/* * Interesting. You found the raw data for the web site! * Shh! Keep this a secret and send your instructor an email * that says what you found. */ var FORMAT = { meets: "MTWR", /* Valid are UMTWRFS */ showExtra: true, }; var INPUT_DAYS = [ { "topic": "What is Cybercrime?", "read": [ {"name":"Chapter 1"} ], /*"mode": "classroom"*/ }, { topic: "Investigative Process", "read": [ {"name":"Chapter 2"} ], "extra": [{"name":"hacking in movies", "url": "https://www.youtube.com/watch?v=67WrchN0yvc"}], }, { topic: '<a href="labs/lab01.html">Lab - Preliminaries</a>', /* Mounting VM, imaging */ class: 'lab' }, { topic: 'Lab (continued)', class: 'lab' }, { "topic": "Basic Law", "read": [ {"name": "Chapters 3-4" } ], "due": '<a href="./homework/homework1.pdf">HW 1</a>', "extra": [{"name": "slides", "url": "./laws-slides.pdf"}, {"name": "snl 'law' sketch", "url":"https://youtu.be/JUDSeb2zHQ0"}], }, { "topic": "Search & Seizure", "read": [ {"name": "Chapters 4-5" } ], "extra": [{"name": "18(II) USC (S&S)", "url": "https://www.law.cornell.edu/uscode/text/18/part-II/chapter-205"}, {"name": "FRCP Rule 41", "url": "https://www.law.cornell.edu/rules/frcrmp/rule_41"}], }, { "topic": '<a href="labs/lab02.html">Lab - File Carving</a>', /* File Carving */ "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { "topic": "Evidence", "read": [ {"name": "Chapter 2,9" } ], "due": '<a href="./homework/homework2.pdf">HW 2</a>', }, { "topic": "Finding and Preserving Evidence", "read": [ {"name": "Chapter 8" } ], "extra": [ {"name": "Pi Investigation", "url": "https://youtu.be/UeAKTjx_eKA"}], }, { "topic": '<a href="labs/lab03.html">Lab - Hidden Artifacts</a>', /* Hidden FS Artifacts */ "read": [ {"name": "" } ], "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { "topic": "Procedure and Defenses", "read": [ {"name": "<s>Chapter 9</s>" } ], "due": '<a href="./homework/homework3.pdf">HW 3</a>', "extra": [{"name": "Phishing for Grades", "url": "https://gizmodo.com/california-high-schooler-changes-grades-after-phishing-1825996373"}], }, { "topic": "Network Forensics", "read": [ {"name": "Chapter 12" } ], }, { "topic": '<a href="labs/lab04.html">Lab - Timelines and Metadata</a>', /* Links and Meta Data and Logs */ "read": [ {"name": "" } ], "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { break: "Break", weeks: 2 /*, days: 14 */}, { "topic": "Fraud and Exploitation", "read": [ {"name": "Chapter 6" } ], "due": '<a href="./homework/homework4.pdf">HW 4</a>', }, { "topic": "Communications", /* + lab5 kickoff */ "read": [ {"name": "Chapter 11" } ], "extra": [ {"name": "email forensics video", "url": "https://www.youtube.com/watch?v=nK5QpGSBR8c"} ], }, { "topic": "<a href='labs/lab05.html'>Lab - Network and Email</a>", /* Network & Communication analysis */ "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, //{ "topic": "", "class": "noclass", }, //{ "topic": "Spring Break", "class": "noclass" }, //{ "topic": "Spring Break", "class": "noclass" }, { "topic": "Computers: Target or Tool?", "read": [ {"name": "Case Studies (see Moodle)" } ], "due": '<a href="./homework/homework5.pdf">HW 5</a>', }, { "topic": "Case Studies, continued", }, { "topic": "Project Kickoff", "read": [ {"name": "Project Details", "url":"project/spec.pdf"} ], "extra": [ {"name": "Forms", "url":"project/"} ], }, { "topic": "TBD", "class": "", }, { "topic": "Corporate Crimes", "read": [ {"name": "Chapter 10" } ], "due": '<a href="./homework/homework6.pdf">HW 6</a>', }, { "topic": "Malware Forensics", "read": [ {"name": "Blog Post", "url": "http://journeyintoir.blogspot.com/2014/06/improving-your-malware-forensics-skills.html"} ], }, /* { "topic": "Logging", "read": [ {"name": "Handout" } ], }, */ { "topic": "<a href='labs/lab06.html'>Lab - Memory and Search Tools</a>", /* Memory analysis and search tools */ "read": [ {"name": "" } ], "class": "lab", }, { "topic": "Lab (continued)", "class": "lab", }, { "topic": "Image Manipulation", "read": [ {"name": "See Moodle" } ], "due": '<a href="./homework/homework7.pdf">HW 7</a>', "class": "lab" }, { "topic": "Anti-Forensics", /* Steganography */ "read": [ {"name": "Slides", "url":"https://simson.net/ref/2007/slides-ICIW.pdf"}, {"name": "Techniques", "url":"http://roar.uel.ac.uk/1508/1/Pajek%20%26%20Pimenidis%20ICGS3%202009.pdf"}, ], "extra": [ {"name": "Massive Data Recovery", "url":"https://simson.net/ref/2007/slides-cs-seminar.pdf"} ], }, { "topic": "Mobile Forensics", "read": [ {"name": "Chapter 13" } ], }, { "topic": "Mini Investigation", "class": "lab", "read": [ {"name": "See Moodle" } ], "extra": [ {"name": "John Oliver Video", "url":"https://www.youtube.com/watch?v=ScmJvmzDcG0"}, ], }, //{ // "topic": "Smartphones", /* Could do lab here */ // "read": [ {"name": "Case Studies" } ], //}, { "topic": "Worktime and Check-Ins", "xclass": "noclass", }, { "topic": "Worktime and Check-Ins", "xclass": "noclass", }, { "topic": "Worktime and Check-Ins", "xclass": "noclass", }, { "topic": "Worktime and Check-Ins", "xclass": "noclass", /*"due": "Timeline Narrative Brief (4pm)",*/ }, { "topic": "Project Presentations", "class": "presentations", "due": "Final Project Report", }, { "topic": "Project Presentations", "class": "presentations", }, { "topic": "Project Presentations", "class": "presentations", }, { "topic": "Course Wrap-up (do your evals)", /*"class": "noclass",*/ }, ];