Digital Forensics
*********
*********
Due Date: August 23, 2023


*********
*********
Due Date: August 19, 2023

Click here and read this document.

Click here to practice taking an exam for the info on the document above.
 
 

**********
**********
**********
**********
**********
**********
**********
**********
**********
**********
**********
**********
**********
**********
**********
**********


Course Outline:
I. Introduction to Digital Forensics
- Definition and scope of digital forensics
- History and evolution of digital forensics
- Importance of digital forensics in law enforcement and cybersecurity
- Types of digital forensics: computer, network, mobile, and cloud
- Legal and ethical considerations

II. Digital Evidence
-Types of digital evidence
-Collection and preservation of digital evidence
-Chain of custody

III. Digital Crime and Cybersecurity
-Types of digital crimes (e.g. hacking, identity theft)
-Common cybersecurity threats (e.g. malware, phishing)

IV. Computer Systems and Networks
-Basic computer architecture and operating systems
-Computer networks and network protocols
-Network security and intrusion detection

V. Linux

-File systems and partitions

https://cyber.instructure.com/courses/357

Unit 1 - FSH, Using CLI &s; File Editing
Unit 1 Lesson Plan

-1.1.1 - File System Hierarchy	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-1.2.5 - File and Directory Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Linux 101	Quiz : Key
-3.1.1 - Shell Script Elements Part 1	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-3.1.2 - Shell Script Elements Part 2	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-1.2.1 - File Editing	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Nano vs Vim	Quiz : Key
-3.1.3 - Script Utilities and Variables	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Linux 102	Quiz : Key
-1.2.3 - Metadata	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-1.2.2 - File Compressing and Archiving	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - File Compression and Metadata	Quiz : Key
 	 	 	 	 
Unit 2 - User Accounts &s; Management
Unit 2 Lesson Plan

-2.2.1 - Account Creation and Deletion	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Account Creation	Quiz : Key
-2.2.2 - Account Configuration and Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-2.4.2 - Executing Commands as Another User	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - To sudo or Not to sudo, That Is the Question	Quiz : Key
-4.4.1 - Troubleshooting File Permissions	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Troubleshooting File Permissions	Quiz : Key
 	 	 	 	 
Unit 3 - Services &s; Networking
Unit 3 Lesson Plan

-1.4.1 - System Services	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-1.4.2 - Process Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-1.5.1 - Network Interface Management	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-1.5.2 - Name Resolution	Lesson Notes
PowerPoint	Guided Notes
Answer Key		Quiz : Key
-1.5.3 - Network Monitoring	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - TCPDUMP vs Wireshark	Quiz : Key
-1.5.4 - Remote Networking Tools	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Remote Networking Tools	Quiz : Key
-1.2.4 - Linking and Copying Files Between Systems	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Linking and Copying Files Between Systems	Quiz : Key
-4.2.1 - Network Resource Issues	Lesson Notes
PowerPoint	Guided Notes
Answer Key	Lab - Nmap and nslookup	Quiz : Key 
 
 
VI. Computer Forensics

-Data recovery and analysis
-File systems and partitions
	Linux
	
Steganography and cryptography

VII. Network Forensics

Network traffic analysis
Network protocols and packet analysis
Investigating network intrusions
VIII. Presentation and Reporting

Documenting and reporting findings
Testifying in court

IX. Mobile Device Forensics

Types of mobile devices and operating systems
Collection and analysis of mobile device data

X. Emerging Trends in Digital Forensics

New technologies and techniques in digital forensics
Current issues and challenges in digital forensics
Note that this is just a sample outline and actual course content 
and order may vary depending on the specific high school program and instructor. 
It's important to ensure that students have a strong work ethic.

**********
**********
*********
*********
Due Date: August 1, 2024