Course Description
This course will focus on examining the fundamentals of system forensics, i.e.: what forensics is, an overview of computer crime, and the types of laws that affect forensic investigations. A significant part of the course is devoted to examining the tools, techniques, and methods used to perform computer forensics and investigations. Students will learn how to collect, preserve, analyze, and document all types of digital evidence, from computers running various operating systems, mobile devices, e-mail, and more. (3 credits)
Prerequisites
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security OR CSS 101 Cybersecurity Fundamentals
- ITE 220: Networking and Data Communcation (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Summarize the basic principles of computer forensics.
- Summarize important laws regarding computer forensics.
- Describe various computer crimes and how they are investigated.
- Describe digital forensic methodology and labs.
- Outline the proper approach to collecting, seizing, and protecting evidence.
- Explain techniques for hiding and scrambling information as well as how data is recovered.
- Summarize various types of digital forensics.
- Explain how to perform a network analysis.
- Describe incident and intrusion response.
- Identify trends in and resources for digital forensics.
Course Activities and Grading
Assignments | Weight |
---|---|
Discussions (Weeks 1 - 8) | 10% |
Written Assignments (Weeks 1 - 8) | 30% |
Lab Assignments (Weeks 2 - 8) | 30% |
Project (Weeks 2, 3, 5, 6, 8) | 15% |
Final Exam (Week 8) | 15% |
Total | 100% |
Required Textbooks
Available through Charter Oak State College's Book Bundle
- Easttom, Chuck. Digital Forensics, Investigation, and Response - with Access. 4th ed. Burlington, MA: Jones & Bartlett Learning, 2022. ISBN-13: 978-1-284-24448-9
Course Schedule
Week | SLOs | Readings and Exercises | Assignments |
1 | 1,3 | Topics: Introduction to Forensics and Computer Crimes
|
|
2 | 4,10 | Topics: Forensic Methods and Evidence Handling
|
|
3 | 5 | Topics: Steganography and Data Recovery
|
|
4 | 6 | Topics: Incident Response and Windows Forensics
|
|
5 | 7 | Topics: Linux and Mac OS Forensics
|
|
6 | 7 | Topics: Email Forensics and Mobile Forensics
|
|
7 | 8,9 | Topic: Network Forensics
|
|
8 | 1-10 | Topics: Memory Forensics and Future Trends , Course Review and Final Examination
|
|
Final Exam |
01192023
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.