Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Course: COMPUTER FORENSIC LAB

Code: XXXXXX
4 Credits | Semester VI

A. Introduction: The Computer Forensic Laboratory course is designed to provide BCA


students with hands-on experience in digital forensics techniques and tools used to
investigate cybercrimes. Students will learn how to collect, analyze, and preserve
digital evidence from various devices, such as computers, mobile phones, and storage
media. The course emphasizes practical skills development through laboratory
exercises and case studies.

B. Course Outcomes: At the end of the course, students will be able :

[CO.1].To understand the principles and methodologies of digital forensics.


[CO.2].To learn the process of acquiring, preserving, and analyzing digital evidence.
[CO.3].To gain practical experience in using forensic tools and techniques.
[CO.4].To develop skills in reporting findings and presenting evidence in a legal context.
[CO.5].To understand the ethical and legal considerations in computer forensics
investigations.

C. Assessment Plan:

Criteria Description Maximum Marks


Internal Internal Examination 20
Assessment Assignment 05
(Summative)
Attendance 05
End Term Exam End Term Examination 70
(Summative)
Total 100
Attendance A minimum of 75% Attendance is required to be maintained by a student to
(Formative) be qualified for taking up the End Semester examination. The allowance of
25% includes all types of leaves including medical leaves.

D. SYLLABUS

Module 1: Introduction to Computer Forensics


Overview of Digital Forensics
Legal and Ethical Issues in Computer Forensics
Role of Computer Forensic Examiner
Digital Evidence and Chain of Custody
File Systems (FAT, NTFS, Ext)
Data Recovery Techniques
File Carving
Live Data Acquisition

Module 2: Computer Forensic Tools


Introduction to Forensic Tools
Imaging and Analysis Tools
Metadata Analysis
Registry Analysis
Mobile Device Forensics
Introduction to Mobile Device Forensics
Android and iOS Forensics
Extraction and Analysis of Mobile Data

Module 3: Network and Memory Forensics


Introduction to Network Forensics
Packet Capturing and Analysis
Intrusion Detection and Incident Response
Network Forensic Tools
Basics of Memory Forensics
Volatility Framework
Memory Analysis Techniques
Detecting Malware and Rootkits

Module 4: Forensic Report Writing and Presentation


Importance of Forensic Reports
Structure and Components of a Forensic Report
Writing Skills for Forensic Reports
Presenting Findings in Court
Case Studies in Forensic Reports
Practical Exercises in Report Writing
Mock Courtroom Presentations
Peer Review and Feedback on Reports

Module 5: Case Studies and Practical Exercises


Real-world Case Studies
Practical Exercises using Forensic Tools
Mock Investigations
Hands-on Lab Sessions
Group Projects in Forensic Analysis
Presentation of Findings from Case Studies
Review and Discussion of Case Study Outcomes
Final Project Presentation and Evaluation

E. TEXTBOOKS:

"Computer Forensics: Investigation Procedures and Response" by Chuck Easttom and Jeff
Taylor
"Digital Forensics with Open Source Tools" by Cory Altheide and Harlan Carvey
"File System Forensic Analysis" by Brian Carrier

F. REFERENCE BOOKS:
"Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer" by
Joseph Muniz and Aamir Lakhani
"Handbook of Digital Forensics and Investigation" by Eoghan Casey
"Practical Mobile Forensics" by Heather Mahalik and Rohit Tamma
G. Course Articulation Matrix: (Mapping of COs with POs)

COURSE OUTCOME CORRELATION WITH PROGRAM OUTCOMES CORRELATION WITH


CO PROGRAM SPECIFIC
STATEMENT OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1 To understand the
principles and
1 1 2 1 - - 2 - 1 2 - -
methodologies of
digital forensics.
CO2 To learn the process of
acquiring, preserving,
2 3 1 2 - 2 - 1 1 1 2 1 -
and analyzing digital
evidence.
CO3 To gain practical
experience in using
1 2 1 - 1 - - 2 3 - 1
forensic tools and
techniques.
CO4 [CO.4].To develop
skills in reporting
findings and presenting 1 1 2 1 - 1 - 1 1 - 2 - -
evidence in a legal
context.
CO5 To understand the
ethical and legal
considerations in 1 3 2 3 - - - - - - 1 1
computer forensics
investigations.
1- Low Correlation; 2- Moderate Correlation; 3- Substantial Correlation

You might also like