CCOG for CIS 286 archive revision 201901

You are viewing an old version of the CCOG. View current version »

Effective Term:
Winter 2019 through Summer 2024

Course Number:
CIS 286
Course Title:
Computer Forensics
Credit Hours:
4
Lecture Hours:
30
Lecture/Lab Hours:
0
Lab Hours:
30

Course Description

Introduces computer security administrators to computer forensics. Includes setup and use of an investigator's laboratory, computer investigations using digital evidence controls, processing crime and incident scenes, performing data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness testimony. Audit available.

Intended Outcomes for the course

Upon completion of the course students should be able to:

  • Explain how to conduct a digital forensics investigation, including the concept of the chain of evidence.

  • Report findings from digital forensic investigations.

  • Perform recovery of digital evidence from various digital devices using a variety of software utilities.

Course Activities and Design

This course is presented by means of:

  • on-campus lectures or on-line lessons
  • group discussions
  • individual lab assignments
  • group lab assignments.

Students will be required to use essential tools to complete the lab assignments.

Outcome Assessment Strategies

Through exams and lab assignments students will be assessed to determine whether they are able to:

  • Define and discuss the concepts of computer forensics.
  • Explain the career of a computer forensics professional.
  • Explain and apply the concepts of computer investigations.
  • Setup and operate in an investigator's office and laboratory.
  • Select and apply current computer forensics tools.
  • Identify and apply current practices for processing crime and incident scenes.
  • Explain and apply digital evidence controls.
  • Explain and perform forensic analysis in various operating system environments.
  • Explain the boot processes and disk structures of various operating system environments.
  • Identify and apply current practices for data discovery recovery and acquisition.
  • Conduct basic computer forensic analysis.
  • Demonstrate the recovery of image files.
  • Conduct basic network forensic analysis.
  • Perform e-mail investigations.
  • Act as expert witness and report results of investigations.

Course Content (Themes, Concepts, Issues and Skills)

  • Computer forensics.
  • Computer investigations.
  • Computer forensics laboratory.
  • Computer forensics tools.
  • Crime and incident scenes
  • Digital evidence practices.
  • Data and image recovery.
  • Network monitoring and forensic analysis.
  • E-mail recovery and analysis.
  • Testimony and reporting.