FRM Course Syllabus IPDownload
FRM Course Syllabus IPDownload
CO1 :: describe the fundamentals of computer forensics and incident response handling process.
Unit I
Understanding Computer Forensics : What is computer security incident? Understand the
Fundamentals of Computer Forensics, Understand Cybercrimes and their Investigation Procedures,
Understand Digital Evidence, Understand Forensic Readiness, Incident Response, and the Role of SOC
(Security Operations Center) in Computer Forensics, Identify the Roles and Responsibilities of a
Forensic Investigator
Computer Forensics Investigation Process : Understand the Forensic Investigation Process and
Its Importance, Understand the Pre-investigation Phase, Understand First Response, Understand the
Investigation Phase.
Unit II
Understanding Hard Disks and File Systems : Describe Different Types of Disk Drives, Explain the
Logical Structure of a Disk, Understand Booting Process of Windows and Linux, Understand Various
File Systems of Windows and Linux, Examine File System Using Autopsy, Understand Storage
Systems, Understand Encoding Standards and Hex Editors
Data Acquisition and Duplication : Understand Data Acquisition Fundamentals, Understand Data
Acquisition Methodology, Prepare an Image for Examination
Unit III
Evidence handling : What is evidence? Challenges of evidence handling, Evidence collection
procedures and handling procedures.
Windows Forensics : Collect Volatile and Non-volatile Information, Perform Windows Memory and
Registry Analysis, Examine the Cache, Cookie and History Recorded in Web Browsers, Examine
Windows Files and Metadata, Understand Text- based Logs and Windows Event Logs
Unit IV
Linux : Understand Volatile and Non-volatile Data in Linux, Analyze File system Image, Demonstrate
Memory Forensics.
Network Forensics : Understand Network Forensics, Explain Logging Fundamentals and Network
Forensic Readiness, Summarize Event Correlation Concepts, Identify Indicators of Compromise (IoCs)
from Network Logs, Investigate Network Traffic.
Unit V
Analysing system memory : Memory evidence overview, Memory analysis, Tools
Investigating Email Crimes : Understand Email Basics, Understand Email Crime Investigation and
its Steps.
Unit VI
Investigating routers : Obtaining volatile data prior to powering down, Finding the proof, Using
routers as response tools
Writing computer forensic reports : What is a computer forensic report?, Report writing
guidelines, A template for computer forensic reports
• wireshark
Network-Evidence Analysis
• Analysis of packet information and gaining overall sense of traffic contained within a packet capture
with the help of Wireshark
Network Log Analysis
• Analyzing network log files with help of DNS Blacklists
• keyword searching
• and web and email artifacts and to filter results on known bad file hashes using Autopsy.
Integrity Check
• MD5 Sum Utility
Window Investigation
• Demonstration of window investigation using OS Forensics
References:
1. DIGITAL FORENSICS AND INCIDENT RESPONSE by GERARD JOHANSEN, PACKT
PUBLISHING
2. INCIDENT RESPONSE & COMPUTER FORENSICS by JASON LUTTGENS, MATTHEW PEPE
AND KEVIN MANDIA, Mc Graw Hill Education