PTCCS343 Digital and Mobile Forensics Syllabus:
PTCCS343 Digital and Mobile Forensics Syllabus – Anna University Part time Regulation 2023
COURSE OBJECTIVES:
To understand basic digital forensics and techniques.
To understand digital crime and investigation.
To understand how to be prepared for digital forensic readiness.
To understand and use forensics tools for iOS devices.
To understand and use forensics tools for Android devices.
UNIT I INTRODUCTION TO DIGITAL FORENSICS
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process – Introduction – The Identification Phase – The Collection Phase – The Examination Phase – The Analysis Phase – The Presentation Phase
UNIT II DIGITAL CRIME AND INVESTIGATION
Digital Crime – Substantive Criminal Law – General Conditions – Offenses – Investigation Methods for Collecting Digital Evidence – International Cooperation to Collect Digital Evidence
UNIT III DIGITAL FORENSIC READINESS
Introduction – Law Enforcement versus Enterprise Digital Forensic Readiness – Rationale for Digital Forensic Readiness – Frameworks, Standards and Methodologies – Enterprise Digital Forensic Readiness – Challenges in Digital Forensics
UNIT IV iOS FORENSICS
Mobile Hardware and Operating Systems – iOS Fundamentals – Jailbreaking – File System – Hardware – iPhone Security – iOS Forensics – Procedures and Processes – Tools – Oxygen Forensics – MobilEdit – iCloud
UNIT V ANDROID FORENSICS
Android basics – Key Codes – ADB – Rooting Android – Boot Process – File Systems – Security – Tools – Android Forensics – Forensic Procedures – ADB – Android Only Tools – Dual Use Tools – Oxygen Forensics – MobilEdit – Android App Decompiling
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1: Have knowledge on digital forensics.
CO2: Know about digital crime and investigations.
CO3: Be forensic ready.
CO4: Investigate, identify and extract digital evidence from iOS devices.
CO5: Investigate, identify and extract digital evidence from Android devices.
30 PERIODS
LAB EXPERIMENTS:
1. Installation of Sleuth Kit on Linux. List all data blocks. Analyze allocated as well as unallocated blocks of a disk image.
2. Data extraction from call logs using Sleuth Kit.
3. Data extraction from SMS and contacts using Sleuth Kit.
4. Install Mobile Verification Toolkit or MVT and decrypt encrypted iOS backups.
5. Process and parse records from the iOS system.
6. Extract installed applications from Android devices.
7. Extract diagnostic information from Android devices through the adb protocol.
8. Generate a unified chronological timeline of extracted records
30 PERIODS
TOTAL : 60 PERIODS
TEXT BOOK:
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In-depth Guide to Mobile Device Forensics”, First Edition, CRC Press, 2022.
REFERENCES
1. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River Media, 2005, ISBN: 1-58450-389.
