Course detail

Digital Forensics (in English)

FIT-DFAaAcad. year: 2024/2025

The course focuses on the role of computer forensics and the methods used in the investigation of computer crimes. The course explains the need for proper investigation and illustrates the process of locating, handling, and processing computer evidence. A detailed explanation of how to efficiently manage a forensics investigation and how to preserve and present evidence is covered.

Language of instruction

English

Number of ECTS credits

5

Mode of study

Not applicable.

Entry knowledge

Basic knowledge of operating systems, storage media, networks, and the ability to create simple programs.

Rules for evaluation and completion of the course

  • Project (15 points).
  • Hands-on labs (30 points). Missed labs can only be replaced if there is a serious obstacle in the study. 
  • Final exam (55 points). Minimum of 20 points of the final exam is necessary to pass the course.
 

Controlled activities include the project (15 points), hands-on labs (30 points), and the final exam (55 points). Missed labs can only be replaced if there is a serious obstacle in the study. 

Aims

The aim is to understand principles of computer forensics and the basic concepts used in a computer forensics examination; introduces techniques required for conducting a forensic analysis of systems and data.


Student acquaints basic concepts and principles of computer forensics and skills in a computer forensic examination.

Study aids

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Daren Hayes, Practical Guide to Digital Forensics Investigations, Pearson IT Certification; 2nd edition, 2020. (EN)
Gerard Johansen: Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats, Packt Publishing; 2nd edition, 2020 (EN)

Recommended reading

Bruce Nikkel , Practical Linux Forensics, No Starch Press, 2021 (EN)
Nipun Jaswal: Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools,  Packt Publishing, 2019. (EN)

Classification of course in study plans

  • Programme IT-MGR-1H Master's

    specialization MGH , 0 year of study, summer semester, recommended course

  • Programme MIT-EN Master's 0 year of study, summer semester, compulsory-optional

  • Programme MITAI Master's

    specialization NGRI , 0 year of study, summer semester, elective
    specialization NADE , 0 year of study, summer semester, elective
    specialization NISD , 0 year of study, summer semester, elective
    specialization NMAT , 0 year of study, summer semester, elective
    specialization NSEC , 0 year of study, summer semester, elective
    specialization NISY up to 2020/21 , 0 year of study, summer semester, elective
    specialization NNET , 0 year of study, summer semester, elective
    specialization NMAL , 0 year of study, summer semester, elective
    specialization NCPS , 0 year of study, summer semester, elective
    specialization NHPC , 0 year of study, summer semester, elective
    specialization NVER , 0 year of study, summer semester, elective
    specialization NIDE , 0 year of study, summer semester, elective
    specialization NISY , 0 year of study, summer semester, elective
    specialization NEMB , 0 year of study, summer semester, elective
    specialization NSPE , 0 year of study, summer semester, elective
    specialization NEMB , 0 year of study, summer semester, elective
    specialization NBIO , 0 year of study, summer semester, elective
    specialization NSEN , 0 year of study, summer semester, elective
    specialization NVIZ , 0 year of study, summer semester, elective

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

  1. Introduction to Forensic Investigation
  2. Forensic Data Acquisition
  3. Hands-on Lab: Forensic Data Acquisition and Analysis
  4. Computer Forensic Examination
  5. Hands-on lab: Web Browser Analysis
  6. Network Forensics
  7. Hands-on Lab: Network Forensics using Wireshark
  8. Traffic Tunneling, VPNs, and Covert Channels
  9. Hands-on Lab: Covert Channels Analysis
  10. Malware Forensics
  11. Hands-on Lab: Malware Forensics
  12. Password Recovery 
  13. Hands-on Lab: Password Recovery 

Laboratory exercise

13 hod., compulsory

Teacher / Lecturer

Syllabus

  1. Forensic Data Acquisition and Analysis
  2. Web Browser Analysis
  3. Network Forensics using Wireshark
  4. Covert Channels Analysis
  5. Malware Forensics
  6. Password Recovery 

Project

13 hod., compulsory

Teacher / Lecturer

Syllabus

Performing the investigation of the selected cases. Solving the cases and writing the report.