Skip to main content
Till KTH:s startsida

EP278U Digital Forensics and Incident Response 7.5 credits

This course lays the foundations of digital forensics and incident response. These two areas are closely related hut still differ in key ways. Digital forensics is the use of natural science methods to answer questions that are relevant in the justice system. This can be part of a criminal investigation, but also civil recourse, e.g. through a tort. In incident response the motivation of the forensic investigations is primarily to understand how intrusions have been realized so that further exploitation can be stopped and to ensure that the attacker is not able to reestablish a foothold in the system environment after the intrusion has been eradicated.

Information per course offering

Termin

Information for Autumn 2024 Start 26 Aug 2024 contract education

Course location

KTH Campus

Duration
26 Aug 2024 - 27 Oct 2024
Periods
P1 (7.5 hp)
Pace of study

50%

Application code

50095

Form of study

Normal Daytime

Language of instruction

Swedish

Course memo
Course memo is not published
Number of places

Places are not limited

Target group

Contract education

Planned modular schedule
[object Object]
Schedule
Schedule is not published
Part of programme
No information inserted

Contact

Examiner
No information inserted
Course coordinator
No information inserted
Teachers
No information inserted

Course syllabus as PDF

Please note: all information from the Course syllabus is available on this page in an accessible format.

Course syllabus EP278U (Autumn 2022–)
Headings with content from the Course syllabus EP278U (Autumn 2022–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

The course gives the student both practical and theoretical knowledge of technologies, methods, models, laws/rules that apply at investigations of digital crimes or incidents.

For example the course covers the following:

  • The history of forensics
  • Digital forensics and digital evidence
  • The investigation process of forensics/incident response
  • Legislation and international cooperations in digital forensics
  • Standards in the area and the requirements of an organisation that works with digital forensics or incident management
  • Computer forensics
  • Forensics for embedded systems and mobile units
  • Network forensics

Intended learning outcomes

After passing the course, the student should be able to

  • describe central concepts, models and methods in digital forensics and incident response
  • describe the national and international contexts and the laws, regulations, and conventions that are negotiated and how these are applied
  • describe differences and similarities between a forensic scenario and an incident response scenario
  • apply known methods for data collection and analysis in given situations
  • plan and carry out data collection and analysis, in order to run a forensic analysis or an incident analysis
  • present and explain conclusions from a forensic analysis
  • present and explain conclusions from an incident, as well as suggest future measures
  • explain limitations with forensic analysis with regard to how certain conclusions can be drawn
  • review critically and source-critically a forensic and incident response report
  • evaluate when forensic work (particularly when it does not take place in connection with a crime scene investigation) has a negative effect on the personal integrity of individuals.

Literature and preparations

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F

Examination

  • LAB1 - Laborative work, 2.0 credits, grading scale: P, F
  • PRO1 - Project, 2.5 credits, grading scale: P, F
  • TEN1 - Written exam, 3.0 credits, grading scale: A, B, C, D, E, FX, F

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering

Education cycle

Second cycle

Add-on studies

No information inserted