184 Homepage Reading Schedule Internet Resources    

AJ/CSIS 184 Reading Schedule

The textbook is Computer Evidence: Collection and Preservation, 2nd Edition, by Christopher Brown. We will be skipping around a bit in the book, so please refer to the schedule below to properly prepare for lectures.

Week 1: PC Hardware and Forensics Intro

Textbook: Chapter 1 (pg 3-23). Chapter 9 (189-208).

Other reading

Newegg.com: MotherboardsHard drives.


Amazon.com: Bestselling laptopsBestselling network equipment.

Hammack, Bill. How A Hard Drive Works. http://www.youtube.com/watch?v=Wiy_eHdj8kg

US DOJ. Electronic Crime Scene Investigation: A Guide for First Responders. http://www.ncjrs.gov/pdffiles1/nij/219941.pdf


Week 2: Software, Filesystems and Operating Systems

Textbook: Chapters 7-8 (pg 145-206). Appendix F (pg 431-441).

Other Reading

Wikipedia. Operating System. http://en.wikipedia.org/wiki/Operating_system

Wikipedia. File System. http://en.wikipedia.org/wiki/Filesystem

US DOJ. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. http://www.justice.gov/criminal/cybercrime/ssmanual/ssmanual2009.pdf


Week 3: Forensics Tools & Techniques Pt. 1


Textbook: Chapter 10, 11 and 12 (pg 207-294)

Week 4: Forensics Tools & Techniques Pt. 2


Textbook: Chapter 14, 15, 16 (pg 315-386)

Other reading:

Gutmann, Peter. Secure Deletion of Data from Magnetic and Solid State Memory. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

Week 5: Networks and Internets

Textbook: Chapter 5 (pg 95-120)

Other reading:

Graham, Robert. Sniffing (network wiretap, sniffer) FAQ. http://cs.baylor.edu/~donahoo/tools/sniffer/sniffingFAQ.htm

Schneier, Bruce. The war against cybercrime.http://www.youtube.com/view_play_list?p=8C18A169750D00C0


Zeltser, Lenny. The Evolution of Malicious Agents. http://zeltser.com/malicious-agents/

Also look in the bookmarks list (http://www.delicious.com/ppphowell/cops) for stories that refer to "botnets".

Week 6: Mobile and cellular equipment & networks

Other reading:

Oxygen Software. Mobile Forensic Analysis for Smartphones. http://www.oxygen-forensic.com/download/presentations/mfa_smartphones.html

Oxygen Software. Oxygen Suite Videos. http://www.youtube.com/user/oxygenforensic

Week 7: Testimony and Rules of Evidence


Textbook: Chapter 2 & 3 (pg 25-70)

Other Reading: Computer Evidence exerpt. 

Week 8: Certifications and Career Paths

Textbook: Chapter 17 (pg 387-405) and Appendix G (pg 443-480)

Other reading:

Defcon 17, 2011. Computer Crime Year in Review. http://www.youtube.com/watch?v=b0prEMItQe4

Grundy, Barry J. Linux LEO Beginner's Guide. http://www.linuxleo.com/Docs/linuxintro-LEFE-3.78.pdf