Course details
Digital Forensics (in English)
DFAa Acad. year 2024/2025 Summer semester 5 credits
The course focuses on the role of computer forensics and the methods used in the investigation of computer crimes. The course explains the need for proper investigation and illustrates the process of locating, handling, and processing computer evidence. A detailed explanation of how to efficiently manage a forensics investigation and how to preserve and present evidence is covered.
Guarantor
Course coordinator
Language of instruction
Completion
Time span
- 26 hrs lectures
- 13 hrs laboratories
- 13 hrs projects
Assessment points
- 55 pts final exam
- 30 pts numeric exercises
- 15 pts projects
Department
Lecturer
Mutua Nelson Makau, M.Sc. (DIFS)
Ryšavý Ondřej, doc. Ing., Ph.D. (DIFS)
Instructor
Learning objectives
The aim is to understand principles of computer forensics and the basic concepts used in a computer forensics examination; introduces techniques required for conducting a forensic analysis of systems and data.
Student acquaints basic concepts and principles of computer forensics and skills in a computer forensic examination.
Prerequisite knowledge and skills
Basic knowledge of operating systems, storage media, networks, and the ability to create simple programs.
Study literature
- Nipun Jaswal: Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools, Packt Publishing, 2019.
- Bruce Nikkel , Practical Linux Forensics, No Starch Press, 2021
Fundamental literature
- Daren Hayes, Practical Guide to Digital Forensics Investigations, Pearson IT Certification; 2nd edition, 2020.
- Gerard Johansen: Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats, Packt Publishing; 2nd edition, 2020
Syllabus of lectures
- Introduction to Forensic Investigation
- Forensic Data Acquisition
- Hands-on Lab: Forensic Data Acquisition and Analysis
- Computer Forensic Examination
- Hands-on lab: Web Browser Analysis
- Network Forensics
- Hands-on Lab: Network Forensics using Wireshark
- Traffic Tunneling, VPNs, and Covert Channels
- Hands-on Lab: Covert Channels Analysis
- Malware Forensics
- Hands-on Lab: Malware Forensics
- Password Recovery
- Hands-on Lab: Password Recovery
Syllabus of laboratory exercises
- Forensic Data Acquisition and Analysis
- Web Browser Analysis
- Network Forensics using Wireshark
- Covert Channels Analysis
- Malware Forensics
- Password Recovery
Syllabus - others, projects and individual work of students
Performing the investigation of the selected cases. Solving the cases and writing the report.
Progress assessment
- Project (15 points).
- Hands-on labs (30 points). Missed labs can only be replaced if there is a serious obstacle in the study.
- Final exam (55 points). Minimum of 20 points of the final exam is necessary to pass the course.
Controlled activities include the project (15 points), hands-on labs (30 points), and the final exam (55 points). Missed labs can only be replaced if there is a serious obstacle in the study.
How to contact the teacher
As part of face-to-face activities. Possibilities of individual consultations during the teacher's consultation hours or at other times by appointment.
Schedule
Day | Type | Weeks | Room | Start | End | Capacity | Lect.grp | Groups | Info |
---|---|---|---|---|---|---|---|---|---|
Wed | lecture | 1., 3., 4., 7., 10., 13. of lectures | A113 | 08:00 | 09:50 | 64 | 1EIT 1MIT 2EIT 2MIT INTE | xx | Ryšavý |
Wed | lecture | 2., 5., 6., 8., 9., 11. of lectures | A113 | 08:00 | 09:50 | 64 | 1EIT 1MIT 2EIT 2MIT INTE | xx | Mutua |
Wed | lecture | 2025-04-30 | A113 | 08:00 | 09:50 | 64 | 1EIT 1MIT 2EIT 2MIT INTE | xx | Hranický |
Wed | laboratory | lectures | O205 | 10:00 | 10:50 | 20 | 1EIT 1MIT 2EIT 2MIT INTE | xx | Mutua |
Wed | laboratory | lectures | O205 | 11:00 | 11:50 | 20 | 1EIT 1MIT 2EIT 2MIT INTE | xx | Mutua |
Course inclusion in study plans