Dif Syllabus
Dif Syllabus
MODULE 1 : 15
Hours
Introduction to Digital Forensic, Classification of Digital Forensics, Understanding File
System, Operating Systems, Windows Registry, Role of Cyber forensic examiner, Prevention
of Breach / incident, Digital Forensic Lifecycle, Windows Process and Monitoring tools,
Hardware Analysis, NTT Data Service, Hard disk structure and Analysis. Working with the
Images, Version control system, Containers, Hashing, File Integrity and File Formats,
Windows System Artifacts, Linux System Artifacts, Chain of custody, Seizing Evidence,
Documentation of evidences, Swapping the data, Log Aggregators, Structure of the legal
system, Privacy legislation in Asia.
MODULE 2 : 15
Hours
Investigation Process, Documentation of Evidences, Obtaining Evidence, Seizing Evidence,
Phases in Digital forensic Investigation, Witness Reporting, Digital forensic tool kit,
Different roles in digital forensic investigation, Evidence collection procedures for volatile
and non-volatile memory. File signature and file format analysis, Validation of Testing
Resources, Proprietary and open-source applications, USI Data Analyst.
MODULE 3 : 15
Hours
Creating forensic imaging using FTK and Prodiscover tool, Digital Corpora, Digital forensic
tool testing, Electronic Discovery (e-Discovery), Anti Money Laundering (AML), Technique
and process of Image forensics, Data Wrangling: Alteryx, Trifacta, Data Visualization,
Network forensics and incident response, Networking Devices, VoIP, IR, STIX, TAXII and
Cybox, APT, investigating a network attack, Technique used for detecting and recovering of
deleted partitions, Introduction to steganography, Data recovery and process & Techniques.
Case Studies: Silk Road, Las Vegas, Massacre, Cyber Bullying, BTK. IoT Forensic, Wireless
Forensic, Cryptography analysis, MICRO Chipping, Action cameras, Police safety, Police
Vehicles, Vehicle Forensic, NCMEC(National centre for missing and exploited children)
PRACTICALS CREDIT
01
1. Locating forensic artefacts from on HDD using ProDiscover.
7. Network traffic capture and analysis using WireShark and Network Miner.
10. File signature and file format analysis using HxD Editor.