CIS-175: Digital Forensics I

This course is INACTIVE
School
Business, Entrepreneurship, and Professional Development
Division
Technology - DNU
Department
Computer Information Systems
Academic Level
Undergraduate
Course Subject
Computer Information Systems
Course Number
175
Course Title
Digital Forensics I
Credit Hours
3.00
Instructor Contact Hours Per Semester
47.00 (for 15-week classes)
Student Contact Hours Per Semester
47.00 (for 15-week classes)
Grading Method
A-E
Pre-requisites
CIS-100, with a grade of "C" or better
Co-requisites
CRJ-134, previous completion or concurrent enrollment
Catalog Course Description

Introduces the fundamental principles, theory and application of computer investigations, computer forensics tools, information protection, professional development and security. Explores various types of cybercrime and investigative techniques. Students will examine emerging technologies used in law enforcement in relation to computer-related crimes scenes, evidence collection and analysis.

Goals, Topics, and Objectives

Core Course Topics
  1. What is Computer Forensics?
  2. Types of Cyber Crimes
  3. Investigating Cyber Crime
  4. Legal Issues Relating to Cyber Crime Investigation
  5. The Role of Law Enforcement and the Courts Regarding Computer Forensics
  6. Evidence Procedures and Computer Forensics
  7. Public and Private Agencies in Cyber Crime Investigations
  8. New Investigative Techniques in Cyber Crime
  9. Social, Legal and Technological Aspects in Computer Forensics
  10. Computer Forensics Reporting
Core Course Learning Objectives (Separated)
  1. Understand what constitutes a cybercrime.
  2. Identify and discuss the categories of computer crimes.
  3. Summarize basic steps in a computer forensic investigation.
  4. Identify sources of e-evidence and procedures/process for evidence collection.
  5. Explain the fundamental principles of computer forensics.
  6. Understand how to manage e-evidence in a criminal investigation.
  7. Explain acceptable methods for searching and analyzing evidence.
  8. Reiterate the steps in a forensic investigation and formulate a policy and procedure.
  9. Apply techniques for analyzing and acquiring data from hard drives and other storage media.
  10. Summarize tools that are needed for computer investigations.
  11. Recognize and define an operating system.
  12. Identify and discuss different components of an operating system.
  13. Understand the flow of electronic mail and networks.
  14. Understand how the internet is used as a tool for terrorism and virtual warfare.
  15. Define "hacker" and explain how a hacker uses criminal commerce.
  16. Describe types of fraud and investigative techniques.
  17. Summarize the rules of evidence and legal foundations.
  18. Restate limitations on expectation of privacy.
  19. Explain the responsible, ethical, and professional behavior required for expert witness testimony.
  20. Explain courtroom procedures and effective testimony.

Assessment and Requirements

Assessment of Academic Achievement

Students will be assessed through tests, quizzes, in-class activities, outside assignments, and/or class participation.

Outcomes

Satisfies Wellness Requirement
No

Approval Dates

Effective Term
Fall 2020
Deactivation Date
ILT Approval Date
AALC Approval Date
Curriculum Committee Approval Date