Skip to main content
Skip header

Forensic Analysis

Summary

At the "Forensic Analysis" course, the student will become familiar with techniques in the field of investigation of cyber attacks and providing evidence. Methods for collecting the necessary evidence, prosecuting attackers, conducting a security audit, and correct methods for identifying traces of attackers in the event of an attack by an cyber attack will be explained. In the classroom, the student gets familiar with most of the latest tracking tools, software or hardware tools that you can use to find traces of attackers through data that remains on infected systems. We will be dedicated to recovering deleted, corrupted, or encrypted files, and to developing an audit to prevent future attacks of a similar type.

Literature

Fundamental of Digital Forensics, Kavrestad, Joakim. 2020, SPRINGER NATURE.

Advised literature

Intelligence-Driven Incident Response: Outwitting the Adversary, Roberts, Scott J., 2017, O'Reilly Media.

Digital Forensics Basics: A Practical Guide Using Windows OS, Hassan, Nihad A., 2019. Apress

Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition, Johansen, Gerard, 2020, Packt Publishing.


Language of instruction čeština, angličtina
Code 460-4135
Abbreviation FA
Course title Forensic Analysis
Coordinating department Department of Computer Science
Course coordinator Ing. Jan Plucar, Ph.D.