Course Contents/Structure
Theoretical education: Physical nature of magnetic disk, optical discs and semiconductor memory. System overview for file processing and data structure in files. The technique of entry and systemic formatting of data under different systems. Find, analyze, and recover destroyed digital data. Collecting and organizing data relevant to the security incident. Presentation of evidence. Hacking tools. Application of digital tools Forensics. Recovery from the disaster catastrophe drops into the system. Assessing system security to prevent future attacks. Computer records and legal framework.
Practical training: Use of ready hardware-software tools as well as development of specific tools for forensic data analysis, like log files. EnCase, Forensic Toolbox, NProtect, Honeycomb, Windows Recycle Bins, Norton NProtect.
|
1. Britz, M. T.: Computer forensics and cyber crime: an introduction, Upper Saddle River: Pearson Prentice Hall, 2004.
2. Stephenson, P.: Investigating computer-related crime, Boca Raton, Fla [etc.]: CRC Press, 2000.
3. Nelson, B.[et al.]: Guide to computer forensics and investigations, Boston: Thomson Course Technology, 2006.
4. Kruse, W.G.; Heiser, J.G.: Computer forensics: incident response essentials, Boston [etc.]:
Addison-Wesley, 2004.
5. Shinder, D.L.: Scene of the cybercrime: computer forensics handbook, Rockland, MA:
Syngress, 2002.
|