Recommended References: (although not required, these are standard references for computer and Internet forensics).
- Brian Carrier, File System Forensic Analysis, Addison-Wesley, Reading
- Charles Kozierok, TCP/IP Guide, NoStarch Press, San Francisco (2014)
- Sherri Davidoff and Jonathan Ham, Network Forensics: Tracking Hackers through Cyberspace, Prentice-Hall (2012)
- Laura Chappell, Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide, Laura Chappell University (2010)
- Laura Chappell, Wireshark Network Analysis, 2nd ed., Chappell University (2012) [she has several good books on Wireshark, but this is the best IMHO]
- Charles and Shari Pfleeger, Security in Computing, Prentice Hall (2007)
- Gordon Fyodor Lyon, NMAP Network Scanning, Nmap Project (2009) (partially online @ nmap.org)
- John Vacca (ed.): Computer and Information Secutiy Handbook, Elsevier (2013) [a useful, encyclopedic approach]
- Dave Roberts, Internet Protocols Handbook, Coriolis Group (1996) [an oldie and a goodie - still a useful introduction to TCP/IP. If you can find this in a used bookstore for a few bucks, grab it - it's still a handy (if outdated) reference]
- Ferrara, et al, CyberLaw: Text & Cases, SouthWestern Cengage Learning, 3rd ed, 2012.
- Abraham Wagner and Nicholas Rostow, Cybersecurity and Cyberlaw, Carolina Academic Press, 2020.
ABET Course Outcomes
By the end of the term, you will:
Part I: Network Forensics
- Understand Core TCP/IP Protocols
- Understand anomalous packet traffic and the role of RFCs in defining Internet Protocols
- Understand the OSI and TCP/IP network models and their inter-relationship
- Understand how ARP and DNS function
- Understand the role of data fields and flags within TCP/IP packets
- Understand the TCP 3-way handshake
- Understand the operation of packet-based networks
- Understand common network topologies
- Understand the fundamentals of packet analysis in threat detection
- Understand the use of Packet Analysis and Packet Crafting in
Digital Forensics
- Understand the basic tools for Packet Analysis at the network and transport layer
- Understand the basic tools for Packet Crafting at the network and transport layer
- Understand the basic tools for Packet Analysis at the link (aka network access) layer
- Understand how to analyze common packet headers
- Understand the concept of protocol encapsulation
- Understand Common Threat Vectors
- Understand common hacking strategies
- Understand common categories of malware
- viruses, worms and trojan horses
- Understand metamorphic and polymorphic exploits
- Understand zero-day exploits
- Understand hydra-headed exploits (e.g., Stuxnet, Flame)
- Understand the role of RFCs in out-of-band packet crafting
- Understand covert channeling
- Understand common denial-of-service exploits (DOS, DDOS, Ping-of-Death, etc.)
- Understand Buffer Overflows
- Understand Common Mitigation Strategies
- Understand Defensive Strategies
- Why Security-through-Obscurity doesn't work
- Defense-in-Depth
- Time-Based Security
- Monitoring and Auditing
- Understand Stimulus-Response Theory
- Understand Firewall Rulebase Construction
- Understand Intrusion Detection Systems
- Undersand Intrusion Prevention Systems
- Understand Anti-Forensics Strategies
- Metasploit Project
- Anonymizing
- Onion routing and TOR
- Remailing
- Understand Encryption
Part II: Computer Forensics
- Understand Basic Computer Forensics Techniques
- Basic Understanding of a Forensic Workstation
- Basic Understanding of Computer Forensics Software
- Encase
- XWay Forensics
- FTK
- Sleuth Kit
- Understand the Principle of Evidence Collection and Evidence Handling (esp. Chain-of-Custody and Evidence Integrity) in Forensics Investigations
- Understand the difference between analysis of live and dead systems
- Understand the relationships between OS and disk structures
- Windows-DOS, FAT, FAT32, NTFS, VFAT
- MAC - HFS
- Linux - EXT2/3
- Understand the basics of media analysis vis-a-vis disk structure
- Understand the concept of and opportunities for data hiding
- Understand the challenges of live system imaging
- Understand BRAP forensics
- Understand the use of Digital Forensics in:
- Digital crime (cybercrime)
- Digital, transnational money laundering
- Understand basic firewall theory
- Understand network reconnaissance
- Network hacks
- Understand basic data hiding techniques on computers and networks
- Phishing
ABET Core Competencies
- An understanding the implications, remediation, and avoidance strategies of digital security breaches
- Situational awareness of the use of forensics by law enforcement, intelligence agencies, military, terrorists, criminals, and state sponsors.
- The ability to distringuish between types of digital forensics, and understand capabilities of each..
- You will develop a working knowledge of computer and network forensics and their tools
- You will be able to work within a digital security environment
- You will understand some of the digital/electronic/computing/networking technologies behind digital forensics
Tentative Syllabus
note 1: The UNLV IEEE Xplore digital library institutional license (ieeexplore.ieee.org from any UNLV IP address) and UNLV ACM digital library institutional subscription (dl.acm.org from any UNLV IP address) may be used to access IEEE and ACM assigned readings. In both cases use the title as the search term.
Whenever possible, I will provide alternative convenient links consistent with copyright, but I cannot guarantee the persistence of the links.
note 2: Refer to the Instructor's Study Guide to selected assigned readings in preparation for exams.
Week of January 19: Topic: Legal Issues in Computing and Information Technology (continued from CS448)
Weeks of January 26 and February 2: Topic: Introduction to Computer and Media Forensics
- Lecture Notes
- Assigned Readings
- BRAP forensics, CACM, 51:6, 2008 DOI: 10.1145/1349026.1349030
- Data Hiding Tactics for Windows and Unix File Systems, Advances in Computer, Vol 74, 2008 DOI: 10.1016/S0065-2458(08)00601-3
- Disk Wiping By Any Other Name, Communications of the ACM, 49:8, 2006; DOI: 10.1145/1145287.1145303
- related optional resources (also applies to forthcoming lectures on OS Vulnerabilities):
- Better-than-nothing security practices, CACM, 50:8, 2007. DOI: 10.1145/1278201.1278222
- Better-than-Nothing Security Practices for Securing Windows XP Professional
- Better-than-Nothing Security Practices for Securing Windows 7
- Better-than-Nothing Security Practices for Securing Web Browsers
- Better-than-Nothing Security Practices for Securing Wireless
- Better-than-Nothing Security Practices for Securing Firewalls
- Wading into Alternative Data Streams, CACM, 47:4, 2004. DOI: 10.1145/975817.975836
February 3 & 9: Anonymity on the Internet
NOTE: Bring a copy of the SANS IPv4 TCP/IP and tcpdump Pocket Guide to class from this point on. For your online convenience,
feel free to use my online Packet Pal Primer . For additional detail, I recommend
Charles Kozierok, TCP/IP Guide, NoStarch Press, San Francisco (2014). An introduction may be found in A Protocol Layer Survey of Network Security, Advances in Computers 64, pp. 109-158 (2005).
Week of February 16 : TCP/IP Protocols: IPv4
Week of February 23 and March 2: TCP/IP Protocols: TCP and UDP
March 9: Exam I (note: exam due to cancellation of class on Feb. 11 due to failure of projection system.)
Exam 1 -Exam is "closed everything": e.g., "closed book," "closed notes,"
PDAs and computers turned off, cell phones off, etc. A copy of the SANS TCP/IP Guide will be attached to your exam for reference purposes. The detection of any notes or mobile devices in use will result
in an exam grade of F. Questions will come from 2 sources: lectures amd assigned readings.
Be sure to confirm that you use the current version of the study guide: _______. f.y.i., the second exam is tentatively scheduled for Wed, April 29, 2026 and the optional final is
scheduled for Monday May 11, from 10:10-12:10.