/* * Interesting. You found the raw data for the web site! * Shh! Keep this a secret and send your instructor an email * that says what you found. */ var FORMAT = { meets: "MTWR", /* Valid are UMTWRFS */ showExtra: true, }; var INPUT_DAYS = [ { "topic": "What is Cybercrime?", "read": [ {"name":"Chapter 1"} ], /*"mode": "classroom"*/ }, { topic: "Investigative Process", "read": [ {"name":"Chapter 2"} ], "extra": [{"name":"hacking in movies", "url": "https://www.youtube.com/watch?v=67WrchN0yvc"}], }, { topic: 'Lab - Preliminaries', /* Mounting VM, imaging */ class: 'lab' }, { topic: 'Lab (continued)', class: 'lab' }, { "topic": "Basic Law", "read": [ {"name": "Chapters 3-4" } ], "due": 'HW 1', "extra": [{"name": "slides", "url": "./laws-slides.pdf"}, {"name": "snl 'law' sketch", "url":"https://youtu.be/JUDSeb2zHQ0"}], }, { "topic": "Search & Seizure", "read": [ {"name": "Chapters 4-5" } ], "extra": [{"name": "18(II) USC (S&S)", "url": "https://www.law.cornell.edu/uscode/text/18/part-II/chapter-205"}, {"name": "FRCP Rule 41", "url": "https://www.law.cornell.edu/rules/frcrmp/rule_41"}], }, { "topic": 'Lab - File Carving', /* File Carving */ "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { "topic": "Evidence", "read": [ {"name": "Chapter 2,9" } ], "due": 'HW 2', }, { "topic": "Finding and Preserving Evidence", "read": [ {"name": "Chapter 8" } ], "extra": [ {"name": "Pi Investigation", "url": "https://youtu.be/UeAKTjx_eKA"}], }, { "topic": 'Lab - Hidden Artifacts', /* Hidden FS Artifacts */ "read": [ {"name": "" } ], "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { "topic": "Procedure and Defenses", "read": [ {"name": "Chapter 9" } ], "due": 'HW 3', "extra": [{"name": "Phishing for Grades", "url": "https://gizmodo.com/california-high-schooler-changes-grades-after-phishing-1825996373"}], }, { "topic": "Network Forensics", "read": [ {"name": "Chapter 12" } ], }, { "topic": 'Lab - Timelines and Metadata', /* Links and Meta Data and Logs */ "read": [ {"name": "" } ], "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { break: "Break", weeks: 2 /*, days: 14 */}, { "topic": "Fraud and Exploitation", "read": [ {"name": "Chapter 6" } ], "due": 'HW 4', }, { "topic": "Communications", /* + lab5 kickoff */ "read": [ {"name": "Chapter 11" } ], "extra": [ {"name": "email forensics video", "url": "https://www.youtube.com/watch?v=nK5QpGSBR8c"} ], }, { "topic": "Lab - Network and Email", /* Network & Communication analysis */ "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, //{ "topic": "", "class": "noclass", }, //{ "topic": "Spring Break", "class": "noclass" }, //{ "topic": "Spring Break", "class": "noclass" }, { "topic": "Computers: Target or Tool?", "read": [ {"name": "Case Studies (see Moodle)" } ], "due": 'HW 5', }, { "topic": "Case Studies, continued", }, { "topic": "Project Kickoff", "read": [ {"name": "Project Details", "url":"project/spec.pdf"} ], "extra": [ {"name": "Forms", "url":"project/"} ], }, { "topic": "TBD", "class": "", }, { "topic": "Corporate Crimes", "read": [ {"name": "Chapter 10" } ], "due": 'HW 6', }, { "topic": "Malware Forensics", "read": [ {"name": "Blog Post", "url": "http://journeyintoir.blogspot.com/2014/06/improving-your-malware-forensics-skills.html"} ], }, /* { "topic": "Logging", "read": [ {"name": "Handout" } ], }, */ { "topic": "Lab - Memory and Search Tools", /* Memory analysis and search tools */ "read": [ {"name": "" } ], "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { "topic": "Image Manipulation", "read": [ {"name": "See Moodle" } ], "due": 'HW 7', "class": "lab" }, { "topic": "Anti-Forensics", /* Steganography */ "read": [ {"name": "Slides", "url":"https://simson.net/ref/2007/slides-ICIW.pdf"}, {"name": "Techniques", "url":"http://roar.uel.ac.uk/1508/1/Pajek%20%26%20Pimenidis%20ICGS3%202009.pdf"}, ], "extra": [ {"name": "Massive Data Recovery", "url":"https://simson.net/ref/2007/slides-cs-seminar.pdf"} ], }, { "topic": "Mobile Forensics", "read": [ {"name": "Chapter 13" } ], }, { "topic": "Mini Investigation", "class": "lab", "read": [ {"name": "See Moodle" } ], "extra": [ {"name": "John Oliver Video", "url":"https://www.youtube.com/watch?v=ScmJvmzDcG0"}, ], }, //{ // "topic": "Smartphones", /* Could do lab here */ // "read": [ {"name": "Case Studies" } ], //}, { "topic": "Worktime and Check-Ins", "xclass": "noclass", }, { "topic": "Worktime and Check-Ins", "xclass": "noclass", }, { "topic": "Worktime and Check-Ins", "xclass": "noclass", }, { "topic": "Worktime and Check-Ins", "xclass": "noclass", /*"due": "Timeline Narrative Brief (4pm)",*/ }, { "topic": "Project Presentations", "class": "presentations", "due": "Final Project Report", }, { "topic": "Project Presentations", "class": "presentations", }, { "topic": "Project Presentations", "class": "presentations", }, { "topic": "Course Wrap-up (do your evals)", /*"class": "noclass",*/ }, ];