MODULE 3
Introduction to memory forensics. Memory acquisition techniques: lve, dump, hibemation
Memory analysis phases: identification, extraction, analysis, reporting, Memory acquisition
ity. Redline, Men
analysis techniques: strings, DLLs, network connections, Case studies and practical exercises
and analysis tools, Memory acquisition tools: FTK Imager, Volat
MODULE
istry organization: Keys, val
Windows registry concepts and structures, Re
a types,
Common registry keys and their functions, Event logs and their analysis, Event log types:
analysis tools: LogParser, EventViewer, Splunk. Case
system, application, security. Event lo
studies and practical exercises, Analyzing registry entries to identify malware and system
changes, Analyzing event logs to identify system activity and security events
MODULE
User and system activity files: system, application, security
Network trafic: packet capture, flow analysis, Incident response and recovery strat
Incident response phases: preparation, identification, containment, eradi
lessons leamed. Recovery techniques: system restore, backup and restore, image deployment
L
Laws and r
and ethical considerations in digital forensics
ulations related to digital forensics: search and seizure, chain of custody, evidence
handling
Ethical considerations: privacy, confidentiality, professional conduct, Case studies and practical
Identifying and analyzing network trafic to detect and respond to security incidents,
Recover
2 compromised system using backup and restore techniques.
BOOKS REFERENCES:
1. Kerrigan, S., & Pajak, R. (2017), Cybercrime Inves
on Case Studies: An Excerpt from
Placing the Suspect Behind the Keyboard. Academic Press
Schell, B. H. Martin, C. & Greene, D. W. (2019). Cybercrime: Investigating
High-Technology Computer Crime (2nd ed). RoutledgeS,
Spinelli, R. (2019). Cybercrime Investig
Electronic Evidence (31d ed). Routledge
om: An Introduction to Forensic Science and
BOOKS REFERENCES:
1. Silberschatz, A Galvin, PB, & Gagne, G. (2018). Operating System Concepts (10th ed).
Wiley
Russinovich, M. E. Solomon, D. A. & Tonescu, A. (2012). Windows Internals, Part I
System Architecture, Processes, Threads, Memory Management, and More (7th ed.)
Microsoft Press.
Bach, M. J. (1986). The Design ofthe UNIX Operating System. Prentice Hal.