Course: Forensic Analysis

» List of faculties » FAI » AUIUI
Course title Forensic Analysis
Course code AUIUI/AE9FA
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Winter
Number of ECTS credits 5
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Malaník David, Ing. Ph.D.
Course content
584/5000 Topics: 1. Introduction to cyber security - focus on digital forensic technologies. 2. Necessary legal minimum for the treatment of traces. 3. What is a digital track. 4. Preparation of data for analysis, disk cloning. 5. Working with images. 6. Extracting digital tracks. 7. Authentication of digital tracks. 8. Storage of digital tracks. 9. Forensic analysis of operating systems. 10. Forensic analysis of network elements. 11. Tracing of communication in LAN / WAN networks. 12. Forensic analysis of mobile devices. 13. SW used for forensic analysis. 14. Creation of reports from forensic analyzes

Learning activities and teaching methods
Lecturing, Demonstration, E-learning
  • Home preparation for classes - 30 hours per semester
prerequisite
Knowledge
Basic orientation in MS Windows and Linux operating systems. Basic orientation in the field of LAN / WAN networks.
Basic orientation in MS Windows and Linux operating systems. Basic orientation in the field of LAN / WAN networks.
learning outcomes
Ability to initially secure data in a security incident. Performing basic digital forensic analysis.
Ability to initially secure data in a security incident. Performing basic digital forensic analysis.
Suggests a method of securing data from the compromised system.
Suggests a method of securing data from the compromised system.
Builds a scenario for basic forensic analysis.
Builds a scenario for basic forensic analysis.
Builds a timeline for the system under investigation.
Builds a timeline for the system under investigation.
Determine how to work with the compromised system.
Determine how to work with the compromised system.
Skills
Seize data from the compromised system.
Seize data from the compromised system.
Prepares forensic analysis according to the assignment.
Prepares forensic analysis according to the assignment.
Analyzes the timeline on the system under investigation.
Analyzes the timeline on the system under investigation.
He'll explain the findings from the digital forensic analysis.
He'll explain the findings from the digital forensic analysis.
teaching methods
Knowledge
Demonstration
Demonstration
Lecturing
E-learning
E-learning
Lecturing
assessment methods
Composite examination (Written part + oral part)
Composite examination (Written part + oral part)
Recommended literature
  • AYMAN, Shaaban-Konstantin Sapronov. Practical Windows forensics: leverage the power of digital forensics for Windows systems. Packt Publishing, 2016. ISBN 9781783554096.
  • Emmett DULANEY. Linux all-in-one for dummies. 5th ed.. Hoboken, NJ, 2014. ISBN 9781118844359.
  • Gerard JOHANSEN. Digital forensics and incident response: a practical guide to deploying forensic techniques in response to cyber security incidents. Packt Publishing, 2017. ISBN 9781787288683.
  • Harlan CARVEY. Windows forensic analysis toolkit: advanced analysis techniques for Windows 8. Fourth edition. Amsterdam; Boston: Syngress, 2014. ISBN 9780124171572.
  • John VACCA. Computer and information security handbook. Second edition. Amsterdam: Morgan Kaufmann, an imprint of Elsevier, 2013. ISBN 9780123943972.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester