What you'll learn

This course provides foundational knowledge of digital forensics and cyber security, focusing on mobile and computer forensics, cyber threats, data acquisition, authentication mechanisms, intrusion detection, cryptography, and digital evidence handling. Students will gain practical exposure to forensic tools such as Autopsy and FTK Imager, event log analysis, forensic reporting, and courtroom presentation of digital evidence. Learning Outcomes After successful completion of this course, learners will be able to: Explain the fundamentals of digital forensics, cyber security, mobile forensics, and computer forensic investigation techniques. Apply forensic tools and data acquisition methods to identify, preserve, analyze, and document digital evidence from various devices and systems. Evaluate cyber threats, authentication mechanisms, and legal aspects related to admissibility of digital evidence, and prepare professional forensic reports for court presentation.

  • Introduces principles of digital forensics, cyber security concepts, types of cybercrimes, digital evidence handling, and the role of forensic investigators in cyber incident investigations.
  • Covers fundamentals of mobile forensic investigations, evidence extraction techniques, mobile device handling, and challenges associated with smartphone and tablet examinations.
  • Explains major mobile operating systems, cellular network technologies, communication protocols, and their significance in forensic examination and data recovery processes.
  • Discusses forensic examination of SIM cards, recovery of stored information, and advanced chip-off techniques for extracting data from damaged devices.
  • Introduces computer forensic procedures including evidence collection, preservation, analysis of storage media, and identification of digital traces from computer systems.
  • Describes logical, physical, and live acquisition techniques used to collect digital evidence while maintaining integrity and authenticity during investigations.
  • Examines common cyber threats, malware, phishing, network attacks, vulnerabilities, and methods used to identify and mitigate cyber security risks.
  • Explains authentication mechanisms, password security, biometrics, authorization methods, and access control models used to protect digital systems and information.
  • Covers concepts of intrusion detection and prevention systems, monitoring techniques, threat identification, alert generation, and network security management practices.
  • Discusses legal principles governing digital evidence, chain of custody, evidence integrity, documentation requirements, and courtroom admissibility standards.
  • Introduces cryptographic concepts, encryption methods, hashing algorithms, digital signatures, and their applications in securing and verifying digital evidence.
  • Provides practical exposure to Autopsy for analyzing file systems, recovering deleted files, keyword searching, and generating forensic reports.
  • Demonstrates the use of FTK Imager for forensic imaging, previewing evidence, creating disk images, and preserving digital evidence integrity.
  • Explains techniques for analyzing system and application event logs to identify suspicious activities, security incidents, and user actions during investigations.
  • Focuses on preparing professional forensic reports, documenting findings clearly, presenting evidence effectively, and providing expert testimony in court proceedings.

Dr. Vinayak Gupta
Assistant Professor

Dr Vinayak Gupta, Assistant Professor