This course is an introduction to the methods used to properly conduct a computer forensics investigation. Topics covered include an overview of computer forensics as a profession; how computer crime affects forensics, forensic methods, and labs; branches of digital forensics; email forensics, mobile forensics, data acquisition and analysis; and, a review of computer forensics tools.
Course Outcomes
Upon successful completion of the course, students should be able to demonstrate the following knowledge or skills:
- Define and apply computer forensics
- Identify the different data acquisition methods
- Conduct the proper handling of digital evidence
- Analyze how data is stored and managed by an operating system
- Analyze networks and email using computer forensic tools
- Validate evidence for forensic reports
- Follow guidelines for Incident Response
- Utilize proper protocols with disaster recovery to preserve evidence
- Prepare written reports with analysis findings
- Work within a group to resolve problems and project or report outcomes
Institutional Outcomes
IO1 Communication: Students will be able to communicate clearly and effectively within a workplace context
IO3 Human Relations/Workplace Skills: Students will be able to demonstrate teamwork, ethics, appropriate safety awareness and/or workplace specific skills
IO3 Human Relations/Workplace Skills: Students will be able to demonstrate teamwork, ethics, appropriate safety awareness and/or workplace specific skills
Course Content Outline
- Introduction to Forensics
- Overview of Computer Crime
- Forensic Methods and Labs
- Forensic Tools, Techniques and Methods
- Understanding Techniques for Hiding and Scrambling
- Recovering Data
- Incident Response
- Branches of Digital Forensics
- Operating Systems, Networks, and Application Forensics
- Trends and Future Directions