2013-2014 Catalog 
    
    Dec 22, 2024  
2013-2014 Catalog [ARCHIVED CATALOG]

Add to Personal Catalog (opens a new window)

CIS 273 - Digital Forensics II



5.0 Credits
Covers advanced topics. Registry, event logs, internet history, and creating analysis reports. Students will be introduced to processes for conducting testing and verification. Each student will process a forensic case. Maps to the ACE and CSFA certifications. Prerequisite: CIS 272  with a GPA of at least 2.5 or equivalent experience.

Course-level Learning Objectives (CLOs)
Upon successful completion of this course, students will be able to:

  1. Create forensically sound image files and working copies of drives from both live and at rest computer systems using a variety of commercial and open source tools. [REASON]
  2. Employ various techniques to overcome encryption and passwords using a variety of commercial and open source tools. [REASON]
  3. Describe the differences between the FAT16 and FAT32 file systems and boot records. [COMMUNICATE]
  4. Describe the function and layout of: master boot records, partition tables and how they can be hidden and restored, and the NTFS Master File Table. [COMMUNICATE]
  5. Identify and describe the Windows registry keys that would be examined relevant to a computer forensics investigation. [REASON]
  6. Forensically examine an image from a NTFS system. [REASON]
  7. Recover deleted files and file fragments using both manual and automated methods. [REASON]
  8. Conduct a forensic analysis involving email and other Internet activity. [REASON]
  9. Forensically process thumb drives and memory sticks. [REASON]
  10. Create a Curriculum Vita and properly document experience and education for work in the field of computer forensics. [REASON]
  11. Analyze a code of ethics and conduct related to the information security and digital forensics professions. [REASON]
  12. Identify standards of professionalism and ethical behavior for information security and digital forensics professionals, and apply these standards successfully to ethical dilemmas. [ACT]
  13. Describe issues related to privacy and determine how to address them technically and ethically. [REASON]



Add to Personal Catalog (opens a new window)