Difference between revisions of "Fall 2025: Cyber Forensics"
Jump to navigation
Jump to search
(26 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== Logistics == | == Logistics == | ||
− | *Class Timings: '''Tuesdays and Thursdays''' 2:30 pm - 3:30 pm | + | *Class Timings: '''Tuesdays and Thursdays''' 2:30 pm - 3:30 pm, '''Fridays''' 12:30 pm - 1:30 pm |
− | *Classroom: R2 | + | *Classroom: Tue and Thu: R2; Fri: CL-4 |
− | *Lab Timings: '''Mondays''' 3:30 pm - 5:30 pm | + | *Lab Timings: '''Mondays''' 3:30 pm - 5:30 pm |
− | *Labs: CS Lab | + | *Labs: CS Lab 5 |
== Course Overview == | == Course Overview == | ||
− | * As per the Delhi University Course Guidelines | + | * As per the Delhi University Course [https://cs.du.ac.in/uploads/syllabus/NEP/pdfs2022/DSE/Cyber_Forensics.pdf Syllabus/Guidelines] |
== Lectures == | == Lectures == | ||
Line 17: | Line 17: | ||
|- | |- | ||
| style="width: 12%; " | Unit-1 | | style="width: 12%; " | Unit-1 | ||
− | | style="width: 60%" | '''''Digital Forensics''''': | + | | style="width: 60%" | '''''Digital Forensics:''''': |
− | | style="width: 15%" | [ | + | | style="width: 15%" | [unit1.pdf] |
| Chapter 1 (CB1) | | Chapter 1 (CB1) | ||
|- | |- | ||
| Unit 2 | | Unit 2 | ||
− | | '''''Windows OS Forensics:''''' | + | | '''''Windows OS Forensics:''''' |
− | | [ | + | | [unit2.pdf] |
| Chapter 2 (CB1) | | Chapter 2 (CB1) | ||
|- | |- | ||
| Unit 3 | | Unit 3 | ||
− | | '''''Evidence Recovery:''''' | + | | '''''Evidence Recovery:''''' |
− | | [ | + | | [unit3.pdf] |
| Chapter 6 (CB1) | | Chapter 6 (CB1) | ||
|- | |- | ||
| Unit 4 | | Unit 4 | ||
− | | '''''Investigation:''''' | + | | '''''Investigation:''''' |
− | | [ | + | | [unit4.pdf] |
| Chapter 4 (CB1) | | Chapter 4 (CB1) | ||
|- | |- | ||
| Unit 5 | | Unit 5 | ||
− | | '''''Cyber Crimes and Cyber Laws:''''' | + | | '''''Cyber Crimes and Cyber Laws:''''' |
− | | | + | | [unit5.pdf] |
| Chapter 5 (CB1) | | Chapter 5 (CB1) | ||
|} | |} | ||
Line 50: | Line 50: | ||
* '''Test 1''' : | * '''Test 1''' : | ||
* '''Test 2''' : | * '''Test 2''' : | ||
+ | |||
+ | ==Labs== | ||
+ | |||
+ | '''Instructions''' | ||
+ | * Please be on time to avoid the '''Attendance Penalty'''. | ||
+ | * Please put your mobile phone on '''Silent Mode'''. | ||
+ | * Each lab assignment needs to be submitted in the '''Google Classroom''' for evaluation(will be notified in the GC lab-wise, submit before the deadline). | ||
+ | * Turn off'''(shut down) your assigned computer and arrange the chair''' before you leave the lab. | ||
+ | |||
+ | == Lab 1: ( week of 18<sup>th</sup> August 2025 ) == | ||
+ | {| class="wikitable" style="text-align: justify; | ||
+ | |- | ||
+ | ! Task. No. | ||
+ | ! Task | ||
+ | ! Assessment Period | ||
+ | ! Submission Deadline | ||
+ | |- | ||
+ | | style="width: 8%" | 1 | ||
+ | | style="width: 60%" | Study of Network related Commands (Linux) | ||
+ | * Network Discovery: - '''''Ping, Traceroute/Tracepath, Nmap, MTR''''' | ||
+ | * Traffic Analysis: - '''''Tcpdump, Iftop/Bmon, Iperf''''' | ||
+ | * DNS/Domain Forensics: - '''''Dig, Nslookup, Whois, Host''''' | ||
+ | * Host configuration:- '''''Ifconfig/Ip, SS/Netstat, Ethtool, Hostname''''' | ||
+ | * Address/Routing Analysis: - '''''ARP, Route, Iproute2''''' | ||
+ | * Data Transfer/File Retrieval: - '''''wget, curl''''' | ||
+ | | style="width: 15%" | 18/08/2025 - 25/08/2025 | ||
+ | | 26/08/2025 | ||
+ | |} | ||
== Resources == | == Resources == | ||
− | + | '''References:''' | |
− | * ''' | + | * '''R1''': Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013. <br> |
− | * ''' | + | * '''R2''': C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011. <br> |
− | + | ||
+ | '''Additional References:''' | ||
+ | # Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina | ||
+ | # Online Course management System: https://esu.desire2learn.com/ | ||
+ | # Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi. | ||
+ | # Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning | ||
+ | # Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education |
Latest revision as of 23:17, 25 August 2025
Contents
Logistics
- Class Timings: Tuesdays and Thursdays 2:30 pm - 3:30 pm, Fridays 12:30 pm - 1:30 pm
- Classroom: Tue and Thu: R2; Fri: CL-4
- Lab Timings: Mondays 3:30 pm - 5:30 pm
- Labs: CS Lab 5
Course Overview
- As per the Delhi University Course Syllabus/Guidelines
Lectures
Lecture | Topic | Lecture Slides | Readings |
---|---|---|---|
Unit-1 | Digital Forensics:: | [unit1.pdf] | Chapter 1 (CB1) |
Unit 2 | Windows OS Forensics: | [unit2.pdf] | Chapter 2 (CB1) |
Unit 3 | Evidence Recovery: | [unit3.pdf] | Chapter 6 (CB1) |
Unit 4 | Investigation: | [unit4.pdf] | Chapter 4 (CB1) |
Unit 5 | Cyber Crimes and Cyber Laws: | [unit5.pdf] | Chapter 5 (CB1) |
Assignments and Tests
Class Assignments
- Assignment No. 1,
- Assignment No. 2,
Tests and Quizzes
- Test 1 :
- Test 2 :
Labs
Instructions
- Please be on time to avoid the Attendance Penalty.
- Please put your mobile phone on Silent Mode.
- Each lab assignment needs to be submitted in the Google Classroom for evaluation(will be notified in the GC lab-wise, submit before the deadline).
- Turn off(shut down) your assigned computer and arrange the chair before you leave the lab.
Lab 1: ( week of 18th August 2025 )
Task. No. | Task | Assessment Period | Submission Deadline |
---|---|---|---|
1 | Study of Network related Commands (Linux)
|
18/08/2025 - 25/08/2025 | 26/08/2025 |
Resources
References:
- R1: Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013.
- R2: C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011.
Additional References:
- Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina
- Online Course management System: https://esu.desire2learn.com/
- Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi.
- Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning
- Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education