FRM Course Syllabus IPDownload
FRM Course Syllabus IPDownload
CO1 :: describe the fundamentals of computer forensics and incident response handling process.
CO5 :: analyze web attacks, dark web and explore email crime
CO6 :: analyze malware behavior on system properties and identify indicators of compromise.
Unit I
Understand computer forensics : Understand the Fundamentals of Computer Forensics,
Understand Cybercrimes and their Investigation Procedures, Understand Digital Evidence, Understand
Forensic Readiness, Incident Response, and the Role of SOC (Security Operations Center) in
Computer Forensics, Identify the Roles and Responsibilities of a Forensic Investigator
Computer Forensics Investigation Process : Understand the Forensic Investigation Process and
Its Importance, Understand the Pre-investigation Phase, Understand First Response, Understand the
Investigation Phase.
Unit II
Understanding Hard Disks and File Systems : Describe Different Types of Disk Drives, Explain the
Logical Structure of a Disk, Understand Booting Process of Windows and Linux, Understand Various
File Systems of Windows and Linux, Examine File System Using Autopsy, Understand Storage
Systems, Understand Encoding Standards and Hex Editors
Unit III
Data Acquisition and Duplication : Understand Data Acquisition Fundamentals, Understand Data
Acquisition Methodology, Prepare an Image for Examination
Windows Forensics : Collect Volatile and Non-volatile Information, Perform Windows Memory and
Registry Analysis, Examine the Cache, Cookie and History Recorded in Web Browsers, Examine
Windows Files and Metadata, Understand Text- based Logs and Windows Event Logs
Unit IV
Linux : Understand Volatile and Non-volatile Data in Linux, Analyze File system Image, Demonstrate
Memory Forensics.
Network Forensics : Understand Network Forensics, Explain Logging Fundamentals and Network
Forensic Readiness, Summarize Event Correlation Concepts, Identify Indicators of Compromise (IoCs)
from Network Logs, Investigate Network Traffic.
Unit V
Dark Web Forensics : Understand the Dark Web
Investigating Email Crimes : Understand Email Basics, Understand Email Crime Investigation and
its Steps.
Investigating the web attacks : intrusion detection system, intrusion prevention system, web
application firewall, attacks on web applications
Unit VI
Analysis of Malware : Define Malware and Identify the Common Techniques Attackers Use to
Spread Malware, Understand Malware Forensics Fundamentals and Recognize Types of Malware
Analysis, Understand and Perform Static Analysis of Malware, Analyze Suspicious Word and PDF
Documents, Understand Dynamic Malware Analysis Fundamentals and Approaches, Analyze Malware
Behavior on System Properties in Real-time, Analyze Malware Behavior on Network in Real-time,
Describe Fileless Malware Attacks and How they Happen
• nmap
Network-Evidence Analysis
• Analysis of packet information and gaining overall sense of traffic contained within a packet capture
with the help of Wireshark
Network Log Analysis
• Analyzing network log files with help of DNS Blacklists
• keyword searching
• and web and email artifacts and to filter results on known bad file hashes using Autopsy.
Integrity Check
• MD5 Sum Utility
Window Investigation
• Demonstration of window investigation using OS Forensics
Text Books:
1. DIGITAL FORENSICS AND INCIDENT RESPONSE by GERARD JOHANSEN, PACKT
PUBLISHING
References:
1. INCIDENT RESPONSE & COMPUTER FORENSICS by JASON LUTTGENS, MATTHEW PEPE
AND KEVIN MANDIA, Mc Graw Hill Education