EE547 Digital Forensics

Schedule

Wed 13h00-15h30 (lecture in s4214)
Wed 15h30-16h00 (lab in s5104)

References

  • B. Carrier. “File System Forensic Analysis”, Addison Wesley, 2005, 569 p.
  • M.H. Ligh et al., “The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux and Mac Memory”, Wiley, 2014, 886p.
  • Harlan Carvey, “Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8”, 4th Edition, Syngress, 2014, 350p.

Resource

WeekDateLectureReferencesOthersLaboratories
1
10 Sep 25
Intro to digital forensics (recording)Carrier §1-3Lab setup
217 Sep 25Volumes and partitions (recording)Carrier §4-7Lab 1 – Intro to X-Ways
(due 24 Sep at 13h00)
324 Sep 25FAT32 file system (recording)Carrier §8-10Lab 2 – Volumes and Partitions
(due 1 Oct at 13h00)
41 Oct 25NTFS file system (recording)Carrier §11-13Lab 3 – FAT32
(due 8 Oct at 13h00)
58 Oct 25Windows (recording)CarveyLab 4 – NTFS
(due 15 Oct at 13h00)
615 Oct 25Windows (con’t)
Linux (recording)
CarveyLab 5 – Windows 11
(due 22 Oct at 13h00)
722 Oct 25Linux (con’t)Lab 6 – Linux
(due 29 Oct at 13h00)
829 Oct 25Windows Objects (recording)
Process, handles and tokens (recording)
Ligh §1, 3-5
Ligh §6
Must have
selected a
research paper
Lab 7 – Malicious Processes
(due on 5 Nov at 13h00)
95 Nov 25Process memory internals (recording)Ligh §7-8Lab 8 – Rootkits
(due on 12 Nov at 13h00)
1012 Nov 25Kernel forensics and rootkits (recording)Ligh §13Final exercise (Instructions, template)
(due on 3 Dec at 13h00)
1119 Nov 25Final exercise
(recording)
Final exercise
1226 Nov 25No class (work on exercise and presentation)Final exercise
133 Dec 25Student presentations (schedule, eval sheet)
1410 Dec 25No class (end of term)

Scroll to Top