Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Cyber Forensic Analysis: Course Outline

Cyber forensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves electronic data storage extraction for legal purposes.


- Forensics fundamentals and Investigation Processes

  • Data collection
  • Data Identification, searching
  • Data Acquisition and seizure
  • Data duplication/ data carving
  • Collecting digital evidence
  • Incident handling
  • Computer forensics tools

- File systems and  hard-disk Forensics

  • Hard drives, portable drives, CD, DVDs  etc
  • Multi partions , multi volume disks, server partions etc.
  • FAT /NTFS/ext2/ext3  file systems
  • Windows /Linux boot processes
  • Virtual machines
  • USB forensics
  • Registry Forensics

- Steganography

  • Digital image Steganography
  • Steganalysis
  • Image file forensics
  • Audio file forensics

- Network forensics

  • Analysis of network components logs
  • Investigation network traffics
  • Router forensics
  • Using Snort , Wire shark as network forensics tools

- Investigating attacks, Investigating Internet crimes/web browsers forensics, investigation of Emails and email crimes

  • Web attacks
  • Dos attacks
  • Social Networking 

- Mobile forensics, Forensics/investigative  reports, witnessing in court, ethics for forensics expert, existing cyber crimes laws of    Pakistan, forensics process models, mobile forensics tools

Text Books

Reference Material

Other Books (Full Text)