C-ID Descriptor
Digital Forensics Fundamentals
Descriptor Details
-
Digital Forensics Fundamentals
-
Not Identified
-
165
-
Not Identified
-
Not Identified
-
3.0
-
Not Identified
-
Uploaded: 10/12/2017 04:44:11 PM PDT
This course is an introduction to the methods used to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Topics covered include an overview of computer forensics as a profession, the computer investigation process, understanding operating systems boot processes and disk structures, data acquisition and analysis, technical writing, and a review of familiar computer forensics tools.
None
None
ITIS 160 - Introduction to Information Systems Security
Each course content area should be supported with relevant hands-on exercises as much as possible.
- Computer Forensics as a profession
- Computing investigation processes
- Microsoft operating systems, boot processes and disk structures
- Macintosh and Linux operating systems, boot processes and disk structures
- The investigator’s office
- Current computer forensics tools
- Digital evidence controls
- Crime/incident scene processing
- Data acquisition
- Computing forensics analysis
- Email investigations
- Graphic image recovery
- High tech reports
- Expert witness overview
At the conclusion of this course, the student should be able to:
- Define computer forensics.
- Summarize how to prepare for a computer investigation.
- Summarize the certification requirements for computer forensics labs.
- Measure the different ways for proper data acquisition.
- Classify the rules for proper digital evidence handling.
- Analyze how data is stored and managed by an operating system.
- Analyze various computer forensics tools.
- Validate the evidence during the analysis process.
- Identify and reconstruct graphics files.
- Describe the importance of network forensics.
- Analyze email investigations.
- Generate a forensic report.
- Describe guidelines for testifying in court.
- Maintain a high level of ethical behavior in their work.
Evaluation will include hands-on projects and a combination of examinations, presentations, discussions, or problem-solving assignments.
- Nelson, B. & Phillips, A., Guide to Computer Forensics and Investigations, Cengage
- Britz, M. T., Computer Forensics and Cyber Crime: An Introduction, Pearson
-
No
-
Not Identified
-
Not Identified
-
Not Identified
-
Not Identified
-
Not Identified
Delete Descriptor?
Are you sure you want to delete this descriptor?
Deleted descriptors cannot be restored.