Difference between revisions of "Fall 2025: Cyber Forensics"
Jump to navigation
Jump to search
Line 17: | Line 17: | ||
|- | |- | ||
| style="width: 12%; " | Unit-1 | | style="width: 12%; " | Unit-1 | ||
− | | style="width: 60%" | '''''Digital Forensics''''': | + | | style="width: 60%" | '''''Digital Forensics:''''': |
| style="width: 15%" | [http://mkbhandari.com/mkwiki/data/spring2023/DM/1Intro.pdf '''1Intro.pdf'''] | | style="width: 15%" | [http://mkbhandari.com/mkwiki/data/spring2023/DM/1Intro.pdf '''1Intro.pdf'''] | ||
| Chapter 1 (CB1) | | Chapter 1 (CB1) | ||
|- | |- | ||
| Unit 2 | | Unit 2 | ||
− | | '''''Windows OS Forensics:''''' | + | | '''''Windows OS Forensics:''''' |
| [http://mkbhandari.com/mkwiki/data/spring2023/DM/2DMT.pdf '''2DMT.pdf'''] | | [http://mkbhandari.com/mkwiki/data/spring2023/DM/2DMT.pdf '''2DMT.pdf'''] | ||
| Chapter 2 (CB1) | | Chapter 2 (CB1) | ||
|- | |- | ||
| Unit 3 | | Unit 3 | ||
− | | '''''Evidence Recovery:''''' | + | | '''''Evidence Recovery:''''' |
| [http://mkbhandari.com/mkwiki/data/spring2023/DM/3AR.pdf '''3AR.pdf'''] | | [http://mkbhandari.com/mkwiki/data/spring2023/DM/3AR.pdf '''3AR.pdf'''] | ||
| Chapter 6 (CB1) | | Chapter 6 (CB1) | ||
|- | |- | ||
| Unit 4 | | Unit 4 | ||
− | | '''''Investigation:''''' | + | | '''''Investigation:''''' |
| [http://mkbhandari.com/mkwiki/data/spring2023/DM/4CL.pdf '''4Classification.pdf'''] | | [http://mkbhandari.com/mkwiki/data/spring2023/DM/4CL.pdf '''4Classification.pdf'''] | ||
| Chapter 4 (CB1) | | Chapter 4 (CB1) | ||
|- | |- | ||
| Unit 5 | | Unit 5 | ||
− | | '''''Cyber Crimes and Cyber Laws:''''' | + | | '''''Cyber Crimes and Cyber Laws:''''' |
| [https://www-users.cse.umn.edu/~kumar001/dmbook/index.php#item4 Read from Authors' web page] | | [https://www-users.cse.umn.edu/~kumar001/dmbook/index.php#item4 Read from Authors' web page] | ||
| Chapter 5 (CB1) | | Chapter 5 (CB1) |
Revision as of 21:18, 17 August 2025
Contents
Logistics
- Class Timings: Wednesdays 1:00 pm - 3:00 pm (5th and 6th slot)and Thursdays 10:45 am - 12:45 pm (3rd and 4th slot)
- Classroom: R33
- Lab Timings: Mondays 8:45 am - 12:45 pm (1st - 4thslots)
- Labs: CS Lab 5
Course Overview
- As per the Delhi University Course Guidelines
Lectures
Lecture | Topic | Lecture Slides | Readings |
---|---|---|---|
Unit-1 | Digital Forensics:: | 1Intro.pdf | Chapter 1 (CB1) |
Unit 2 | Windows OS Forensics: | 2DMT.pdf | Chapter 2 (CB1) |
Unit 3 | Evidence Recovery: | 3AR.pdf | Chapter 6 (CB1) |
Unit 4 | Investigation: | 4Classification.pdf | Chapter 4 (CB1) |
Unit 5 | Cyber Crimes and Cyber Laws: | Read from Authors' web page | Chapter 5 (CB1) |
Assignments and Tests
Class Assignments
- Assignment No. 1,
- Assignment No. 2,
Tests and Quizzes
- Test 1 :
- Test 2 :
Resources
- R1: Data Mining: Concepts and Techniques, 3nd edition,Jiawei Han and Micheline Kamber.
- R2: Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Pearson Education 2003.
- R3: Introduction to Data Mining with Case Studies, G.K. Gupta, PHI 2006.
- R4: Insight into Data mining: Theory and Practice, Soman K. P., DiwakarShyam, Ajay V., PHI 2006