ACFTI EduLabs is a collaborative project designed for educators to facilitate cooperation in the creation of hands-on laboratories and educational materials. EduLabs incorporates a functional network infrastructure utilized by educators to develop and evaluate penetration testing, secure programming, and cyber forensics resources focused on experiential learning. The EduLabs concept has a wide range of applications. Examples encompass:
Formulating collaborative resources that include hands-on learning for cybersecurity, digital forensics, incident response, and threat investigation topics
Implementing and evaluating network infrastructure and services for cybersecurity, digital forensics, incident response, and threat investigations training
Conducting tests and providing hosting services for virtual machines and containers for cybersecurity, digital forensics, incident response, and threat investigations training
Implementation and automation of infrastructure and testing processes for cybersecurity, digital forensics, incident response, and threat investigations.
What are the reasons to join ACFTI EduLabs?
Facilitate the exchange of information and expertise and oversee the maintenance and administration of infrastructure and network resources for cybersecurity, digital forensics, incident response, and threat investigations education
Create and distribute educational materials and publications related to the newest cybersecurity, digital forensics, incident response, and threat investigation Topics
Collaborate and oversee the allocation of resources using a shared platform for project coordination
ACFTI EduLabs offers several opportunities for growth and development
Acquire practical experience in a nurturing and unbiased setting
Cultivate practical skills applicable in professional settings
Engage in meaningful learning within a live and dynamic environment
For the latest EduLabs curriculums, please scroll down.
Module Aims
Criminals employ computers, either as a means to aid their illicit operations or as a tool to launch offensive attacks against others. This module addresses the many categories of cybercrime and the methods via which these crimes can be committed. Additionally, it demonstrates techniques that a cyber forensic expert may employ to examine a criminal act and produce the required written proof for legal proceedings.
Module Content
Types of cybercrimes.
Legal and ethical issues associated with cybercrime.
Requirements for evidence likely to be used in a legal process.
Systems architecture and its impact on locating evidence of criminal activity.
Review and practice in using forensic analysis and network tools for locating evidence.
Use of open-source leading tools in digital investigations
Indicative Reading
Gerard Johansen, 2020, Digital forensics and incident response: incident response techniques and procedures to respond to modern cyber threats, 2nd edition, Packt Publishing
Jones K. J. & Bejtlich R. & Rose C. W., 2006, Real Digital Forensics Computer Security and Incident Response, Addison-Wesley
Sammons, J., 2012, The Basics of Digital Forensics, Syngress, ISBN 978-1597496612
Solomon Michael G. & Barrett D. & Broom N., 2011, Computer Forensics Jump Start, SYBEX
Bryant R. & et al. 2008, Investigating Digital Crime, Wiley
Kruse II W. G. & Heiser J. G., 2002, Computer Forensics: incident response essentials, Addison Wesley
Carrier B., 2005, File Systems Forensic Analysis, Addison-Wesley
Britz M. T., 2004, Computer Forensics and Cyber Crime, Pearson Prentice Hall
Learning outcomes
Knowledge and understanding. After studying this module, you should be able to:
K1.Analyze the possible types of crimes that can be committed involving computer technology.
K2. Evaluate the information and evidence that can be supplied by cyberforensic analysis for the legal authorities.
K3. Critically assess the ethical issues concerning data protection and privacy for a computing professional carrying out an investigation.
K4. Evaluate forensic and network tools and decide which ones are most appropriate to use in a given situation.
K5. Analyze the information provided by the tools for evidence of criminal activity.
Skills, qualities, and attributes. After studying this module, you should be able to:
S1. Use open source and/or commercial tools to examine data from a system for evidence of criminal activity.
S2. Record evidence in a manner suitable for any further legal action.
Teaching and Learning
There will be a series of lectures and accompanying laboratory and seminar sessions. The lectures will cover the background theory and principles that are being applied. These will be supported by seminars to apply the theory to practical examples. You will also have a series of 3-hour labs in which you will practice using forensic, network, and other tools/devices.
Laboratory Requirement: ACFTI Forensic Workstation (ACFTFW.ova) included
Week 1 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 2 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 3 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 4 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 5 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 6 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 7 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 8 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 9 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 10 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 11 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 12 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 13 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 14 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Week 15 (Materials included): Lecture (2 hours), Seminar Questions & Answers (1 hour), Hands-on laboratory (3 hours)
Module Assessment Exam (50%) + Coursework (50%):
Sample Exam 1 + Answers / Sample Case Study 1 + Answer Report
Sample Exam 2 + Answers / Sample Case Study 2 + Answer Report
Sample Exam 3 + Answers / Sample Case Study 3 + Answer Report
Sample Exam 4 + Answers / Sample Case Study 4 + Answer Report
To access the shared drive of this module, Please send an email to the following address: acfti@acfti.org
It is important to mention that we require your department/school to sign an agreement with ACFTI.
Note: Only instructors or lecturers who are members of ACFTI have access to the EduLabs programme. therefore you will need to subscribe with an institutional email address. Access will not be made available for @gmail, @hotmail, @live etc., email addresses.
Do you have a suggestion for new curricula for ACFTI EduLabs?
To propose a new curriculum for ACFTI EduLabs, kindly Contact us with your proposal