
π― Course Overview
This course provides students with the theoretical foundation and hands-on practice required to conduct forensic investigations on compromised digital systems. Learners will perform evidence collection, disk and memory analysis, and log correlation to identify attack patterns. The course emphasizes chain of custody, proper documentation, and forensic reporting.
π§ Learning Outcomes
By the end of this course, learners will be able to:
-
Understand digital forensics principles and investigation methodologies.
-
Acquire, preserve, and verify digital evidence while maintaining chain of custody.
-
Perform file system, memory, and network forensic analysis.
-
Identify artifacts of intrusion and data exfiltration.
-
Prepare and present professional forensic reports.
π Weekly Module Plan
Week 1 β Introduction to Digital Forensics
Topics:
-
Role of digital forensics in cybersecurity
-
Investigation process & lifecycle
-
Chain of custody and evidence handling
-
Legal and ethical considerations (Indian IT Act 2000, evidence admissibility)
Lab 1:
-
Set up a forensic lab environment (Autopsy, FTK Imager, Kali Linux tools).
-
Create a case file and evidence folder structure.
Assignment:
Document chain-of-custody form for a given scenario.
Week 2 β Disk & File System Forensics
Topics:
-
File systems (NTFS, FAT32, EXT4)
-
Deleted file recovery, hidden data, slack space
-
Metadata analysis (timestamps, MFT records)
Lab 2:
-
Acquire a disk image using
FTK Imagerordd. -
Recover deleted files and verify integrity using hash values.
Quiz 1: Forensic evidence handling and file systems.
Week 3 β Memory Forensics
Topics:
-
Memory acquisition techniques
-
Volatile data collection
-
Analysis using Volatility Framework
-
Identifying running processes, network connections, injected code
Lab 3:
-
Capture RAM image using DumpIt/Belkasoft tools.
-
Analyze with Volatility (
pslist,netscan,dlllist,malfind).
Assignment:
Report suspicious activity found in memory analysis.
Week 4 β Log & Network Forensics
Topics:
-
Windows and Linux log analysis
-
Web and email log tracing
-
Network capture analysis (Wireshark, tcpdump)
-
Correlating events across multiple logs
Lab 4:
-
Analyze web server access logs for intrusion attempts.
-
Correlate PCAP data with host logs to identify attack timeline.
Quiz 2: Event correlation and log forensics.
Week 5 β Mobile & Cloud Forensics
Topics:
-
Mobile OS architecture (Android/iOS)
-
Data acquisition (logical, physical, file-system extraction)
-
Cloud evidence challenges (jurisdiction, SaaS artifacts)
Lab 5:
-
Simulate mobile extraction using free tools (e.g., MOBILedit demo, Autopsy mobile plugin).
-
Examine app data and message recovery examples.
Assignment:
Write a brief on challenges in cross-border digital investigations.
Week 6 β Reporting & Incident Response Integration
Topics:
-
Documentation and report writing
-
Timeline reconstruction
-
Incident response coordination (NIST framework)
-
Case presentation & defense
Lab 6 (Capstone):
-
Analyze a simulated intrusion case (provided disk image + logs).
-
Identify attack path, artifacts, and create a full forensic report.
Final Project:
Forensic Investigation Report β βRansomware Incident on Compromised Windows Host.β
Deliverables: Case notes, evidence chain, timeline, and executive summary.
- Teacher: Admin User