Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
121 views8 pages

DMF Lessonplan

Uploaded by

Vanitha M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views8 pages

DMF Lessonplan

Uploaded by

Vanitha M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Lesson Plan

Department CSE(CYBER SECURITY) Year III


Semester VI Faculty Name BHARATHI P
Subject code CCS343 Subject Name DIGITAL AND MOBILE FORENSICS
Academic year 2024-2025

Session Topics Planned Required Teaching Text / Brief Completi Remarks HOD / Principal Dean Sign
No. date hour Methodology Reference Description on Date Director Sign
Book Sign
Unit 1: INTRODUCTION TO DIGITAL FORENSICS 6
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process – Introduction – The Identification Phase – The Collection
Phase – The Examination Phase – The Analysis Phase – The Presentation Phase.
Objective: To understand basic digital forensics and techniques.
1 Forensic Science – 04.01.2025 1 Black Board T1 Discuss about
Digital Forensics the Forensic
science and
digital forensics
2 Digital Evidence – 08.01.2025 1 Black Board T1 Discuss about
The Digital How to collect
Forensics Process digital evidence
3 The Identification 08.01.2025 1 Black Board T1 Discuss about
Phase the Digital
forensics process

4 Installation of 8.01.2025 2 Lab based Installation of


Sleuth Kit on Learning Sleuth Kit on
Linux. List all data Linux
blocks. Analyze
allocated as well
as unallocated
blocks of a disk
image.
5 The Collection 11.01.2025 1 PPT T1 Discuss about
Phase the Phases of
Digital forensics.
6 The Examination 18.01.2025 1 Black Board T1 Discuss about
Phase the Phases of
Digital forensics.
7 The Analysis Phase – 22.01.2025 1 Demo Session T1 Discuss about
The Presentation the Phases of
Phase Digital forensics.
8 Data extraction 22.01.2025 2 Lab based Data extraction
from call logs using Learning from call logs
Sleuth Kit. using Sleuth
Kit.
Unit II: DIGITAL CRIME AND INVESTIGATION 6
Digital Crime – Substantive Criminal Law – General Conditions – Offenses – Investigation Methods for Collecting Digital Evidence –
International Cooperation to Collect Digital Evidence
Objective: To understand digital crime and investigation.
10 Digital 25.01.2025 1 Black Board T1,R1,R2 Brief on
Crime Digital crime
11 Substantive 29.01.2025 1 Black Board T1,R1,R2 How to
Criminal enforce
Law criminal law
12 General 29.01.2025 1 PPT T1,R1,R2 Discuss about
Conditions General
conditions of
digital crime.
13 Data 29.01.2025 2 Lab based Data extraction
extraction learning from call logs
from SMS and using Sleuth
contacts Kit.
using Sleuth
Kit
14 Offenses 01.02.2025 1 Black Board T1,R1,R2 Discuss
about the
offenses
15 Investigation 05.02.2025 1 Black Board T1,R1,R2 How to
Methods for collect
Collecting
Digital
digital
Evidence evidences
16 International 05.02.2025 1 PPT T1,R1,R2 International
Cooperation cooperation
to Collect to collect
Digital digital
Evidence evidence.
17 Install Mobile 05.02.25 2 Lab based Installation
Verification learning Mobile
Toolkit or Verification
MVT and Toolkit or MVT
decrypt and decrypt
encrypted iOS encrypted iOS
backups. backups.
CIAT 1
Unit III: DIGITAL FORENSIC READINESS 6
Introduction – Law Enforcement versus Enterprise Digital Forensic Readiness – Rationale for Digital Forensic Readiness – Frameworks, Standards and
Methodologies – Enterprise Digital Forensic Readiness – Challenges in Digital Forensics.
Objective: To understand how to be prepared for digital forensic readiness.
19 Introduction 12.2.25 1 PPT T1,R1,R2 Discuss
about Digital
Forensic
readiness
20 Install Mobile 12.2.25 2 Lab based Install Mobile
Verification learning Verification
Toolkit or Toolkit or MVT
MVT and and decrypt
decrypt encrypted iOS
encrypted iOS backups.
backups.
21 Law 15.2.25 1 PPT T1,R1,R2 Brief about
Enforcement Law
versus
Enterprise Enforcement
Digital .
Forensic
Readiness
22 Rationale for 19.2.25 1 PPT T1,R1,R2 Discuss
Digital about
Forensic
Readiness rationale for
digital
forensics.
23 Frameworks, 19.2.25 1 Black Board T1,R1,R2 Brief about
Standards methodologi
and
Methodologi es.
es
24 Process and 19.2.25 2 Lab based Process and
parse records learning parse records
from the iOS
system.
25 Enterprise 22.2.25 1 PPT T1,R1,R2 Brief about
Digital Enterprise
Forensic digital
Readiness forensic
readiness.
26 Process and 26.2.25 2 Lab based Process and
parse records learing parse records
from the iOS from the iOS
system. system.
27 Challenges 26.2.25 1 PPT T1,R1,R2 Discuss
in Digital about
Forensics challenges.
28 Extract 26.2.25 2 Lab based Extract
installed learning installed
applications applications
from
Andriod
devices
Unit IV: iOS FORENSICS 6
Mobile Hardware and Operating Systems - iOS Fundamentals – Jailbreaking – File System – Hardware – iPhone Security – iOS Forensics –
Procedures and Processes – Tools – Oxygen Forensics – MobilEdit – iCloud
Objective: To understand and use forensics tools for iOS devices.
29 Mobile 1.3.25 1 PPT T1,R1,R2 Introduction
Hardware on Mobile
and Hardware
Operating and OS ios
Systems - fundamentals
iOS
Fundamental
s
30 Jailbreaking 5.3.25 1 PPT T1,R1,R2 Brief about
– File Jailbreaking
System –
Hardware concepts
31 iPhone 5.3.25 1 PPT T1,R1,R2 How to
Security ensure
iphone
security
32 Extract 5.3.25 2 Lab based Extract
diagnostic learning diagnostic
information information
from
Andriod
devices
through
ADB
protocol;
applications
33 iOS 8.3.25 1 Black Board T1,R1,R2 Brief about
Forensics- iOS
Procedures
and forensics
Processes procedures
and
procssses
34 Tools – 12.3.25 1 PPT T1,R1,R2 Brief About
Oxygen Tools
Forensics
oxygen
forensics.
35 MobilEdit – 12.3.25 1 PPT T1,R1,R2 Explain
iCloud Mobile edit.
Unit V: ANDROID FORENSICS 6
Android basics – Key Codes – ADB – Rooting Android – Boot Process – File Systems – Security – Tools – Android Forensics – Forensic
Procedures – ADB – Android Only Tools – Dual Use Tools – Oxygen Forensics – Mobil Edit – Android App Decompiling.
Objective: To understand and use forensics tools for Android devices.
36 Generate a 12.3.25 2 Lab based Generate a
unified learning unified
chronological chronological
timeline of timeline
extracted
records
37 Android 15.3.25 1 Black Board T1,R3 About
basics – Key Android
Codes – ADB. basics.
38 Rooting 19.3.25 1 PPT T1,R3 About the
Android – benefits and
Boot Process features,buil
– File ding blocks.
Systems.
39 Security – 19.3.25 1 PPT T1,R3 Discuss
Tools – about the
Android Security
Forensics. tools
40 Forensic 22.3.25 1 PPT T1,R3 Discuss
Procedures – about the
ADB dual use
41 Android Only 26.3.25 1 Black Board T1,R3 tools and
Tools – Dual procedures
Use Tools.
of ADB.
42 Oxygen 26.3.25 1 PPT T1,R3 About
Forensics. Mobile OS –
oxygen
forensics.
43 Mobil Edit – 29.3.25 1 Collaborative T1,R3 About
Android App team learning Mobile OS
Decompiling. Android
CIAT 2 - -

*Innovative Teaching Methodology:


⚫ PPT
⚫ NPTEL Video Lecture
⚫ Smart Class,
⚫ Lab based Learning
⚫ Activity Based Learning
⚫ Quiz
⚫ Virtual lab

Text Book:
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In-depth Guide to Mobile Device Forensics”, First Edition, CRC Press, 2022..

Reference Book:
1. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River Media, 2005, ISBN: 1-58450-389.
Course Outcome:
CO1: Have knowledge on digital forensics.
CO2: Know about digital crime and investigations.
CO3: Be forensic ready.
CO4: Investigate, identify and extract digital evidence from iOS devices.
CO5: Investigate, identify and extract digital evidence from Android devices.

Signature of Faculty Signature of HOD Signature of Principal/Dean

You might also like