/Cyber-Security-and-Forensics

The repository for Cyber Security and Forensics course in BRNO university of technology

Cyber-Security-and-Forensics

The course introduces the basics of filesystems, operating systems, and usage in the area of digital forensics. We will learn essential cybersecurity principles and incident response techniques. Moreover, we will try out various attacks, their detection, and how to create countermeasures.

Key Outcomes

  • Understanding fundamental concepts of cybersecurity and digital investigation
  • Learning how to acquire a forensic image and examine filesystems, OS, and data
  • Gaining skills for incident responses and forensics with real-world cybersecurity case studies
  • Learning the essentials of cryptography, password protection, and cracking
  • Getting hands-on experience to develop skills via open-source security tools
  • Try out real cyber attacks in a lab environment and learn how to protect your system against such attacks

Classes

Cloud Security (Google Cloud Platform)


Malware Analysis


Encrypted Traffic (Wireshark)

  1. Analysis of TLS 1.2 Handshake
  2. Analysis of TLS 1.3 Handshake
  3. Decryption of TLS using Captured Key
  4. Analysis of IPSec Connection
  5. Understanding SSH session

Password Recovery


Deepfakes

deepfakes_bissit

  1. Image Synthesis - GANs
  2. Face Morphing
  3. Face Swap
  4. Reenactment
  5. Face Manipulation
  6. TTS (Text-to-Speech)
  7. Voice Conversion
  8. Voice Cloning

Digital Forensics and Incident Response (DFIR)


Web Browser Forensics Analysis

  1. Web Browser Forensics by using the SQLLite data stored in Chrome Folder
  2. Chrome Data Files - History, Visited Pages, Downloaded Data, Cookies, Authentication, Cache
  3. Web Protocol
  4. Network Miner

Google Workspace and M365 Forensics


Team Project

Network Forensics

This field contains an extensive collection of topics related to network communication. For instance, identifying various types of DDoS attacks from capture files requires extracting attack statistics, a list of attacking bots, determining the type of attack (TCP SYN flood, UDP/ICMP flood, HTTP GET/POST flood, HTTP flood with browser emulation, etc.). The research topics include the usage of machine learning and other methods for automatic analysis of data, content identification and extraction, communication capturing and evidence extraction, etc.