Skip to main content
Till KTH:s startsida Till KTH:s startsida

EP2780 Digital forensics and incident response 7.5 credits

This course lays the foundations of digital forensics and incident response. These two areas are closely related hut still differ in key ways. Digital forensics is the use of natural science methods to answer questions that are relevant in the justice system. This can be part of a criminal investigation, but also civil recourse, e.g. through a tort. In incident response the motivation of the forensic investigations is primarily to understand how intrusions have been realized so that further exploitation can be stopped and to ensure that the attacker is not able to reestablish a foothold in the system environment after the intrusion has been eradicated.

Choose semester and course offering

Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.

Application

For course offering

Autumn 2024 Start 28 Oct 2024 programme students

Application code

51090

Headings with content from the Course syllabus EP2780 (Autumn 2022–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

The course gives the student both practical and theoretical knowledge of technologies, methods, models, laws/rules that apply at investigations of digital crimes or incidents.

For example the course covers the following:

  • The history of forensics
  • Digital forensics and digital evidence
  • The investigation process of forensics/incident response
  • Legislation and international cooperations in digital forensics
  • Standards in the area and the requirements of an organisation that works with digital forensics or incident management
  • Computer forensics
  • Forensics for embedded systems and mobile units
  • Network forensics

Intended learning outcomes

After passing the course, the student should be able to

in terms of knowledge and understanding:

  • describe central concepts, models and methods in digital forensics and incident response
  • describe the national and international contexts and the laws, regulations, and conventions that are negotiated within these contexts, and how these are applied both internationally and nationally
  • describe differences and similarities between a forensic scenario and an incident response scenario

in terms of skills and abilities:

  • apply known methods for data collection and analysis in given situations
  • plan and carry out data collection and analysis, in order to run a forensic analysis or an incident analysis
  • present and explain conclusions from a forensic analysis
  • present and explain conclusions from an incident, as well as suggest future measures

in terms of judgement and approach:

  • explain limitations with forensic analysis with regard to how certain conclusions can be drawn
  • explain how the previous separate between digital forensics and incident response
  • review critically and source-critically a forensic and incident response report
  • evaluate when forensic work (particularly when it does not take place in connection with a crime scene investigation) has a negative effect on the personal integrity of individuals.

Literature and preparations

Specific prerequisites

Knowledge in cybersecurity, 7.5 higher education credits, equivalent to completed course DD2391 or completed courses DD2394 and DD2395.

Active participation in a course offering where the final examination is not yet reported in LADOK is considered equivalent to completion of the course.

Being registered for a course counts as active participation.

The term 'final examination' encompasses both the regular examination and the first re-examination.

Recommended prerequisites

No information inserted

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F

Examination

  • LAB1 - Laborative work, 2.0 credits, grading scale: P, F
  • PRO1 - Project, 2.5 credits, grading scale: P, F
  • TEN1 - Written exam, 3.0 credits, grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering

Education cycle

Second cycle

Add-on studies

No information inserted

Supplementary information

In this course, the EECS code of honor applies, see: http://www.kth.se/en/eecs/utbildning/hederskodex.