Course Objectives

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Program : Diploma in Cyber Forensics and Information Security

Course Code : 4289 Course Title: Cyber Forensics Lab

Semester : 4 Credits: 1.5

Course Category: Program Core

Periods per week: 3 (L:0 T:0 P:3) Periods per semester: 45

Course Objectives:

 To study various forensics tools for forensic investigation.


 Recover deleted files.
 Use of Autopsy for live forensic investigation.

Course Prerequisites:

Course
Topic Course Name Semester
Code
Basic Knowledge in Computer Introduction to IT Systems
1
Systems Lab
Problem Solving and
Basic Programming Knowledge 2
Programming
Database Management
Basic Knowledge in Database 3
Systems

Course Outcomes:

On completion of the course student will be able to:

Duration
COn Description Cognitive Level
(Hours)
CO1 Create a Forensic image using FTK Imager 10 Applying

Implement Data Acquisition, acquisition of cell


CO2 10 Applying
phones and mobile phones
Recovering and inspecting deleted files using
CO3 10 Applying
forensic tools
CO4 Generate report using ProDiscover and FTK 09 Applying

Lab Test 6
CO – PO Mapping

Course
PO1 PO2 PO3 PO4 PO5 PO6 PO7
Outcomes
CO1 3 3

CO2 3 3

CO3 3 3

CO4 3 3 1

3-Strongly mapped, 2-Moderately mapped, 1-Weakly mapped

Course Outline

Module Duration Cognitive


Outcomes Name of Experiment (Hours) Level

CO1 Create a Forensic image using FTK Imager

Study of Computer Forensics and different tools


M1.01 5 Understanding
used for forensic investigation
Create a Forensic image using FTK Imager, create
M1.02 forensic image, check integrity of data, analyze 5 Applying
forensic image.

CO2 Implement Data Acquisition, acquisition of cell phones and mobile phones
Perform data Acquisition using USB write
M2.01 5 Applying
Blocker+ FTK imager
M2.02 Acquisition of cell phones and mobile phones 5 Applying

Lab Test – I 3

CO3 Recovering and inspecting deleted files using forensic tools

M3.01 Create a malicious document 2 Applying

M3.02 Delete the file 2 Applying

M3.03 Create an image 3 Applying

M3.04 Recover deleted file 3 Applying

CO4 Generate report using ProDiscover and FTK

M4.01 Create report using ProDiscover 3 Applying


M4.02 Create report using FTK 3 Applying
M4.03 Open ended projects** 3
Lab Test – II 3

**Sample Open Ended Projects

(Not for End Semester Examination but compulsory to be included in Continuous


Internal Evaluation.
Students can do open-ended experiments as a group of 2-3. There is no duplication in
experiments between groups.)

1. Study the steps for hiding and extract any text file behind an image file/audio file
using command prompt
2. Live forensic case investigation using Autopsy

Text / Reference:

T/R Book Title/Author


David Benton and Frank Grindstaff ,Practical guide to Computer Forensics -
T1 Book Surge Publishing,2006, ISBN-10: 1419623877

Online Resources:

Sl.No Website Link

1 https://www.geeksforgeeks.org/how-to-create-a-forensic-image-with-ftk-imager/
https://medium.com/@tusharcool118/autopsy-tutorial-for-digital-forensics-
2
707ea5d5994d

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy