Lesson Plan
Department CSE(CYBER SECURITY) Year III
Semester VI Faculty Name BHARATHI P
Subject code CCS343 Subject Name DIGITAL AND MOBILE FORENSICS
Academic year 2024-2025
Session Topics Planned Required Teaching Text / Brief Completi Remarks HOD / Principal Dean Sign
No. date hour Methodology Reference Description on Date Director Sign
Book Sign
Unit 1: INTRODUCTION TO DIGITAL FORENSICS 6
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process – Introduction – The Identification Phase – The Collection
Phase – The Examination Phase – The Analysis Phase – The Presentation Phase.
Objective: To understand basic digital forensics and techniques.
1 Forensic Science – 04.01.2025 1 Black Board T1 Discuss about
Digital Forensics the Forensic
science and
digital forensics
2 Digital Evidence – 08.01.2025 1 Black Board T1 Discuss about
The Digital How to collect
Forensics Process digital evidence
3 The Identification 08.01.2025 1 Black Board T1 Discuss about
Phase the Digital
forensics process
4 Installation of 8.01.2025 2 Lab based Installation of
Sleuth Kit on Learning Sleuth Kit on
Linux. List all data Linux
blocks. Analyze
allocated as well
as unallocated
blocks of a disk
image.
5 The Collection 11.01.2025 1 PPT T1 Discuss about
Phase the Phases of
Digital forensics.
6 The Examination 18.01.2025 1 Black Board T1 Discuss about
Phase the Phases of
Digital forensics.
7 The Analysis Phase – 22.01.2025 1 Demo Session T1 Discuss about
The Presentation the Phases of
Phase Digital forensics.
8 Data extraction 22.01.2025 2 Lab based Data extraction
from call logs using Learning from call logs
Sleuth Kit. using Sleuth
Kit.
Unit II: DIGITAL CRIME AND INVESTIGATION 6
Digital Crime – Substantive Criminal Law – General Conditions – Offenses – Investigation Methods for Collecting Digital Evidence –
International Cooperation to Collect Digital Evidence
Objective: To understand digital crime and investigation.
10 Digital 25.01.2025 1 Black Board T1,R1,R2 Brief on
Crime Digital crime
11 Substantive 29.01.2025 1 Black Board T1,R1,R2 How to
Criminal enforce
Law criminal law
12 General 29.01.2025 1 PPT T1,R1,R2 Discuss about
Conditions General
conditions of
digital crime.
13 Data 29.01.2025 2 Lab based Data extraction
extraction learning from call logs
from SMS and using Sleuth
contacts Kit.
using Sleuth
Kit
14 Offenses 01.02.2025 1 Black Board T1,R1,R2 Discuss
about the
offenses
15 Investigation 05.02.2025 1 Black Board T1,R1,R2 How to
Methods for collect
Collecting
Digital
digital
Evidence evidences
16 International 05.02.2025 1 PPT T1,R1,R2 International
Cooperation cooperation
to Collect to collect
Digital digital
Evidence evidence.
17 Install Mobile 05.02.25 2 Lab based Installation
Verification learning Mobile
Toolkit or Verification
MVT and Toolkit or MVT
decrypt and decrypt
encrypted iOS encrypted iOS
backups. backups.
CIAT 1
Unit III: DIGITAL FORENSIC READINESS 6
Introduction – Law Enforcement versus Enterprise Digital Forensic Readiness – Rationale for Digital Forensic Readiness – Frameworks, Standards and
Methodologies – Enterprise Digital Forensic Readiness – Challenges in Digital Forensics.
Objective: To understand how to be prepared for digital forensic readiness.
19 Introduction 12.2.25 1 PPT T1,R1,R2 Discuss
about Digital
Forensic
readiness
20 Install Mobile 12.2.25 2 Lab based Install Mobile
Verification learning Verification
Toolkit or Toolkit or MVT
MVT and and decrypt
decrypt encrypted iOS
encrypted iOS backups.
backups.
21 Law 15.2.25 1 PPT T1,R1,R2 Brief about
Enforcement Law
versus
Enterprise Enforcement
Digital .
Forensic
Readiness
22 Rationale for 19.2.25 1 PPT T1,R1,R2 Discuss
Digital about
Forensic
Readiness rationale for
digital
forensics.
23 Frameworks, 19.2.25 1 Black Board T1,R1,R2 Brief about
Standards methodologi
and
Methodologi es.
es
24 Process and 19.2.25 2 Lab based Process and
parse records learning parse records
from the iOS
system.
25 Enterprise 22.2.25 1 PPT T1,R1,R2 Brief about
Digital Enterprise
Forensic digital
Readiness forensic
readiness.
26 Process and 26.2.25 2 Lab based Process and
parse records learing parse records
from the iOS from the iOS
system. system.
27 Challenges 26.2.25 1 PPT T1,R1,R2 Discuss
in Digital about
Forensics challenges.
28 Extract 26.2.25 2 Lab based Extract
installed learning installed
applications applications
from
Andriod
devices
Unit IV: iOS FORENSICS 6
Mobile Hardware and Operating Systems - iOS Fundamentals – Jailbreaking – File System – Hardware – iPhone Security – iOS Forensics –
Procedures and Processes – Tools – Oxygen Forensics – MobilEdit – iCloud
Objective: To understand and use forensics tools for iOS devices.
29 Mobile 1.3.25 1 PPT T1,R1,R2 Introduction
Hardware on Mobile
and Hardware
Operating and OS ios
Systems - fundamentals
iOS
Fundamental
s
30 Jailbreaking 5.3.25 1 PPT T1,R1,R2 Brief about
– File Jailbreaking
System –
Hardware concepts
31 iPhone 5.3.25 1 PPT T1,R1,R2 How to
Security ensure
iphone
security
32 Extract 5.3.25 2 Lab based Extract
diagnostic learning diagnostic
information information
from
Andriod
devices
through
ADB
protocol;
applications
33 iOS 8.3.25 1 Black Board T1,R1,R2 Brief about
Forensics- iOS
Procedures
and forensics
Processes procedures
and
procssses
34 Tools – 12.3.25 1 PPT T1,R1,R2 Brief About
Oxygen Tools
Forensics
oxygen
forensics.
35 MobilEdit – 12.3.25 1 PPT T1,R1,R2 Explain
iCloud Mobile edit.
Unit V: ANDROID FORENSICS 6
Android basics – Key Codes – ADB – Rooting Android – Boot Process – File Systems – Security – Tools – Android Forensics – Forensic
Procedures – ADB – Android Only Tools – Dual Use Tools – Oxygen Forensics – Mobil Edit – Android App Decompiling.
Objective: To understand and use forensics tools for Android devices.
36 Generate a 12.3.25 2 Lab based Generate a
unified learning unified
chronological chronological
timeline of timeline
extracted
records
37 Android 15.3.25 1 Black Board T1,R3 About
basics – Key Android
Codes – ADB. basics.
38 Rooting 19.3.25 1 PPT T1,R3 About the
Android – benefits and
Boot Process features,buil
– File ding blocks.
Systems.
39 Security – 19.3.25 1 PPT T1,R3 Discuss
Tools – about the
Android Security
Forensics. tools
40 Forensic 22.3.25 1 PPT T1,R3 Discuss
Procedures – about the
ADB dual use
41 Android Only 26.3.25 1 Black Board T1,R3 tools and
Tools – Dual procedures
Use Tools.
of ADB.
42 Oxygen 26.3.25 1 PPT T1,R3 About
Forensics. Mobile OS –
oxygen
forensics.
43 Mobil Edit – 29.3.25 1 Collaborative T1,R3 About
Android App team learning Mobile OS
Decompiling. Android
CIAT 2 - -
*Innovative Teaching Methodology:
⚫ PPT
⚫ NPTEL Video Lecture
⚫ Smart Class,
⚫ Lab based Learning
⚫ Activity Based Learning
⚫ Quiz
⚫ Virtual lab
Text Book:
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In-depth Guide to Mobile Device Forensics”, First Edition, CRC Press, 2022..
Reference Book:
1. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River Media, 2005, ISBN: 1-58450-389.
Course Outcome:
CO1: Have knowledge on digital forensics.
CO2: Know about digital crime and investigations.
CO3: Be forensic ready.
CO4: Investigate, identify and extract digital evidence from iOS devices.
CO5: Investigate, identify and extract digital evidence from Android devices.
Signature of Faculty Signature of HOD Signature of Principal/Dean