Skip to main content

Cyber Forensic Analysis: Course Outline

Cyber forensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves electronic data storage extraction for legal purposes.


- Forensics fundamentals and Investigation Processes

  • Data collection
  • Data Identification, searching
  • Data Acquisition and seizure
  • Data duplication/ data carving
  • Collecting digital evidence
  • Incident handling
  • Computer forensics tools

- File systems and  hard-disk Forensics

  • Hard drives, portable drives, CD, DVDs  etc
  • Multi partions , multi volume disks, server partions etc.
  • FAT /NTFS/ext2/ext3  file systems
  • Windows /Linux boot processes
  • Virtual machines
  • USB forensics
  • Registry Forensics

- Steganography

  • Digital image Steganography
  • Steganalysis
  • Image file forensics
  • Audio file forensics

- Network forensics

  • Analysis of network components logs
  • Investigation network traffics
  • Router forensics
  • Using Snort , Wire shark as network forensics tools

- Investigating attacks, Investigating Internet crimes/web browsers forensics, investigation of Emails and email crimes

  • Web attacks
  • Dos attacks
  • Social Networking 

- Mobile forensics, Forensics/investigative  reports, witnessing in court, ethics for forensics expert, existing cyber crimes laws of    Pakistan, forensics process models, mobile forensics tools

Text Books

Reference Material

Other Books (Full Text)