5 | Cyber Crimes and Cyber Laws: | [unit5.pdf] | Chapter 5 (CB1) |
Assignments and Tests
Class Assignments
- Assignment No. 1,
- Assignment No. 2,
Tests and Quizzes
- Test 1 :
- Test 2 :
Resources
References:
- R1: Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013.
- R2: C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011.
Additional References:
- Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina
- Online Course management System: https://esu.desire2learn.com/
- Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi.
- Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning
- Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education