Title:

Digital Forensics (in English)

Code:DFAa
Ac.Year:2018/2019
Sem:Summer
Curriculums:
ProgrammeFieldYearDuty
IT-MSC-2MBI-Elective
IT-MSC-2MBS-Elective
IT-MSC-2MGM-Elective
IT-MSC-2MGMe-Elective
IT-MSC-2MIN-Elective
IT-MSC-2MIS-Elective
IT-MSC-2MMI-Elective
IT-MSC-2MMM-Elective
IT-MSC-2MPV-Elective
IT-MSC-2MSK-Elective
Language of Instruction:English
News:
This course is instructed in English.

Credits:5
Completion:examination (written&verbal)
Type of
instruction:
Hour/semLecturesSeminar
Exercises
Laboratory
Exercises
Computer
Exercises
Other
Hours:26012014
 ExamsTestsExercisesLaboratoriesOther
Points:55030015
Guarantor:Ryšavý Ondřej, doc. Ing., Ph.D. (DIFS)
Deputy guarantor:Matoušek Petr, Ing., Ph.D., M.A. (DIFS)
Lecturer:Matoušek Petr, Ing., Ph.D., M.A. (DIFS)
Ryšavý Ondřej, doc. Ing., Ph.D. (DIFS)
Veselý Vladimír, Ing., Ph.D. (DIFS)
Instructor:Matoušek Petr, Ing., Ph.D., M.A. (DIFS)
Ryšavý Ondřej, doc. Ing., Ph.D. (DIFS)
Veselý Vladimír, Ing., Ph.D. (DIFS)
Faculty:Faculty of Information Technology BUT
Department:Department of Information Systems FIT BUT
Schedule:
DayLessonWeekRoomStartEndLect.Gr.St.G.EndG.
MonlecturelecturesA11308:0009:501EITxxxx
MonlecturelecturesA11308:0009:502EITxxxx
MonlecturelecturesA11308:0009:50INTExxxx
MonlecturelecturesA11308:0009:501MITxxxx
MonlecturelecturesA11308:0009:502MITxxxx
 
Learning objectives:
  The aim is to understand principles of computer forensics and the basic concepts used in a computer forensics examination; introduces techniques required for conducting a forensic analysis of systems and data.
Description:
  The course focuses on the role of computer forensics and the methods used in the investigation of computer crimes. The course explains the need for proper investigation and illustrates the process of locating, handling, and processing computer evidence. A detailed explanation of how to efficiently manage a forensics investigation and how to preserve and present evidence is covered.
Knowledge and skills required for the course:
  Basic knowledge of operating systems, storage media, networking and ability to write simple scripts.
Learning outcomes and competencies:
  Student acquaints basic concepts and principles of computer forensics and skills in a computer forensic examination.
Syllabus of lectures:
 
  1. Introduction to Forensics Investigation
  2. Data Acquisition Tools and Methods
  3. Computer Forensics Tools
  4. Data Recovery, Filesystem Examination
  5. Data Analysis, Carving, Recovery Files
  6. OS Forensics: Windows, Mac OS, Linux
  7. Introduction to Mobile Forensics
  8. Mobile Forensics Data Acquisition and Analysis
  9. Network Traffic Capturing and Processing
  10. Network Data Analysis
  11. Network Device Forensics
  12. IoT Forensics
  13. Cryptocurrencies
Syllabus of laboratory exercises:
 
  1. Disk Imaging and Data Acquisition
  2. Digital Forensics using Autopsy
  3. Mobile data acquisition and analysis using MobilEdit
  4. Network Forensics using Wireshark
  5. Network Forensics: Flow and Log Analysis
  6. Digital Forensics of Cryptocurrencies
Syllabus - others, projects and individual work of students:
 Performing the investigation of the selected cases. Solving the cases and writing the report.
Fundamental literature:
 
  • Nelson, B, Phillips, A, Enfinger, F, Stuart, C: Guide to Computer Forensics and Investigations, 2nd Ed, Thomson Course Technology, 2006, ISBN: 0-619-21706-5
  • Vacca, J: Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River Media, 2005.
  • Buchanan, W, J: Introduction to Security and Network Forensics, Taylor and Francis, Auerbach Publications, 2011.
  • Davidoff, S, Ham, J: Network Forensics: Tracking Hackers through Cyberspace, Prentice Hall, 2012.
Controlled instruction:
  Controlled activities include a project, computer exercises and the final exam. Missed labs will not be replaced.
Exam prerequisites:
  
  • Earning at least 20 points during the term is required.
  • Minimum of 20 points of the final exam is necessary to pass the course.
 

Your IPv4 address: 54.92.211.239
Switch to IPv6 connection

DNSSEC [dnssec]