Difference between revisions of "Fall 2025: Cyber Forensics"
Jump to navigation
Jump to search
(10 intermediate revisions by the same user not shown) | |||
Line 6: | Line 6: | ||
== Course Overview == | == Course Overview == | ||
− | * As per the Delhi University Course Guidelines | + | * As per the Delhi University Course [https://cs.du.ac.in/uploads/syllabus/NEP/pdfs2022/DSE/Cyber_Forensics.pdf Syllabus/Guidelines] |
== Lectures == | == Lectures == | ||
Line 51: | Line 51: | ||
* '''Test 2''' : | * '''Test 2''' : | ||
− | == | + | ==Labs== |
'''Instructions''' | '''Instructions''' | ||
Line 59: | Line 59: | ||
* Turn off'''(shut down) your assigned computer and arrange the chair''' before you leave the lab. | * Turn off'''(shut down) your assigned computer and arrange the chair''' before you leave the lab. | ||
− | == | + | == Lab 1: ( week of 18<sup>th</sup> August 2025 ) == |
− | {| class="wikitable" style="text-align: justify | + | {| class="wikitable" style="text-align: justify; |
|- | |- | ||
! Task. No. | ! Task. No. | ||
! Task | ! Task | ||
− | ! Assessment Period | + | ! Assessment Period |
! Submission Deadline | ! Submission Deadline | ||
|- | |- | ||
| style="width: 8%" | 1 | | style="width: 8%" | 1 | ||
| style="width: 60%" | Study of Network related Commands (Linux) | | style="width: 60%" | Study of Network related Commands (Linux) | ||
− | * Network Discovery: - ''''' | + | * Network Discovery: - '''''Ping, Traceroute/Tracepath, Nmap, MTR''''' |
− | * Traffic Analysis: - ''''' | + | * Traffic Analysis: - '''''Tcpdump, Iftop/Bmon, Iperf''''' |
− | * DNS/Domain Forensics: - ''''' | + | * DNS/Domain Forensics: - '''''Dig, Nslookup, Whois, Host''''' |
− | * | + | * Host configuration:- '''''Ifconfig/Ip, SS/Netstat, Ethtool, Hostname''''' |
− | * | + | * Address/Routing Analysis: - '''''ARP, Route, Iproute2''''' |
− | * File Retrieval: - '''''wget, curl''''' | + | * Data Transfer/File Retrieval: - '''''wget, curl''''' |
− | + | | style="width: 15%" | 18/08/2025 - 25/08/2025 | |
− | | style="width: 15%" | | + | | 26/08/2025 |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|} | |} | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Resources == | == Resources == |
Latest revision as of 23:17, 25 August 2025
Contents
Logistics
- Class Timings: Tuesdays and Thursdays 2:30 pm - 3:30 pm, Fridays 12:30 pm - 1:30 pm
- Classroom: Tue and Thu: R2; Fri: CL-4
- Lab Timings: Mondays 3:30 pm - 5:30 pm
- Labs: CS Lab 5
Course Overview
- As per the Delhi University Course Syllabus/Guidelines
Lectures
Lecture | Topic | Lecture Slides | Readings |
---|---|---|---|
Unit-1 | Digital Forensics:: | [unit1.pdf] | Chapter 1 (CB1) |
Unit 2 | Windows OS Forensics: | [unit2.pdf] | Chapter 2 (CB1) |
Unit 3 | Evidence Recovery: | [unit3.pdf] | Chapter 6 (CB1) |
Unit 4 | Investigation: | [unit4.pdf] | Chapter 4 (CB1) |
Unit 5 | Cyber Crimes and Cyber Laws: | [unit5.pdf] | Chapter 5 (CB1) |
Assignments and Tests
Class Assignments
- Assignment No. 1,
- Assignment No. 2,
Tests and Quizzes
- Test 1 :
- Test 2 :
Labs
Instructions
- Please be on time to avoid the Attendance Penalty.
- Please put your mobile phone on Silent Mode.
- Each lab assignment needs to be submitted in the Google Classroom for evaluation(will be notified in the GC lab-wise, submit before the deadline).
- Turn off(shut down) your assigned computer and arrange the chair before you leave the lab.
Lab 1: ( week of 18th August 2025 )
Task. No. | Task | Assessment Period | Submission Deadline |
---|---|---|---|
1 | Study of Network related Commands (Linux)
|
18/08/2025 - 25/08/2025 | 26/08/2025 |
Resources
References:
- R1: Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013.
- R2: C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011.
Additional References:
- Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina
- Online Course management System: https://esu.desire2learn.com/
- Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi.
- Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning
- Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education