/*
* Interesting. You found the raw data for the web site!
* Shh! Keep this a secret and send your instructor an email
* that says what you found.
*/
var FORMAT = {
meets: "MTWR", /* Valid are UMTWRFS */
showExtra: true,
};
var INPUT_DAYS = [
{
"topic": "What is Cybercrime?",
"read": [ {"name":"Chapter 1"} ],
/*"mode": "classroom"*/
},
{
topic: "Investigative Process",
"read": [ {"name":"Chapter 2"} ],
"extra": [{"name":"hacking in movies", "url": "https://www.youtube.com/watch?v=67WrchN0yvc"}],
},
{
topic: 'Lab - Preliminaries', /* Mounting VM, imaging */
class: 'lab'
},
{ topic: 'Lab (continued)', class: 'lab' },
{
"topic": "Basic Law",
"read": [ {"name": "Chapters 3-4" } ],
"due": 'HW 1',
"extra": [{"name": "slides", "url": "./laws-slides.pdf"},
{"name": "snl 'law' sketch", "url":"https://youtu.be/JUDSeb2zHQ0"}],
},
{
"topic": "Search & Seizure",
"read": [ {"name": "Chapters 4-5" } ],
"extra": [{"name": "18(II) USC (S&S)",
"url": "https://www.law.cornell.edu/uscode/text/18/part-II/chapter-205"},
{"name": "FRCP Rule 41",
"url": "https://www.law.cornell.edu/rules/frcrmp/rule_41"}],
},
{
"topic": 'Lab - File Carving', /* File Carving */
"class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },
{
"topic": "Evidence",
"read": [ {"name": "Chapter 2,9" } ],
"due": 'HW 2',
},
{
"topic": "Finding and Preserving Evidence",
"read": [ {"name": "Chapter 8" } ],
"extra": [ {"name": "Pi Investigation", "url": "https://youtu.be/UeAKTjx_eKA"}],
},
{
"topic": 'Lab - Hidden Artifacts', /* Hidden FS Artifacts */
"read": [ {"name": "" } ],
"class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },
{
"topic": "Procedure and Defenses",
"read": [ {"name": "Chapter 9" } ],
"due": 'HW 3',
"extra": [{"name": "Phishing for Grades", "url": "https://gizmodo.com/california-high-schooler-changes-grades-after-phishing-1825996373"}],
},
{
"topic": "Network Forensics",
"read": [ {"name": "Chapter 12" } ],
},
{
"topic": 'Lab - Timelines and Metadata', /* Links and Meta Data and Logs */
"read": [ {"name": "" } ],
"class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab",
},
{ break: "Break", weeks: 2 /*, days: 14 */},
{
"topic": "Fraud and Exploitation",
"read": [ {"name": "Chapter 6" } ],
"due": 'HW 4',
},
{
"topic": "Communications", /* + lab5 kickoff */
"read": [ {"name": "Chapter 11" } ],
"extra": [ {"name": "email forensics video",
"url": "https://www.youtube.com/watch?v=nK5QpGSBR8c"} ],
},
{
"topic": "Lab - Network and Email", /* Network & Communication analysis */
"class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },
//{ "topic": "", "class": "noclass", },
//{ "topic": "Spring Break", "class": "noclass" },
//{ "topic": "Spring Break", "class": "noclass" },
{
"topic": "Computers: Target or Tool?",
"read": [ {"name": "Case Studies (see Moodle)" } ],
"due": 'HW 5',
},
{ "topic": "Case Studies, continued",
},
{ "topic": "Project Kickoff",
"read": [ {"name": "Project Details", "url":"project/spec.pdf"} ],
"extra": [ {"name": "Forms", "url":"project/"} ],
},
{ "topic": "TBD", "class": "", },
{
"topic": "Corporate Crimes",
"read": [ {"name": "Chapter 10" } ],
"due": 'HW 6',
},
{
"topic": "Malware Forensics",
"read": [ {"name": "Blog Post", "url": "http://journeyintoir.blogspot.com/2014/06/improving-your-malware-forensics-skills.html"} ],
},
/*
{
"topic": "Logging",
"read": [ {"name": "Handout" } ],
},
*/
{
"topic": "Lab - Memory and Search Tools", /* Memory analysis and search tools */
"read": [ {"name": "" } ],
"class": "lab",
},
{ "topic": "Lab (continued)", "class": "lab", },
{
"topic": "Image Manipulation",
"read": [ {"name": "See Moodle" } ],
"due": 'HW 7',
"class": "lab"
},
{
"topic": "Anti-Forensics", /* Steganography */
"read": [ {"name": "Slides", "url":"https://simson.net/ref/2007/slides-ICIW.pdf"},
{"name": "Techniques", "url":"http://roar.uel.ac.uk/1508/1/Pajek%20%26%20Pimenidis%20ICGS3%202009.pdf"},
],
"extra": [ {"name": "Massive Data Recovery", "url":"https://simson.net/ref/2007/slides-cs-seminar.pdf"} ],
},
{
"topic": "Mobile Forensics",
"read": [ {"name": "Chapter 13" } ],
},
{ "topic": "Mini Investigation",
"class": "lab",
"read": [ {"name": "See Moodle" } ],
"extra": [ {"name": "John Oliver Video", "url":"https://www.youtube.com/watch?v=ScmJvmzDcG0"}, ],
},
//{
// "topic": "Smartphones", /* Could do lab here */
// "read": [ {"name": "Case Studies" } ],
//},
{ "topic": "Worktime and Check-Ins", "xclass": "noclass", },
{ "topic": "Worktime and Check-Ins", "xclass": "noclass", },
{ "topic": "Worktime and Check-Ins", "xclass": "noclass", },
{ "topic": "Worktime and Check-Ins", "xclass": "noclass",
/*"due": "Timeline Narrative Brief (4pm)",*/
},
{
"topic": "Project Presentations",
"class": "presentations",
"due": "Final Project Report",
},
{
"topic": "Project Presentations",
"class": "presentations",
},
{
"topic": "Project Presentations",
"class": "presentations",
},
{
"topic": "Course Wrap-up (do your evals)",
/*"class": "noclass",*/
},
];