Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
22 views

DF Syllabus

This document outlines a course on digital forensics offered at the University of Petroleum & Energy Studies. The course aims to provide an overview of digital forensics principles and practices, with a focus on computer, network, mobile, and memory forensics, as well as legal aspects and malware analysis. The course is divided into 5 units that cover these topics over 3 credit hours per week. Student assessment includes quizzes, assignments, presentations, exams, and relates the course objectives to broader program outcomes in areas like security, investigation techniques, and critical thinking.

Uploaded by

Mansi Sharma
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

DF Syllabus

This document outlines a course on digital forensics offered at the University of Petroleum & Energy Studies. The course aims to provide an overview of digital forensics principles and practices, with a focus on computer, network, mobile, and memory forensics, as well as legal aspects and malware analysis. The course is divided into 5 units that cover these topics over 3 credit hours per week. Student assessment includes quizzes, assignments, presentations, exams, and relates the course objectives to broader program outcomes in areas like security, investigation techniques, and critical thinking.

Uploaded by

Mansi Sharma
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

UNIVERSITY OF PETROLEUM & ENERGY STUDIES

2019-23 Batch
CSSF 4011 Digital Forensics L T P C
3 0 0 3
Pre-requisites/Exposure Basic knowledge of data security
Co-requisites --

Course Objectives
The Objectives of this course are:
1. To develop a holistic view of digital forensics.
2. To understand computer, network, mobile and memory forensics.
3. To enable students to look into legal aspects of forensics.
4. To study and understand malwares.

Course Outcomes
On completion of this course, the students will be able to
CO1. Discuss the digital forensics and use of modern tools for digital forensics.
CO2: Describe the computer, network, mobile and memory forensics.
CO3: Discuss the legal aspects of forensics.
CO4: Analyze the malwares.

Catalog Description
This course presents an overview of the principles and practices of digital investigation. The objective of
this course is to emphasize the fundamentals and significance of digital forensics. Students will learn
different practices and processes that enable them to accomplish a digital investigation.

Course Content
Unit 1 Computer Forensics 6 Lecture Hours
Standard Procedure, Incident Verification, System identification, Recovery of Erased and damaged data,
Disk imaging and preservation, Data encryption and compression, Automated search techniques,
Forensic software

Unit 2 Network & Internet Forensics 8 Lecture Hours


Tracking network traffic, Reviewing Network Logs, Tools, Performing Live Acquisitions, Order of volatility,
Standard Procedure, Internet & World wide web threats ( Email, Chat-rooms, Search Engines, Hacking &
illegal access, Obscene and indecent transmission, Extortion & threats), Domain Name Ownership
Investigation, Reconstructing Past Internet Activities and Events, Email Forensics: E-mail Analysis, Email
Headers and Spoofing, Laws Against Email Crime. Messenger Forensics: AOL, Yahoo, MSN, and Chats,
Browser Forensics: Analyzing Cache and Temporary Internet Files, Cookie Storage and Analysis, Web
Browsing Activity Reconstruction.

B.TECH (CSE) with Specialization in Specialization in Cloud Computing & Virtualization Technology Page 250 of 256

This document is the Intellectual Property of University of Petroleum & Energy Studies and its contents
are protected under the ‘Intellectual Property Rights’.
UNIVERSITY OF PETROLEUM & ENERGY STUDIES
2019-23 Batch

Unit 3 Forensic Investigation, Evidence Presentation & Legal aspects of Digital Forensics 6 Lecture Hours
Authorization to collect the evidence, Acquisition of evidence, Authentication of the evidence, Analysis of
the evidence, reporting on the findings, Testimony, Laws & regulations - Information Technology Act, Giving
evidence in court

Unit 4 Mobile & Memory Forensics, Steganography 8 Lecture Hours


Collecting and Analyzing Cell Phone, PDA, Blackberry, iPhone, iPod, iPad and MP3 Evidence, Analyzing CD,
DVD, Tape Drives, USB, Flash Memory, and other Storage Devices Digital Camera Forensics,
Reconstructing Users Activities. Recovering and Reconstructing Deleted Data

Steganography Tools and Tricks.


Data Hiding, Data Recovery, Memory Data Collection and Examination & Extracting and Examining
Processes.

Unit 5 Malware Analysis 8 Lecture Hours


Analyzing Live Windows System for Malware, Analyzing Live Linux System for Malware, Analyzing Physical
and Process Memory Dumps for Malware, Discovering and Extracting Malware from Windows Systems,
Discovering and Extracting Malware from Linux Systems, Rootkits and Rootkit Detection and Recovery,
Reverse Engineering Tools and Techniques

Text Book
o Digital Forensics (IBM ICE Publication)
Modes of Evaluation: Quiz/Assignment/ presentation/ extempore/ Written Examination
Examination Scheme:

Components Internal Mid Term ESE Total


Weightage (%) 30% 20% 50% 100%

Relationship between the Course Outcomes (COs), Program Outcomes (POs) and Program Specific
Outcomes (PSOs)
PO10
PO11
PO12

PSO1

PSO2

PSO3

Course
PO1
PO2
PO3

PO4

PO5

PO6

PO7
PO8
PO9

Outcomes
CO1 1 2 2 1
CO2 1 2 2 1
CO3 1 2 2 1
CO4 1 2 2 1
Average 1 2 2 1

1=weak 2= moderate 3=strong


B.TECH (CSE) with Specialization in Specialization in Cloud Computing & Virtualization Technology Page 251 of 256

This document is the Intellectual Property of University of Petroleum & Energy Studies and its contents
are protected under the ‘Intellectual Property Rights’.

You might also like