Skip to main content
Till KTH:s startsida

EP2780 Digital forensics and incident response 7.5 credits

This course lays the foundations of digital forensics and incident response. These two areas are closely related hut still differ in key ways. Digital forensics is the use of natural science methods to answer questions that are relevant in the justice system. This can be part of a criminal investigation, but also civil recourse, e.g. through a tort. In incident response the motivation of the forensic investigations is primarily to understand how intrusions have been realized so that further exploitation can be stopped and to ensure that the attacker is not able to reestablish a foothold in the system environment after the intrusion has been eradicated.

Information per course offering

Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.

Termin

Information for Spring 2025 Start 17 Mar 2025 programme students

Course location

KTH Campus

Duration
17 Mar 2025 - 2 Jun 2025
Periods
P4 (7.5 hp)
Pace of study

50%

Application code

60730

Form of study

Normal Daytime

Language of instruction

English

Course memo
Course memo is not published
Number of places

Places are not limited

Target group

Open for all master's programmes, as long as it can be included in your programme.

Planned modular schedule
[object Object]
Schedule
Schedule is not published
Part of programme
No information inserted

Contact

Examiner
No information inserted
Course coordinator
No information inserted
Teachers
No information inserted

Course syllabus as PDF

Please note: all information from the Course syllabus is available on this page in an accessible format.

Course syllabus EP2780 (Autumn 2022–)
Headings with content from the Course syllabus EP2780 (Autumn 2022–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

The course gives the student both practical and theoretical knowledge of technologies, methods, models, laws/rules that apply at investigations of digital crimes or incidents.

For example the course covers the following:

  • The history of forensics
  • Digital forensics and digital evidence
  • The investigation process of forensics/incident response
  • Legislation and international cooperations in digital forensics
  • Standards in the area and the requirements of an organisation that works with digital forensics or incident management
  • Computer forensics
  • Forensics for embedded systems and mobile units
  • Network forensics

Intended learning outcomes

After passing the course, the student should be able to

in terms of knowledge and understanding:

  • describe central concepts, models and methods in digital forensics and incident response
  • describe the national and international contexts and the laws, regulations, and conventions that are negotiated within these contexts, and how these are applied both internationally and nationally
  • describe differences and similarities between a forensic scenario and an incident response scenario

in terms of skills and abilities:

  • apply known methods for data collection and analysis in given situations
  • plan and carry out data collection and analysis, in order to run a forensic analysis or an incident analysis
  • present and explain conclusions from a forensic analysis
  • present and explain conclusions from an incident, as well as suggest future measures

in terms of judgement and approach:

  • explain limitations with forensic analysis with regard to how certain conclusions can be drawn
  • explain how the previous separate between digital forensics and incident response
  • review critically and source-critically a forensic and incident response report
  • evaluate when forensic work (particularly when it does not take place in connection with a crime scene investigation) has a negative effect on the personal integrity of individuals.

Literature and preparations

Specific prerequisites

Knowledge in cybersecurity, 7.5 higher education credits, equivalent to completed course DD2391 or completed courses DD2394 and DD2395.

Active participation in a course offering where the final examination is not yet reported in LADOK is considered equivalent to completion of the course.

Being registered for a course counts as active participation.

The term 'final examination' encompasses both the regular examination and the first re-examination.

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F

Examination

  • LAB1 - Laborative work, 2.0 credits, grading scale: P, F
  • PRO1 - Project, 2.5 credits, grading scale: P, F
  • TEN1 - Written exam, 3.0 credits, grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering

Education cycle

Second cycle

Add-on studies

No information inserted

Supplementary information

In this course, the EECS code of honor applies, see: http://www.kth.se/en/eecs/utbildning/hederskodex.