/*
 * Interesting.  You found the raw data for the web site!
 * Shh!  Keep this a secret and send your instructor an email
 * that says what you found.
 */

var FORMAT = {
  meets: "MTWR", /* Valid are UMTWRFS */
  showExtra: true,
};

var INPUT_DAYS = [
{
  "topic": "What is Cybercrime?",
  "read": [ {"name":"Chapter 1"} ],
  /*"mode": "classroom"*/
},
{
  topic: "Investigative Process",
  "read": [ {"name":"Chapter 2"} ],
  "extra": [{"name":"hacking in movies", "url": "https://www.youtube.com/watch?v=67WrchN0yvc"}],
},
{
  topic: '<a href="labs/lab01.html">Lab - Preliminaries</a>', /* Mounting VM, imaging */
  class: 'lab'
},
{ topic: 'Lab (continued)', class: 'lab' },


{
  "topic": "Basic Law",
  "read": [ {"name": "Chapters 3-4" } ],
  "due": '<a href="./homework/homework1.pdf">HW 1</a>',
  "extra": [{"name": "slides", "url": "./laws-slides.pdf"},
            {"name": "snl 'law' sketch", "url":"https://youtu.be/JUDSeb2zHQ0"}],
},
{
  "topic": "Search &amp; Seizure",
  "read": [ {"name": "Chapters 4-5" } ],
  "extra": [{"name": "18(II) USC (S&S)",
              "url": "https://www.law.cornell.edu/uscode/text/18/part-II/chapter-205"},
            {"name": "FRCP Rule 41",
              "url": "https://www.law.cornell.edu/rules/frcrmp/rule_41"}],
},
{
  "topic": '<a href="labs/lab02.html">Lab - File Carving</a>', /* File Carving */
  "class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },




{
  "topic": "Evidence",
  "read": [ {"name": "Chapter 2,9" } ],
  "due": '<a href="./homework/homework2.pdf">HW 2</a>',
},
{
  "topic": "Finding and Preserving Evidence",
  "read": [ {"name": "Chapter 8" } ],
  "extra": [ {"name": "Pi Investigation", "url": "https://youtu.be/UeAKTjx_eKA"}],
},
{
  "topic": '<a href="labs/lab03.html">Lab - Hidden Artifacts</a>', /* Hidden FS Artifacts */
  "read": [ {"name": "" } ],
  "class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },




{
  "topic": "Procedure and Defenses",
  "read": [ {"name": "<s>Chapter 9</s>" } ],
  "due": '<a href="./homework/homework3.pdf">HW 3</a>',
  "extra": [{"name": "Phishing for Grades", "url": "https://gizmodo.com/california-high-schooler-changes-grades-after-phishing-1825996373"}],
},
{
  "topic": "Network Forensics",
  "read": [ {"name": "Chapter 12" } ],
},
{
  "topic": '<a href="labs/lab04.html">Lab - Timelines and Metadata</a>', /* Links and Meta Data and Logs */
  "read": [ {"name": "" } ],
  "class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab",
},



{ break: "Break", weeks: 2   /*, days: 14 */},




{
  "topic": "Fraud and Exploitation",
  "read": [ {"name": "Chapter 6" } ],
  "due": '<a href="./homework/homework4.pdf">HW 4</a>',
},
{
  "topic": "Communications", /* + lab5 kickoff */
  "read": [ {"name": "Chapter 11" } ],
  "extra": [ {"name": "email forensics video",
              "url": "https://www.youtube.com/watch?v=nK5QpGSBR8c"} ],
},
{
  "topic": "<a href='labs/lab05.html'>Lab - Network and Email</a>", /* Network & Communication analysis */
  "class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },
//{ "topic": "", "class": "noclass", },






//{ "topic": "Spring Break", "class": "noclass" },
//{ "topic": "Spring Break", "class": "noclass" },


{
  "topic": "Computers: Target or Tool?",
  "read": [ {"name": "Case Studies (see Moodle)" } ],
  "due": '<a href="./homework/homework5.pdf">HW 5</a>',
},
{ "topic": "Case Studies, continued",
},
{ "topic": "Project Kickoff",
   "read": [ {"name": "Project Details", "url":"project/spec.pdf"} ],
  "extra": [ {"name": "Forms", "url":"project/"} ],
},
{ "topic": "TBD", "class": "", },




{
  "topic": "Corporate Crimes",
  "read": [ {"name": "Chapter 10" } ],
  "due": '<a href="./homework/homework6.pdf">HW 6</a>',
},
{
  "topic": "Malware Forensics",
  "read": [ {"name": "Blog Post", "url": "http://journeyintoir.blogspot.com/2014/06/improving-your-malware-forensics-skills.html"} ],
},
/*
{
  "topic": "Logging",
  "read": [ {"name": "Handout" } ],
},
*/
{
  "topic": "<a href='labs/lab06.html'>Lab - Memory and Search Tools</a>", /* Memory analysis and search tools */
  "read": [ {"name": "" } ],
  "class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },






{
  "topic": "Image Manipulation",
  "read": [ {"name": "See Moodle" } ],
  "due": '<a href="./homework/homework7.pdf">HW 7</a>',
  "class": "lab"
},
{
  "topic": "Anti-Forensics", /* Steganography */
  "read": [ {"name": "Slides", "url":"https://simson.net/ref/2007/slides-ICIW.pdf"},
            {"name": "Techniques", "url":"http://roar.uel.ac.uk/1508/1/Pajek%20%26%20Pimenidis%20ICGS3%202009.pdf"},
          ],
  "extra": [ {"name": "Massive Data Recovery", "url":"https://simson.net/ref/2007/slides-cs-seminar.pdf"} ],
},

{
  "topic": "Mobile Forensics",
  "read": [ {"name": "Chapter 13" } ],
},

{ "topic": "Mini Investigation",
  "class": "lab",
  "read": [ {"name": "See Moodle" } ],
  "extra": [ {"name": "John Oliver Video", "url":"https://www.youtube.com/watch?v=ScmJvmzDcG0"}, ],

},





//{
//  "topic": "Smartphones", /* Could do lab here */
//  "read": [ {"name": "Case Studies" } ],
//},
{ "topic": "Worktime and Check-Ins", "xclass": "noclass", },
{ "topic": "Worktime and Check-Ins", "xclass": "noclass", },
{ "topic": "Worktime and Check-Ins", "xclass": "noclass", },
{ "topic": "Worktime and Check-Ins", "xclass": "noclass",
  /*"due": "Timeline Narrative Brief (4pm)",*/
},





{
  "topic": "Project Presentations",
  "class": "presentations",
  "due": "Final Project Report",
},
{
  "topic": "Project Presentations",
  "class": "presentations",
},
{
  "topic": "Project Presentations",
  "class": "presentations",
},
{
  "topic": "Course Wrap-up (do your evals)",
  /*"class": "noclass",*/
},



];