Course Content and Outcomes Guide for CIS 286 Effective Winter 2019
- Course Number:
- CIS 286
- Course Title:
- Computer Forensics
- Credit Hours:
- Lecture Hours:
- Lecture/Lab Hours:
- Lab Hours:
- Special Fee:
Course DescriptionIntroduces computer security administrators to computer forensics. Includes setup and use of an investigator's laboratory, computer investigations using digital evidence controls, processing crime and incident scenes, performing data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness testimony. Prerequisites: CS 140U and (CIS 240L or CIS 240M), or instructor permission. Audit available.
Intended Outcomes for the course
Upon completion of the course students should be able to:
Explain how to conduct a digital forensics investigation, including the concept of the chain of evidence.
Report findings from digital forensic investigations.
Perform recovery of digital evidence from various digital devices using a variety of software utilities.
Course Activities and Design
This course is presented by means of:
- on-campus lectures or on-line lessons
- group discussions
- individual lab assignments
- group lab assignments.
Students will be required to use essential tools to complete the lab assignments.
Outcome Assessment Strategies
Through exams and lab assignments students will be assessed to determine whether they are able to:
- Define and discuss the concepts of computer forensics.
- Explain the career of a computer forensics professional.
- Explain and apply the concepts of computer investigations.
- Setup and operate in an investigator's office and laboratory.
- Select and apply current computer forensics tools.
- Identify and apply current practices for processing crime and incident scenes.
- Explain and apply digital evidence controls.
- Explain and perform forensic analysis in various operating system environments.
- Explain the boot processes and disk structures of various operating system environments.
- Identify and apply current practices for data discovery recovery and acquisition.
- Conduct basic computer forensic analysis.
- Demonstrate the recovery of image files.
- Conduct basic network forensic analysis.
- Perform e-mail investigations.
- Act as expert witness and report results of investigations.
Course Content (Themes, Concepts, Issues and Skills)
- Computer forensics.
- Computer investigations.
- Computer forensics laboratory.
- Computer forensics tools.
- Crime and incident scenes
- Digital evidence practices.
- Data and image recovery.
- Network monitoring and forensic analysis.
- E-mail recovery and analysis.
- Testimony and reporting.