YoVDO

Digital Forensics

Offered By: Uttarakhand Open University, Haldwani via Swayam

Tags

Digital Forensics Courses Data Analysis Courses Cybersecurity Courses Password Cracking Courses Network Forensics Courses

Course Description

Overview

Computer forensics, or digital forensics, is a fairly new field. Computer forensics investigators, also known as computer forensics specialists, computer forensics examiners, or computer forensics analysts, are charged with uncovering and describing the information contained on, or the state or existence of, a digital artifact. Digital artifacts include computer systems, hard drives, CDs, and other storage devices, as well as electronic documents and files like emails and JPEG images. The fast-growing field of computer forensics includes several branches related to firewalls, networks, databases, and mobile devices. Digital forensics technicians can find work with many types of organizations: government (local, state, and federal), accounting firms, law firms, banks, and software development companies. Essentially, any kind of organization that has a computer system may have a need for a digital forensics specialist. Some digital forensics specialists opt to start their own businesses, giving them an opportunity to work with a variety of clients. Computer forensics investigators provide many services based on gathering digital information, from investigating computer systems and data in order to present information for legal cases to determining how an unauthorized user hacked into a system. A digital forensics examiner does many things in the course of these tasks – protects the computer system, recovers files (including those that were deleted or encrypted), analyses data found on various disks, and provides reports, feedback, and even testimony when required. The employment outlook for digital forensics examiners and investigators is favorable due to the rapid growth of crimes involving computers (cybercrime). Learning Outcomes After the successful completion of this course, the learner will be able to: A. Understand the importance of a systematic procedure for investigation of data found on digital storage media that might provide evidence of wrong-doing. B. Understand the file system storage mechanisms of the operating systems. C. Use tools for faithful preservation of data on disks for analysis. D. Find data that may be clear or hidden on a computer disk. E. Learn the use of computer forensics tools used in data analysis, such as searching, absolute disk sector viewing and editing, recovery of files, password cracking, etc. F. Understand how to present the results of disk data analysis in a court proceeding as an expert witness.

Syllabus

WEEK

TOPIC

MODULE




Week 1




Introduction to Digital Forensic

Definition of Computer Forensics

Cyber Crime

Evolution of Computer Forensics

Objectives of Computer Forensics

Roles of Forensics Investigator

Forensics Readiness

Steps for Forensics



Week 2



Computer Forensics Investigation Process

Digital Forensics Investigation Process

Digital Forensics Investigation Process-Assessment Phase

Acquire the Data

Analyze the Data

Report the Investigation


Week 3


Digital Evidence and First Responder Procedure

Digital Evidence

Digital Evidence Investigation Process

First Responders Toolkit

Issues Facing Computer Forensics

Types of Investigation

Techniques in digital forensics



Week 4



Understanding Storage Media and File System

The Booting Process

LINUX Boot Process

Mac OS Boot Sequence

Windows 10 Booting Sequence

File System

Type of File Systems






Week 5






Windows Forensics

Introduction to Windows Forensics

Windows Forensics Volatile Information

Windows Forensics Non- Volatile Information

Recovering deleted files and partitions

Windows Forensics Summary

Digital Forensics Road map: Static Data Acquisition from windows using FTK Imager

Live Data Acquisition using FTK Imager

FTK Imager

Installation of KALI Linux

RAM Dump Analysis using Volatility

Static Data Acquisition from Linux OS



Week 6



Recovering Deleted Files and Partitions

Digital Forensics Tools

Overview of EnCase Forensics

Deep Information Gathering Tool: Dmitry Page

Computer Forensics Live Practical by using Autopsy and FTK Imager






Week 7






Network Forensics

Introduction to Network Forensics

Network Components and their forensic importance

OSI internet Layers and their Forensic importance

Tools Introduction Wireshark and TCPDUMP

Packet Sniffing and Analysis using Ettercap and Wireshark

Network Forensics

Wireshark Packet Analyzer

Packet Capture using TCP DUMP

Website Penetration: WHOIS, nslookup




Week 8




Logs & Event Analysis

Forensic Analysis using AUTOPSY: Linux and Windows

Forensics and Log analysis

Compare and AUDIT Evidences using Hashdeep Page

Data Carving using Bulk Extractor: Kali Linux and Windows

Recovering Evidence from Forensic Images using Foremost



Week 9



Application Password Cracking

Introduction to Password Cracking

Password Cracking using John the Ripper

Password Cracking using Rainbow Tables

PDF File Analysis

Remote Imaging using E3 Digital Forensics






Week 10






Wireless and Web Attacks

WiFi Packet Capture and Password Cracking using Aircrack ng

Introduction to Web Attacks

Website Copier: HTTRACK

SQL Injection

Site Report Generation: Netcraft

Vulnerability Analysis: Nikto

Wayback Machine

Deep Information Gathering Tool: Dmitry

Image Metadata Extraction using Imago

Week 11

Email Forensics Investigation

Email Forensics Investigations



Week 12


Mobile Device Forensics

Mobile Forensics

Preparation for Digital Forensic investigation

Investigative reports, expert witness and cyber regulations

Introduction to Report Writing

Forensic Reports & Expert Witness

Demonstration of Some Forensics Tools

Demonstration of Some Forensics Tools


Taught by

Dr. Jeetendra Pande

Tags

Related Courses

Basics of Amazon Detective (Indonesian)
Amazon Web Services via AWS Skill Builder
Computer Forensics
Rochester Institute of Technology via edX
Computer Forensics
Infosec via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Computer Hacking and Forensics Course
Cybrary