Examine the fundamental principles, theory and application of computer investigations, computer forensics tools, information protection, professional development and cybersecurity. Explores various types of cybercrime and investigative techniques. Students will discuss emerging technologies used in law enforcement in relation to computer-related crimes scenes, evidence collection and analysis. Students will evaluate and synthesize technical and legal issues in relation to digital evidence. Students will apply various skills and techniques, combined with numerous investigative software tools to analyze seized electronic media. Students subject to background investigation prior to admittance.
Goals, Topics, and Objectives
- What is Computer Forensics?
- Investigating Cyber Crime
- Legal Issues Relating to Cyber Crime Investigation
- The Role of Law Enforcement and the Courts Regarding Computer Forensics
- Social, Legal and Technological Aspects in Computer Forensics
- Computer Forensics Reporting
- Digital Forensics Profession and Investigations
- Data Acquisition
- Windows, Linux and Macintosh File Systems
- Digital Forensic Tools
- Email and Social Media Investigation
- Mobile Device Forensics
- Explain the field of digital forensics.
- Restate limitations on expectation of privacy.
- Identify and discuss the categories of computer crimes and what constitutes a cybercrime.
- Summarize how to prepare a digital forensic investigation using a systematic approach.
- Describe how to prepare a digital forensic investigation for the public and private sector.
- Restate how to conduct an investigation including critiquing a case.
- Describe types of fraud and investigative techniques.
- Describe certification and physical requirements for digital forensic labs.
- Discuss data acquisition methods, tools and validation. Explain acceptable methods for searching and analyzing evidence.
- Explain guidelines for processing law enforcement crime scenes (digital evidence storage and hashes).
- Differentiate Windows, MacOS and Linux file system structures.
- Use digital forensic software and hardware tools.
- Define digital graphics and audio file formats.
- Apply procedure of a live acquisition, analysis of virtual machines, network forensics and network monitoring tools.
- Summarize email and social media investigations.
- Summarize mobile device and cloud forensics.
- Describe guidelines for report writing for high-tech investigations.
- Demonstrate the responsible, ethical, and professional behavior required for expert witness testimony.Summarize the rules of evidence and legal foundations.
- Summarize courtroom procedures and effective testimony.
Assessment and Requirements
Students will be assessed through tests, quizzes, in-class activities/presentations, case studies, outside assignments, and/or class participation.