0% found this document useful (0 votes)
19 views2 pages

Dif Syllabus

Uploaded by

jejev42418
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

Dif Syllabus

Uploaded by

jejev42418
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF FORENSIC SCIENCE

NEP SYLLABUS 2022 BATCH ONWARDS


I SEMESTER
M.Sc. DIGITAL FORENSICS AND INFORMATION SECURITY
DIGITAL FORENSIC INVESTIGATION (HC 4)

CONTACT HOURS: 45 CREDITS: 03

MODULE 1 : 15
Hours
Introduction to Digital Forensic, Classification of Digital Forensics, Understanding File
System, Operating Systems, Windows Registry, Role of Cyber forensic examiner, Prevention
of Breach / incident, Digital Forensic Lifecycle, Windows Process and Monitoring tools,
Hardware Analysis, NTT Data Service, Hard disk structure and Analysis. Working with the
Images, Version control system, Containers, Hashing, File Integrity and File Formats,
Windows System Artifacts, Linux System Artifacts, Chain of custody, Seizing Evidence,
Documentation of evidences, Swapping the data, Log Aggregators, Structure of the legal
system, Privacy legislation in Asia.

MODULE 2 : 15
Hours
Investigation Process, Documentation of Evidences, Obtaining Evidence, Seizing Evidence,
Phases in Digital forensic Investigation, Witness Reporting, Digital forensic tool kit,
Different roles in digital forensic investigation, Evidence collection procedures for volatile
and non-volatile memory. File signature and file format analysis, Validation of Testing
Resources, Proprietary and open-source applications, USI Data Analyst.

MODULE 3 : 15
Hours
Creating forensic imaging using FTK and Prodiscover tool, Digital Corpora, Digital forensic
tool testing, Electronic Discovery (e-Discovery), Anti Money Laundering (AML), Technique
and process of Image forensics, Data Wrangling: Alteryx, Trifacta, Data Visualization,
Network forensics and incident response, Networking Devices, VoIP, IR, STIX, TAXII and
Cybox, APT, investigating a network attack, Technique used for detecting and recovering of
deleted partitions, Introduction to steganography, Data recovery and process & Techniques.
Case Studies: Silk Road, Las Vegas, Massacre, Cyber Bullying, BTK. IoT Forensic, Wireless
Forensic, Cryptography analysis, MICRO Chipping, Action cameras, Police safety, Police
Vehicles, Vehicle Forensic, NCMEC(National centre for missing and exploited children)

PRACTICALS CREDIT
01
1. Locating forensic artefacts from on HDD using ProDiscover.

2. RAM acquisition using MAGNET RAM capture.

3. Analysis of memory using Volatility tool

4. Bit-to-bit imaging using FTK and DD image creator.

5. Analysis of image using AUTOPSY and file recovery using RECUVA.

6. Registry analysis using Registry Recon.

7. Network traffic capture and analysis using WireShark and Network Miner.

8. Steganography and checking of file integrity using HashCalc.

9. Extraction of information from photos and files using EXIF tools.

10. File signature and file format analysis using HxD Editor.

You might also like